Search

Your search keyword '"CONTI, MAURO"' showing total 1,643 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO"
1,643 results on '"CONTI, MAURO"'

Search Results

207. Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests

208. Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

209. Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand

210. SnakeGX: A Sneaky Attack Against SGX Enclaves

212. Forensics Analysis of Android Mobile VoIP Apps

213. Investigating Storage as a Service Cloud Platform: pCloud as a Case Study

214. The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

215. Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

216. A Survey on Security and Privacy Issues of Bitcoin

217. Robust Smartphone App Identification Via Encrypted Network Traffic Analysis

218. A Survey on Homomorphic Encryption Schemes: Theory and Implementation

219. It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features

220. FADEWICH: Fast Deauthentication over the Wireless Channel

221. Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions

222. Android Inter-App Communication Threats and Detection Techniques

223. On the Feasibility of Attribute-Based Encryption on Internet of Things Devices

224. OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover 'private' information in OSN profiles

225. ODIN: Obfuscation-based privacy preserving consensus algorithm for Decentralized Information fusion in smart device Networks

226. Security and Privacy Analysis of NSF Future Internet Architectures

246. Crypto-Wills: Transferring Digital Assets by Maintaining Wills on the Blockchain

247. Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics

248. Detecting Covert Cryptomining Using HPC

249. PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition

250. One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud

Catalog

Books, media, physical & digital resources