Search

Your search keyword '"Conti, Mauro"' showing total 1,834 results

Search Constraints

Start Over You searched for: Author "Conti, Mauro" Remove constraint Author: "Conti, Mauro"
1,834 results on '"Conti, Mauro"'

Search Results

104. Captcha Attack: Turning Captchas Against Humanity

106. Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

107. Demystifying the Transferability of Adversarial Attacks in Computer Networks

108. A Survey on Security and Privacy Issues of UAVs

109. The Spread of Propaganda by Coordinated Communities on Social Media

110. Research trends, challenges, and emerging topics of digital forensics: A review of reviews

115. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

116. EVScout2.0: Electric Vehicle Profiling Through Charging Profile

117. Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System

118. News consumption and social media regulations policy

123. Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

124. UAVs Path Deviation Attacks: Survey and Research Challenges

125. A Survey on Industrial Control System Testbeds and Datasets for Security Research

126. MiniV2G: An Electric Vehicle Charging Emulator

127. Leveraging Social Networks for Mergers and Acquisitions Forecasting

128. If You’re Scanning This, It’s Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps

129. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

131. Contact Tracing Made Un-relay-able

132. Mascara: A Novel Attack Leveraging Android Virtualization

133. A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems

134. TEL: Low-Latency Failover Traffic Engineering in Data Plane

135. Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis

136. Online Advertising Security: Issues, Taxonomy, and Future Directions

137. Information Consumption and Social Response in a Segregated Environment: the Case of Gab

138. (Mis)Information Operations: An Integrated Perspective

139. Covert Channel-Based Transmitter Authentication in Controller Area Networks

144. Improving Password Guessing via Representation Learning

145. SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices

146. Detecting Covert Cryptomining using HPC

147. On Defending Against Label Flipping Attacks on Malware Detection Systems

148. Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

150. Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage

Catalog

Books, media, physical & digital resources