Search

Your search keyword '"Conti, Mauro"' showing total 1,625 results

Search Constraints

Start Over You searched for: Author "Conti, Mauro" Remove constraint Author: "Conti, Mauro"
1,625 results on '"Conti, Mauro"'

Search Results

1. Fingerprint Membership and Identity Inference Against Generative Adversarial Networks

2. SeCTIS: A Framework to Secure CTI Sharing

3. Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features

4. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

5. Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?

6. Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments

7. Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models

8. Can LLMs Understand Computer Networks? Towards a Virtual System Administrator

9. RedactBuster: Entity Type Recognition from Redacted Documents

10. CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems

11. 'Are Adversarial Phishing Webpages a Threat in Reality?' Understanding the Users' Perception of Adversarial Webpages

12. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

13. Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead

14. Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

15. Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

16. Penetration Testing of 5G Core Network Web Technologies

17. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

18. A Survey on Decentralized Identifiers and Verifiable Credentials

19. 'All of Me': Mining Users' Attributes from their Public Spotify Playlists

20. A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

21. Privacy-Preserving in Blockchain-based Federated Learning Systems

22. DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles

23. Topology-Based Reconstruction Prevention for Decentralised Learning

24. Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

25. NLP-Based Techniques for Cyber Threat Intelligence

28. Alpha Phi-Shing Fraternity: Phishing Assessment in a Higher Education Institution

29. Invisible Threats: Backdoor Attack in OCR Systems

30. AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

31. De-authentication using Ambient Light Sensor

32. HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments

33. Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication

34. Label Inference Attacks against Node-level Vertical Federated GNNs

36. EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks

37. Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

38. Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

39. Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections

40. When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems

41. Turning Privacy-preserving Mechanisms against Federated Learning

42. Boosting Big Brother: Attacking Search Engines with Encodings

43. Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents

44. Social Honeypot for Humans: Luring People through Self-managed Instagram Pages

45. Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations

46. STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

47. Cryptocurrency wallets: assessment and security

48. Beware of Pickpockets: A Practical Attack against Blocking Cards

49. SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

50. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

Catalog

Books, media, physical & digital resources