Sfoglia per Autore
Secure cooperative channel establishment in wireless sensor networks
2006 Di Pietro, Roberto; Mancini, Luigi Vincenzo; Conti, Mauro
FastRIPP: RFID privacy preserving protocol with forward secrecy and fast resynchronisation
2007 Conti, Mauro; Roberto Di, Pietro; Mancini, Luigi Vincenzo; Spognardi, Angelo
Requirements and open issues in distributed detection of node identity replicas in WSN
2007 Conti, Mauro; DI PIETRO, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
2008 Conti, Mauro; DI PIETRO, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro
The smallville effect: Social ties make mobile networks more secure against node capture attack
2010 Conti, Mauro; DI PIETRO, Roberto; Gabrielli, Andrea; Mancini, Luigi Vincenzo; Mei, Alessandro
Who counterfeited my viagra? Probabilistic item removal detection via RFID tag cooperation
2011 DI PIETRO, Roberto; Conti, Mauro; Spognardi, Angelo
Wireless sensor replica detection in mobile environments
2012 Conti, Mauro; DI PIETRO, Roberto; Spognardi, Angelo
Smartphone and Laptop Frameworks for vehicular networking experimentation
2013 Ambrosin, Moreno; Bujari, Armir; Conti, Mauro; DE GASPARI, Fabio; Palazzi, Claudio Enrico
Clone wars: Distributed detection of clone attacks in mobile WSNs
2014 Conti, Mauro; DI PIETRO, Roberto; Spognardi, Angelo
Socialspy: Browsing (supposedly) hidden information in online social networks
2015 Burattin, Andrea; Cascavilla, Giuseppe; Conti, Mauro
Boten ELISA: A novel approach for botnet CandC in Online Social Networks
2015 Compagno, Alberto; Conti, Mauro; Lain, Daniele; Lovisotto, Giulio; Mancini, Luigi Vincenzo
Revealing censored information through comments and commenters in online social networks
2015 Cascavilla, Giuseppe; Conti, Mauro; Schwartz, David G.; Yahav, Inbal
LineSwitch: efficiently managing switch flow in software-defined networking while effectively tackling DoS attacks
2015 Ambrosin, Moreno; Conti, Mauro; DE GASPARI, Fabio; Poovendran, Radha
TRAP: Using Targeted ads to unveil Google personal profiles
2015 CONTI, MAURO; Cozza, Vittoria; Petrocchi, Marinella; SPOGNARDI, Angelo
OnboardICNg: A secure protocol for on-boarding IoT devices in ICN
2016 Compagno, Alberto; Conti, Mauro; Droms, Ralph
Amplified distributed denial of service attack in software defined networking
2016 Ambrosin, Moreno; Conti, Mauro; DE GASPARI, Fabio; Devarajan, Nishanth
Know your enemy: Stealth configuration-information gathering in SDN
2017 Conti, Mauro; De Gaspari, Fabio; Mancini, Luigi V.
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking
2017 Ambrosin, Moreno; Conti, Mauro; DE GASPARI, Fabio; Poovendran, Radha
Identifying Emotions in Social Media: Comparison of Word-emotion lexica
2017 Kusen, E.; Cascavilla, G.; Strembeck, M.; Conti, Mauro
Spot the difference: your bucket is leaking. A novel methodology to expose A/B testing effortlessly
2018 Conti, Mauro; Gangwal, Ankit; Sarada Prasad, Gochhayat; Tolomei, Gabriele
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile