


Остановите войну!
for scientists:
Mauro Conti
Person information

- affiliation: University of Padua, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j191]Ankur O. Bang
, Udai Pratap Rao
, Pallavi Kaliyar
, Mauro Conti
:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 55(2): 44:1-44:36 (2023) - 2022
- [j190]Fran Casino
, Thomas K. Dasaklis, Georgios P. Spathoulas
, Marios Anagnostopoulos
, Amrita Ghosal
, István Böröcz, Agusti Solanas
, Mauro Conti
, Constantinos Patsakis
:
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 10: 25464-25493 (2022) - [j189]Reza Mohammadi, Chhagan Lal
, Mauro Conti
, Lokesh Sharma:
Software defined network-based HTTP flooding attack defender. Comput. Electr. Eng. 101: 108019 (2022) - [j188]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. Comput. Networks 206: 108804 (2022) - [j187]Mauro Conti, Eleonora Losiouk, Radha Poovendran, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [j186]Federico Tavella
, Alberto Giaretta
, Mauro Conti
, Sasitharan Balasubramaniam
:
A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Comput. Commun. 187: 59-70 (2022) - [j185]Vasilios Koutsokostas, Nikolaos Lykousas, Theodoros Apostolopoulos, Gabriele Orazi, Amrita Ghosal, Fran Casino, Mauro Conti, Constantinos Patsakis:
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents. Comput. Secur. 114: 102582 (2022) - [j184]Mohamed A. El-Zawawy
, Parvez Faruki, Mauro Conti:
Formal model for inter-component communication and its security in android. Computing 104(8): 1839-1865 (2022) - [j183]Alakesh Kalita
, Alessandro Brighente
, Manas Khatua
, Mauro Conti
:
Effect of DIS Attack on 6TiSCH Network Formation. IEEE Commun. Lett. 26(5): 1190-1193 (2022) - [j182]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Qianmu Li
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Brij Bhooshan Gupta, Mauro Conti
:
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey. IEEE Internet Things J. 9(10): 7639-7663 (2022) - [j181]Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Mritunjay Kumar Rai, Reji Thomas, Rahul Saha, Tai-Hoon Kim:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - [j180]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Mauro Conti
, Jing Zhang
:
Misinformation Detection on Social Media: Challenges and the Road Ahead. IT Prof. 24(1): 34-40 (2022) - [j179]Mauro Conti, Gulshan Kumar
, Pranav Nerurkar, Rahul Saha, Luigi Vigneri
:
A survey on security challenges and solutions in the IOTA. J. Netw. Comput. Appl. 203: 103383 (2022) - [j178]Ashish Kumar, Rahul Saha, Mauro Conti, Gulshan Kumar
, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022) - [j177]Arshdeep Singh, Gulshan Kumar
, Rahul Saha, Mauro Conti
, Mamoun Alazab, Reji Thomas
:
A survey and taxonomy of consensus protocols for blockchains. J. Syst. Archit. 127: 102503 (2022) - [j176]Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 330-366 (2022) - [j175]Meng Li
, Yifei Chen, Shuli Zheng, Donghui Hu
, Chhagan Lal
, Mauro Conti
:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1133-1148 (2022) - [j174]Xuhang Ying
, Giuseppe Bernieri, Mauro Conti
, Linda Bushnell
, Radha Poovendran
:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2665-2679 (2022) - [j173]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
:
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 18(5): 3452-3461 (2022) - [j172]Ding Ding
, Kyuho Jeong, Shuning Xing
, Mauro Conti
, Renato Figueiredo
, Fangai Liu
:
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships. IEEE Trans. Serv. Comput. 15(1): 346-360 (2022) - [c218]Trupil Limbasiya, Amrita Ghosal, Mauro Conti:
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks. ICDCN 2022: 208-216 - [c217]Matteo Cardaioli, Mauro Conti, Pier Paolo Tricomi, Gene Tsudik:
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection. PerCom 2022: 197-206 - [c216]Alessandro Brighente, Martina Camaioni, Mauro Conti, Emilio Olivastri:
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses. PerCom Workshops 2022: 279-284 - [c215]Mauro Conti, Eleonora Losiouk, Alessandro Visintin:
What you see is not what you get: a man-in-the-middle attack applied to video channels. SAC 2022: 1723-1726 - [c214]Pavan Srihari Darbha, Mauro Conti, Eleonora Losiouk, Rajib Ranjan Maiti:
Face Recognition Systems: Are you sure they only consider your face? SP Workshops 2022: 258-264 - [c213]Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti, Preslav Nakov:
The Spread of Propaganda by Coordinated Communities on Social Media. WebSci 2022: 191-201 - [c212]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. WiseML@WiSec 2022: 57-62 - [e12]Weizhi Meng
, Mauro Conti
:
Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings. Lecture Notes in Computer Science 13172, Springer 2022, ISBN 978-3-030-94028-7 [contents] - [i104]Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Captcha Attack: Turning Captchas Against Humanity. CoRR abs/2201.04014 (2022) - [i103]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad:
Detecting High-Quality GAN-Generated Face Images using Neural Networks. CoRR abs/2203.01716 (2022) - [i102]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. CoRR abs/2203.02079 (2022) - [i101]Giovanni Apruzzese, Luca Pajola, Mauro Conti:
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems. CoRR abs/2203.04686 (2022) - [i100]Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin:
EVExchange: A Relay Attack on Electric Vehicle Charging System. CoRR abs/2203.05266 (2022) - [i99]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. CoRR abs/2203.06834 (2022) - [i98]Alessandro Brighente, Mauro Conti, Sathish A. P. Kumar:
Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit. CoRR abs/2203.09843 (2022) - [i97]Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, A. Selcuk Uluagac, Berrin Yanikoglu:
Real or Virtual: A Video Conferencing Background Manipulation-Detection System. CoRR abs/2204.11853 (2022) - [i96]Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. CoRR abs/2204.13172 (2022) - [i95]Alessandro Brighente, Mauro Conti, Hanan Idriss, Stefano Tomasin:
Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy. CoRR abs/2205.02506 (2022) - [i94]Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. CoRR abs/2205.03915 (2022) - [i93]Simone Soderi, Alessandro Brighente, Federico Turrin, Mauro Conti:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. CoRR abs/2205.09026 (2022) - [i92]Tommaso Bianchi, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran:
Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems. CoRR abs/2205.10292 (2022) - [i91]Alessandro Brighente, Mauro Conti, Savio Sciancalepore:
Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles. CoRR abs/2205.13808 (2022) - [i90]Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. CoRR abs/2206.12904 (2022) - [i89]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. CoRR abs/2207.13766 (2022) - [i88]Surudhi Asokraj, Tommaso Bianchi, Alessandro Brighente, Mauro Conti, Radha Poovendran:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. CoRR abs/2208.02857 (2022) - [i87]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs. IACR Cryptol. ePrint Arch. 2022: 721 (2022) - 2021
- [j171]S. Sullivan, Alessandro Brighente
, Sathish A. P. Kumar
, Mauro Conti
:
5G Security Challenges and Solutions: A Review by OSI Layers. IEEE Access 9: 116294-116314 (2021) - [j170]Amrita Ghosal, Sang Uk Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti, Radha Poovendran
, Linda Bushnell:
Truck platoon security: State-of-the-art and road ahead. Comput. Networks 185: 107658 (2021) - [j169]Koosha Mohammad Hossein
, Mohammad Esmaeil Esmaeili, Tooska Dargahi
, Ahmad Khonsari, Mauro Conti
:
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications. Comput. Commun. 180: 31-47 (2021) - [j168]Mohamed A. El-Zawawy
, Eleonora Losiouk
, Mauro Conti
:
Vulnerabilities in Android webview objects: Still not the end! Comput. Secur. 109: 102395 (2021) - [j167]Mauro Conti
, Denis Donadel
, Federico Turrin
:
A Survey on Industrial Control System Testbeds and Datasets for Security Research. IEEE Commun. Surv. Tutorials 23(4): 2248-2294 (2021) - [j166]Zahra Pooranian
, Mauro Conti
, Hamed Haddadi, Rahim Tafazolli
:
Online Advertising Security: Issues, Taxonomy, and Future Directions. IEEE Commun. Surv. Tutorials 23(4): 2494-2524 (2021) - [j165]Aanshi Bhardwaj
, Veenu Mangat, Renu Vig, Subir Halder, Mauro Conti:
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions. Comput. Sci. Rev. 39: 100332 (2021) - [j164]Claudio A. Ardagna
, Mauro Conti, Ernesto Damiani, Chia-Mu Yu:
Editorial: Special issue on trusted Cloud-Edges computations. Future Gener. Comput. Syst. 114: 661-664 (2021) - [j163]Meng Li
, Chhagan Lal, Mauro Conti, Donghui Hu:
LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Gener. Comput. Syst. 115: 406-420 (2021) - [j162]Gulshan Kumar, Rahul Saha, Chhagan Lal, Mauro Conti:
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Gener. Comput. Syst. 120: 13-25 (2021) - [j161]Mohamed A. El-Zawawy
, Eleonora Losiouk
, Mauro Conti:
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps. Int. J. Inf. Sec. 20(1): 39-58 (2021) - [j160]Abdelmadjid Benarfa, Muhammad Hassan
, Eleonora Losiouk
, Alberto Compagno, Mohamed Bachir Yagoubi, Mauro Conti:
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN. Int. J. Inf. Sec. 20(3): 269-285 (2021) - [j159]Neda Maleki
, Amir Masoud Rahmani, Mauro Conti:
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling. J. Netw. Comput. Appl. 176: 102944 (2021) - [j158]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal, Mauro Conti
, Fabio Martinelli:
Privacy for 5G-Supported Vehicular Networks. IEEE Open J. Commun. Soc. 2: 1935-1956 (2021) - [j157]Subir Halder
, Mauro Conti, Sajal K. Das:
A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks. Pervasive Mob. Comput. 73: 101385 (2021) - [j156]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. ACM Trans. Cyber Phys. Syst. 5(1): 1:1-1:2 (2021) - [j155]Yuan-Gen Wang
, Guopu Zhu
, Jin Li
, Mauro Conti
, Jiwu Huang
:
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole. IEEE Trans. Circuits Syst. Video Technol. 31(1): 76-87 (2021) - [j154]Reza Mohammadi
, Amin Nazari, Mohammad Nassiri, Mauro Conti:
An SDN-based framework for QoS routing in internet of underwater things. Telecommun. Syst. 78(2): 253-266 (2021) - [j153]Federico Tavella
, Alberto Giaretta
, Triona Marie Dooley-Cullinane
, Mauro Conti
, Lee Coffey
, Sasitharan Balasubramaniam
:
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Trans. Emerg. Top. Comput. 9(3): 1566-1580 (2021) - [j152]Nagarathna Ravi
, S. Mercy Shalinie
, Chhagan Lal
, Mauro Conti
:
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller. IEEE Trans. Netw. Serv. Manag. 18(1): 745-759 (2021) - [j151]Andrea Agiollo
, Mauro Conti
, Pallavi Kaliyar
, Tsung-Nan Lin
, Luca Pajola
:
DETONAR: Detection of Routing Attacks in RPL-Based IoT. IEEE Trans. Netw. Serv. Manag. 18(2): 1178-1190 (2021) - [j150]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain. IEEE Trans. Netw. Serv. Manag. 18(4): 4434-4449 (2021) - [j149]Habib Mostafaei
, Mohammad Shojafar
, Mauro Conti
:
TEL: Low-Latency Failover Traffic Engineering in Data Plane. IEEE Trans. Netw. Serv. Manag. 18(4): 4697-4710 (2021) - [j148]Giuseppe Bianchi
, Mauro Conti, Tooska Dargahi, Ali Dehghantanha
:
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence. IEEE Trans. Sustain. Comput. 6(2): 182-183 (2021) - [c211]Flavio Toffalini, Mariano Graziano, Mauro Conti, Jianying Zhou:
SnakeGX: A Sneaky Attack Against SGX Enclaves. ACNS (1) 2021: 333-362 - [c210]Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo:
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization. ACSAC 2021: 970-981 - [c209]Rahul Saha, Gulshan Kumar, Alessandro Brighente, Mauro Conti:
Towards An Enhanced Reputation System for IOTA's Coordicide. BCCA 2021: 26-33 - [c208]Alessandro Brighente, Mauro Conti, Gulshan Kumar, Reza Ghanbari, Rahul Saha:
Knocking on Tangle's Doors: Security Analysis of IOTA Ports. Blockchain 2021: 433-439 - [c207]Yassine Mekdad
, Giuseppe Bernieri, Mauro Conti, Abdeslam El Fergougui:
A threat model method for ICS malware: the TRISIS case. CF 2021: 221-228 - [c206]Marco Casagrande
, Mauro Conti, Eleonora Losiouk:
Contact Tracing Made Un-relay-able. CODASPY 2021: 221-232 - [c205]Luca Attanasio, Mauro Conti, Denis Donadel, Federico Turrin
:
MiniV2G: An Electric Vehicle Charging Emulator. CPSS@AsiaCCS 2021: 65-73 - [c204]Oguzhan Ersoy, Ziya Alper Genç, Zekeriya Erkin
, Mauro Conti:
Practical Exchange for Unique Digital Goods. DAPPS 2021: 49-58 - [c203]Mauro Conti, P. Vinod, Pier Paolo Tricomi:
Secure Static Content Delivery for CDN Using Blockchain Technology. DPM/CBT@ESORICS 2021: 301-309 - [c202]Yassine Mekdad, Giuseppe Bernieri, Mauro Conti, Abdeslam El Fergougui:
The Rise of ICS Malware: A Comparative Analysis. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 496-511 - [c201]Alessandro Brighente, Mauro Conti, Izza Sadaf:
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand. ESORICS (1) 2021: 651-667 - [c200]Luca Pajola, Mauro Conti:
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. EuroS&P 2021: 198-211 - [c199]Daniele Mari
, Samuele Giuliano Piazzetta, Sara Bordin, Luca Pajola, Sebastiano Verde
, Simone Milani, Mauro Conti:
Looking Through Walls: Inferring Scenes from Video-Surveillance Encrypted Traffic. ICASSP 2021: 2595-2599 - [c198]Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin
:
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis. ICCCN 2021: 1-9 - [c197]Matteo Cardaioli, Mauro Conti, Andrea Di Sorbo
, Enrico Fabrizio, Sonia Laudanna, Corrado Aaron Visaggio:
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency. ICCCN 2021: 1-9 - [c196]Anas Alsoliman, Giulio Rigoni, Marco Levorato, Cristina M. Pinotti, Nils Ole Tippenhauer, Mauro Conti:
COTS Drone Detection using Video Streaming Characteristics. ICDCN 2021: 166-175 - [c195]Matteo Cardaioli, Stefano Cecconello, Merylin Monaro, Giuseppe Sartori, Mauro Conti, Graziella Orrù:
Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests. ICONIP (6) 2021: 433-440 - [c194]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
ICN PATTA: ICN Privacy Attack Through Traffic Analysis. LCN 2021: 443-446 - [c193]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. IEEE Symposium on Security and Privacy 2021: 1382-1399 - [c192]Yifei Chen, Meng Li, Shuli Zheng, Chhagan Lal, Mauro Conti:
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services. STM 2021: 43-61 - [c191]Mohamad Mansouri, Wafa Ben Jaballah, Melek Önen, Md Masoom Rabbani
, Mauro Conti:
FADIA: fairness-driven collaborative remote attestation. WISEC 2021: 60-71 - [e11]Mauro Conti
, Marc Stevens
, Stephan Krenn
:
Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings. Lecture Notes in Computer Science 13099, Springer 2021, ISBN 978-3-030-92547-5 [contents] - [e10]Jiannong Cao, Man Ho Au, Mauro Conti, Nils Ole Tippenhauer, Alessandro Brighente:
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021. ACM 2021, ISBN 978-1-4503-8402-5 [contents] - [i86]Luca Attanasio, Mauro Conti, Denis Donadel, Federico Turrin:
MiniV2G: An Electric Vehicle Charging Emulator. CoRR abs/2101.11720 (2021) - [i85]Mauro Conti, Denis Donadel
, Federico Turrin:
A Survey on Industrial Control System Testbeds and Datasets for Security Research. CoRR abs/2102.05631 (2021) - [i84]Francesco Betti Sorbelli, Mauro Conti, Cristina M. Pinotti, Giulio Rigoni:
UAVs Path Deviation Attacks: Survey and Research Challenges. CoRR abs/2102.06638 (2021) - [i83]Luca Pajola, Mauro Conti:
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. CoRR abs/2104.05996 (2021) - [i82]Gabriele Etta, Matteo Cinelli, Alessandro Galeazzi, Carlo Michele Valensise, Mauro Conti, Walter Quattrociocchi:
News consumption and social media regulations policy. CoRR abs/2106.03924 (2021) - [i81]Mauro Conti, Simone Milani, Ehsan Nowroozi, Gabriele Orazi:
Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System. CoRR abs/2106.15130 (2021) - [i80]Alessandro Brighente, Mauro Conti, Denis Donadel
, Federico Turrin:
EVScout2.0: Electric Vehicle Profiling Through Charging Profile. CoRR abs/2106.16016 (2021) - [i79]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers. CoRR abs/2107.14569 (2021) - [i78]Fran Casino, Tom K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, István Böröcz, Agusti Solanas, Mauro Conti, Constantinos Patsakis:
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics. CoRR abs/2108.04634 (2021) - [i77]Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti, Preslav Nakov:
The Spread of Propaganda by Coordinated Communities on Social Media. CoRR abs/2109.13046 (2021) - [i76]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues of UAVs. CoRR abs/2109.14442 (2021) - [i75]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Abdeslam El Fergougui:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. CoRR abs/2110.04488 (2021) - [i74]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. CoRR abs/2110.08113 (2021) - 2020
- [j147]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020) - [j146]Mauro Conti, Pallavi Kaliyar, Md Masoom Rabbani
, Silvio Ranise:
Attestation-enabled secure and scalable routing protocol for IoT networks. Ad Hoc Networks 98 (2020) - [j145]Rahim Taheri
, Reza Javidan, Mohammad Shojafar
, P. Vinod, Mauro Conti:
Can machine learning model with static features be fooled: an adversarial machine learning approach. Clust. Comput. 23(4): 3233-3253 (2020) - [j144]Amrita Ghosal, Mauro Conti:
Security issues and challenges in V2X: A Survey. Comput. Networks 169: 107093 (2020) - [j143]Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
Security and design requirements for software-defined VANETs. Comput. Networks 169: 107099 (2020) - [j142]Muhammad Hassan
, Mauro Conti, Chhagan Lal
:
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN. Comput. Networks 174: 107222 (2020) - [j141]Subir Halder, Amrita Ghosal, Mauro Conti:
Secure over-the-air software updates in connected vehicles: A survey. Comput. Networks 178: 107343 (2020) - [j140]Giuseppe Bernieri, Stefano Cecconello, Mauro Conti, Gianluca Lain:
TAMBUS: A novel authentication method through covert channels for securing industrial networks. Comput. Networks 183: 107583 (2020) - [j139]Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti:
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Comput. Commun. 154: 148-159 (2020) - [j138]Mohammad Hadi Alaeiyan
, Saeed Parsa, Vinod P, Mauro Conti:
Detection of algorithmically-generated domains: An adversarial machine learning approach. Comput. Commun. 160: 661-673 (2020) - [j137]Mauro Conti
, Chhagan Lal
:
Context-based Co-presence detection techniques: A survey. Comput. Secur. 88 (2020) - [j136]Pallavi Kaliyar
, Wafa Ben Jaballah, Mauro Conti
, Chhagan Lal
:
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Comput. Secur. 94: 101849 (2020) - [j135]