Search

Your search keyword '"Conti, Mauro"' showing total 1,834 results

Search Constraints

Start Over You searched for: Author "Conti, Mauro" Remove constraint Author: "Conti, Mauro"
1,834 results on '"Conti, Mauro"'

Search Results

51. Turning Privacy-preserving Mechanisms against Federated Learning

52. Boosting Big Brother: Attacking Search Engines with Encodings

53. Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

54. Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

55. Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations

56. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

57. Cryptocurrency wallets: assessment and security

58. Beware of Pickpockets: A Practical Attack against Blocking Cards

59. SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

60. Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

61. Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence

62. Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

63. Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders

64. Going In Style: Audio Backdoors Through Stylistic Transformations

65. Relation Extraction Techniques in Cyber Threat Intelligence

67. Acoustic Side-Channel Attacks on a Computer Mouse

68. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

69. DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network

70. X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices

71. HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments

73. On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models

74. ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds

75. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

76. Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

77. On the Feasibility of Profiling Electric Vehicles through Charging Data

78. Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

79. You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality

80. Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

81. Hyperloop: A Cybersecurity Perspective

82. Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey

83. Identity-Based Authentication for On-Demand Charging of Electric Vehicles

84. Label-Only Membership Inference Attack against Node-Level Graph Neural Networks

85. Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training

86. Hide and Seek -- Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles

87. QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

88. VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks

89. FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

90. Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy

93. An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

94. Real or Virtual: A Video Conferencing Background Manipulation-Detection System

95. Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit

96. Building Embedded Systems Like It's 1996

97. EVExchange: A Relay Attack on Electric Vehicle Charging System

98. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

99. Dynamic Backdoors with Global Average Pooling

100. Detecting High-Quality GAN-Generated Face Images using Neural Networks

Catalog

Books, media, physical & digital resources