Search

Your search keyword '"CONTI, MAURO"' showing total 1,643 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO"
1,643 results on '"CONTI, MAURO"'

Search Results

101. Demystifying the Transferability of Adversarial Attacks in Computer Networks

105. A Survey on Security and Privacy Issues of UAVs

106. The Spread of Propaganda by Coordinated Communities on Social Media

107. Research trends, challenges, and emerging topics of digital forensics: A review of reviews

108. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

114. EVScout2.0: Electric Vehicle Profiling Through Charging Profile

115. Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System

116. News consumption and social media regulations policy

117. Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

118. Leveraging Social Networks for Mergers and Acquisitions Forecasting

119. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps

120. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

124. UAVs Path Deviation Attacks: Survey and Research Challenges

125. A Survey on Industrial Control System Testbeds and Datasets for Security Research

126. MiniV2G: An Electric Vehicle Charging Emulator

127. Contact Tracing Made Un-relay-able

128. Mascara: A Novel Attack Leveraging Android Virtualization

129. A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems

130. TEL: Low-Latency Failover Traffic Engineering in Data Plane

131. Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

132. Online Advertising Security: Issues, Taxonomy, and Future Directions

133. Information Consumption and Social Response in a Segregated Environment: the Case of Gab

134. (Mis)Information Operations: An Integrated Perspective

135. Covert Channel-Based Transmitter Authentication in Controller Area Networks

136. Improving Password Guessing via Representation Learning

148. SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices

149. Detecting Covert Cryptomining using HPC

150. On Defending Against Label Flipping Attacks on Malware Detection Systems

Catalog

Books, media, physical & digital resources