Search

Your search keyword '"CONTI, MAURO"' showing total 25 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Topic computer science - networking and internet architecture Remove constraint Topic: computer science - networking and internet architecture
25 results on '"CONTI, MAURO"'

Search Results

1. Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

2. Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

3. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

4. Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

5. Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

6. Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey

7. An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

8. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

9. Demystifying the Transferability of Adversarial Attacks in Computer Networks

10. TEL: Low-Latency Failover Traffic Engineering in Data Plane

11. Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

12. A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions

13. Reliable Group Communication Protocol for Internet of Things

14. The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions

15. Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource Management for Real-time SFC in Fog-supported SDN

16. FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments

17. Robust Smartphone App Identification Via Encrypted Network Traffic Analysis

18. Security and Privacy Analysis of NSF Future Internet Architectures

19. Know Your Enemy: Stealth Configuration-Information Gathering in SDN

20. Towards a Realistic Model for Failure Propagation in Interdependent Networks

21. To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking

22. LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks

23. Covert Ephemeral Communication in Named Data Networking

24. Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking

25. The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack

Catalog

Books, media, physical & digital resources