Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 36
Titolo Data di pubblicazione Autore(i) File
Secure cooperative channel establishment in wireless sensor networks 2006 Di Pietro, Roberto; Mancini, Luigi Vincenzo; Conti, Mauro
FastRIPP: RFID privacy preserving protocol with forward secrecy and fast resynchronisation 2007 Conti, Mauro; Roberto Di, Pietro; Mancini, Luigi Vincenzo; Spognardi, Angelo
Requirements and open issues in distributed detection of node identity replicas in WSN 2007 Conti, Mauro; DI PIETRO, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks 2008 Conti, Mauro; DI PIETRO, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro
The smallville effect: Social ties make mobile networks more secure against node capture attack 2010 Conti, Mauro; DI PIETRO, Roberto; Gabrielli, Andrea; Mancini, Luigi Vincenzo; Mei, Alessandro
Who counterfeited my viagra? Probabilistic item removal detection via RFID tag cooperation 2011 DI PIETRO, Roberto; Conti, Mauro; Spognardi, Angelo
Wireless sensor replica detection in mobile environments 2012 Conti, Mauro; DI PIETRO, Roberto; Spognardi, Angelo
Smartphone and Laptop Frameworks for vehicular networking experimentation 2013 Ambrosin, Moreno; Bujari, Armir; Conti, Mauro; DE GASPARI, Fabio; Palazzi, Claudio Enrico
Clone wars: Distributed detection of clone attacks in mobile WSNs 2014 Conti, Mauro; DI PIETRO, Roberto; Spognardi, Angelo
Socialspy: Browsing (supposedly) hidden information in online social networks 2015 Burattin, Andrea; Cascavilla, Giuseppe; Conti, Mauro
Boten ELISA: A novel approach for botnet CandC in Online Social Networks 2015 Compagno, Alberto; Conti, Mauro; Lain, Daniele; Lovisotto, Giulio; Mancini, Luigi Vincenzo
Revealing censored information through comments and commenters in online social networks 2015 Cascavilla, Giuseppe; Conti, Mauro; Schwartz, David G.; Yahav, Inbal
LineSwitch: efficiently managing switch flow in software-defined networking while effectively tackling DoS attacks 2015 Ambrosin, Moreno; Conti, Mauro; DE GASPARI, Fabio; Poovendran, Radha
TRAP: Using Targeted ads to unveil Google personal profiles 2015 CONTI, MAURO; Cozza, Vittoria; Petrocchi, Marinella; SPOGNARDI, Angelo
OnboardICNg: A secure protocol for on-boarding IoT devices in ICN 2016 Compagno, Alberto; Conti, Mauro; Droms, Ralph
Amplified distributed denial of service attack in software defined networking 2016 Ambrosin, Moreno; Conti, Mauro; DE GASPARI, Fabio; Devarajan, Nishanth
Know your enemy: Stealth configuration-information gathering in SDN 2017 Conti, Mauro; De Gaspari, Fabio; Mancini, Luigi V.
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking 2017 Ambrosin, Moreno; Conti, Mauro; DE GASPARI, Fabio; Poovendran, Radha
Identifying Emotions in Social Media: Comparison of Word-emotion lexica 2017 Kusen, E.; Cascavilla, G.; Strembeck, M.; Conti, Mauro
Spot the difference: your bucket is leaking. A novel methodology to expose A/B testing effortlessly 2018 Conti, Mauro; Gangwal, Ankit; Sarada Prasad, Gochhayat; Tolomei, Gabriele
Mostrati risultati da 1 a 20 di 36
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile