1,849 results on '"Conti, Mauro"'
Search Results
302. Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks
303. LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles
304. EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction
305. Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)
306. Time-Restricted, Verifiable, and Efficient Query Processing over Encrypted Data on Cloud
307. AALMOND: Decentralized Adaptive Access Control of Multi-Party Data Sharing in Industrial Networks
308. De-Authentication Using Ambient Light Sensor
309. A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks
310. PREVIR: Fortifying Vehicular Networks against Denial of Service Attacks
311. Decentralized and Privacy-Preserving Smart Parking with Secure Repetition and Full Verifiability
312. Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps
313. Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
314. A First Look at Shill Looping in NFT Ecosystem
315. Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis
316. SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks
317. Can machine learning model with static features be fooled: an adversarial machine learning approach
318. BlockAuth: BlockChain based distributed producer authentication in ICN
319. Multi-RIS Aided VLC Physical Layer Security for 6G Wireless Networks
320. On defending against label flipping attacks on malware detection systems
321. TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
322. Covert Ephemeral Communication in Named Data Networking
323. MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities
324. Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking
325. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
326. Lexical Mining of Malicious URLs for Classifying Android Malware
327. You Are How You Play: Authenticating Mobile Users via Game Playing
328. An ICN-Based Authentication Protocol for a Simplified LTE Architecture
329. SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
330. SILK-TV : Secret Information Leakage from Keystroke Timing Videos
331. Unraveling Reflection Induced Sensitive Leaks in Android Apps
332. Distributed Services Attestation in IoT
333. Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN
334. FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments
335. Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand
336. Cyber Forensics for CPS
337. Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services
338. SnakeGX: A Sneaky Attack Against SGX Enclaves
339. Efficient privacy preserving device authentication in WBANs for industrial e-health applications
340. Efficient physical intrusion detection in Internet of Things: A Node deployment approach
341. LISA: Lightweight context-aware IoT service architecture
342. AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones
343. Analysis and classification of context-based malware behavior
344. Fast multi-hop broadcast of alert messages in VANETs: An analytical model
345. The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack
346. Temporal dynamics of coordinated online behavior: Stability, archetypes, and influence.
347. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication
348. Turning Privacy-preserving Mechanisms against Federated Learning
349. HDFL: Private and Robust Federated Learning using Hyperdimensional Computing
350. Anonymous Federated Learning via Named-Data Networking
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.