Search

Your search keyword '"Conti, M. (author)"' showing total 57 results

Search Constraints

Start Over You searched for: Author "Conti, M. (author)" Remove constraint Author: "Conti, M. (author)"
57 results on '"Conti, M. (author)"'

Search Results

1. GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks

2. Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel

3. Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages

4. BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

5. Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

6. Going in Style: Audio Backdoors Through Stylistic Transformations

7. An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems

8. Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems

9. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication

10. Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics

11. Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain

12. Privacy-Preserving and Security in SDN-based IoT: A Survey

13. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

14. Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks

15. A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles

16. Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

17. Research trends, challenges, and emerging topics in digital forensics: A review of reviews

18. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

19. Effect of DIS Attack on 6TiSCH Network Formation

20. User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack

21. Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion

22. On the feasibility of crawling-based attacks against recommender systems

23. Graph Encryption for Shortest Path Queries with k Unsorted Nodes

24. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

25. HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN

26. CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks

27. Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts

28. For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

29. Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit

30. Dynamic Backdoors with Global Average Pooling

31. A few-shot malware classification approach for unknown family recognition using malware feature visualization

32. Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks

33. Software defined network-based HTTP flooding attack defender

34. Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection

35. SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

36. Label-Only Membership Inference Attack against \\Node-Level Graph Neural Networks

37. Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand

38. ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags

39. SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones

40. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

41. Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

42. Misinformation Detection on Social Media: Challenges and the Road Ahead

43. Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

44. Effect of DIS Attack on 6TiSCH Network Formation

45. Research trends, challenges, and emerging topics in digital forensics: A review of reviews

46. Side-channel attacks on mobile and IoT devices for Cyber–Physical systems

47. Practical Exchange for Unique Digital Goods

48. Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain

49. Privacy for 5G-Supported Vehicular Networks

50. Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services

Catalog

Books, media, physical & digital resources