Search

Your search keyword '"CONTI, MAURO"' showing total 1,842 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO"
1,842 results on '"CONTI, MAURO"'

Search Results

1. Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Social Media

2. Towards a Self-rescuing System for UAVs Under GNSS Attack

3. Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning

4. Membership Privacy Evaluation in Deep Spiking Neural Networks

5. Effectiveness of learning-based image codecs on fingerprint storage

6. The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach

7. EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody

8. MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation

9. Obfuscated Location Disclosure for Remote ID Enabled Drones

10. Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data

11. Fingerprint Membership and Identity Inference Against Generative Adversarial Networks

12. SeCTIS: A Framework to Secure CTI Sharing

13. Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features

14. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

15. Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?

16. Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments

17. Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models

18. Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

19. RedactBuster: Entity Type Recognition from Redacted Documents

20. CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

21. 'Are Adversarial Phishing Webpages a Threat in Reality?' Understanding the Users' Perception of Adversarial Webpages

22. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

23. Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead

24. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

25. Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

26. Penetration Testing of 5G Core Network Web Technologies

30. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

31. A Survey on Decentralized Identifiers and Verifiable Credentials

32. 'All of Me': Mining Users' Attributes from their Public Spotify Playlists

33. A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

34. Privacy-Preserving in Blockchain-based Federated Learning Systems

35. DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles

36. Topology-Based Reconstruction Prevention for Decentralised Learning

37. Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

38. Alpha Phi-Shing Fraternity: Phishing Assessment in a Higher Education Institution

42. NLP-Based Techniques for Cyber Threat Intelligence

43. Invisible Threats: Backdoor Attack in OCR Systems

44. AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

45. De-authentication using Ambient Light Sensor

46. HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments

47. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication

49. Label Inference Attacks against Node-level Vertical Federated GNNs

50. EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks

Catalog

Books, media, physical & digital resources