Search

Your search keyword '"CONTI, MAURO"' showing total 1,643 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO"
1,643 results on '"CONTI, MAURO"'

Search Results

51. Acoustic Side-Channel Attacks on a Computer Mouse

52. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

53. DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network

54. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices

55. HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments

58. Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

59. Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations

60. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

61. Cryptocurrency wallets: assessment and security

62. Beware of Pickpockets: A Practical Attack against Blocking Cards

63. SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

64. Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

65. Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence

66. Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

69. Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders

70. Going In Style: Audio Backdoors Through Stylistic Transformations

71. On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models

72. ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds

73. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

74. Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

75. On the Feasibility of Profiling Electric Vehicles through Charging Data

76. Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

77. You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality

78. Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

79. Hyperloop: A Cybersecurity Perspective

80. Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey

81. Identity-Based Authentication for On-Demand Charging of Electric Vehicles

82. Label-Only Membership Inference Attack against Node-Level Graph Neural Networks

83. Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training

84. Hide and Seek -- Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles

85. QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

86. VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks

87. FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

88. Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy

89. An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

90. Real or Virtual: A Video Conferencing Background Manipulation-Detection System

91. Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit

92. Building Embedded Systems Like It's 1996

93. EVExchange: A Relay Attack on Electric Vehicle Charging System

94. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

95. Dynamic Backdoors with Global Average Pooling

96. Detecting High-Quality GAN-Generated Face Images using Neural Networks

97. Captcha Attack: Turning Captchas Against Humanity

100. Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

Catalog

Books, media, physical & digital resources