


default search action
Mauro Conti
Person information
- affiliation: University of Padua, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j308]Amandeep Verma, Rahul Saha
, Gulshan Kumar
, Alessandro Brighente
, Mauro Conti
, Tai-Hoon Kim
:
Exploring the Landscape of Programming Language Identification With Machine Learning Approaches. IEEE Access 13: 23556-23579 (2025) - [j307]Jahez Abraham Johny
, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti
:
Deep learning fusion for effective malware detection: leveraging visual features. Clust. Comput. 28(2): 135 (2025) - [j306]Ying Yuan
, Giovanni Apruzzese
, Mauro Conti
:
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection. Comput. Secur. 148: 104115 (2025) - [j305]Milad Taleby Ahvanooey
, Wojciech Mazurczyk, Jun Zhao
, Luca Caviglione
, Kim-Kwang Raymond Choo
, Max Kilger, Mauro Conti
, Rafael Misoczki:
Future of cyberspace: A critical review of standard security protocols in the post-quantum era. Comput. Sci. Rev. 57: 100738 (2025) - [j304]Dincy R. Arikkat
, Mert Cihangiroglu
, Mauro Conti
, Rafidha Rehiman K. A.
, Serena Nicolazzo
, Antonino Nocera
, P. Vinod:
SeCTIS: A framework to Secure CTI Sharing. Future Gener. Comput. Syst. 164: 107562 (2025) - [j303]K. M. Sameera, Arnaldo Sgueglia
, P. Vinod
, Rafidha Rehiman K. A.
, Corrado Aaron Visaggio
, Andrea Di Sorbo
, Mauro Conti:
SecDefender: Detecting low-quality models in multidomain federated learning systems. Future Gener. Comput. Syst. 164: 107587 (2025) - [j302]Mohamed A. El-Zawawy
, Harsha Vasudev, Mauro Conti
:
BDMFA: Forensic-enabling attestation technique for Internet of Medical Things. Internet Things 29: 101464 (2025) - [j301]Jiaxin Li
, Marco Arazzi
, Antonino Nocera
, Mauro Conti
:
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning. J. Inf. Secur. Appl. 90: 104034 (2025) - [j300]Matteo Brosolo
, Vinod P., Mauro Conti
:
Through the static: Demystifying malware visualization via explainability. J. Inf. Secur. Appl. 91: 104063 (2025) - [j299]K. A. Asmitha, P. Vinod, Rafidha Rehiman K. A.
, Neeraj Raveendran, Mauro Conti
:
Android malware defense through a hybrid multi-modal approach. J. Netw. Comput. Appl. 233: 104035 (2025) - [j298]Florine W. Dekker, Zekeriya Erkin
, Mauro Conti
:
Topology-Based Reconstruction Prevention for Decentralised Learning. Proc. Priv. Enhancing Technol. 2025(1): 553-566 (2025) - [j297]Surudhi Asokraj, Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. IEEE Trans. Dependable Secur. Comput. 22(3): 2492-2504 (2025) - [j296]Meng Li, Yifei Chen
, Jianbo Gao
, Jingyu Wu, Zijian Zhang
, Jialing He
, Liehuang Zhu, Mauro Conti
, Xiaodong Lin:
Accurate, Secure, and Efficient Semi-Constrained Navigation Over Encrypted City Maps. IEEE Trans. Dependable Secur. Comput. 22(3): 2642-2658 (2025) - [j295]Yizhong Liu, Peiyuan Li, Dongyu Li, Chengqi Wu, Nan Jiang, Qianhong Wu, Ankit Gangwal, Prayag Tiwari, Mauro Conti
:
SharHSC: A Sharding-Based Hybrid State Channel to Realize Blockchain Scalability and Security. IEEE Trans. Dependable Secur. Comput. 22(3): 2705-2722 (2025) - [j294]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Joel J. P. C. Rodrigues
:
TAURITE: Stackelberg Equilibrium in Blockchained Energynet Through Electric Vehicles. IEEE Trans. Intell. Transp. Syst. 26(3): 4122-4139 (2025) - [j293]Fatemeh Najafi
, Masoud Kaveh
, Mohammad Reza Mosavi
, Alessandro Brighente
, Mauro Conti
:
EPUF: An Entropy-Derived Latency-Based DRAM Physical Unclonable Function for Lightweight Authentication in Internet of Things. IEEE Trans. Mob. Comput. 24(3): 2422-2436 (2025) - [j292]Ehsan Nowroozi
, Imran Haider, Rahim Taheri
, Mauro Conti
:
Federated Learning Under Attack: Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 22(1): 822-831 (2025) - [j291]Lulu Wang
, Mirko Polato
, Alessandro Brighente
, Mauro Conti
, Lei Zhang
, Lin Xu
:
PriVeriFL: Privacy-Preserving and Aggregation-Verifiable Federated Learning. IEEE Trans. Serv. Comput. 18(2): 998-1011 (2025) - [c325]Luca Pajola, Saskia Laura Schröer, Pier Paolo Tricomi, Mauro Conti, Giovanni Apruzzese:
Elephant in the Room: Dissecting and Reflecting on the Evolution of Online Social Network Research. ICWSM 2025: 1436-1452 - [c324]Derin Cayir, Reham Mohamed Aburas, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z. Berkay Celik, A. Selcuk Uluagac:
Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors. NDSS 2025 - [c323]Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, Mauro Conti:
Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead. NDSS 2025 - [c322]Martina Soleti, Ankit Gangwal, Mauro Conti
:
Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints. SAC 2025: 376-385 - [c321]Marco Simoni
, Andrea Saracino
, Vinod P
, Mauro Conti
:
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation. SAC 2025: 1213-1222 - [c320]Alessandro Brighente
, Mauro Conti
, Savio Sciancalepore
, Harshul Vaishnav
:
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures. SAC 2025: 1560-1569 - [c319]Menno Bezema, Alessandro Brighente
, Mauro Conti
, Luca Cosuti
:
BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying Behavior. SAC 2025: 1580-1589 - [c318]Alessandro Corsi, Savas Gür, Alessandro Brighente, Mauro Conti:
Evaluation of Post-Quantum Key Encapsulation Methods in 5G Core Network. WCNC 2025: 1-6 - [c317]Cinthya Celina Tamayo Gonzalez, Simone Soderi, Julian Todt, Thorsten Strufe, Mauro Conti:
Inferring Personal Attributes with a Mmwave Radar. WCNC 2025: 1-6 - [c316]Harsha Vasudev, Alessandro Brighente, Mauro Conti:
$L^{2}S^{2}C^{2}$: Lattice-based Lightweight Scheme for Secure Communication in Controller Area Networks. WCNC 2025: 1-6 - [i192]Ankit Gangwal, Mauro Conti, Tommaso Pauselli:
KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. CoRR abs/2501.06729 (2025) - [i191]Emad Efatinasab, Alessandro Brighente, Denis Donadel, Mauro Conti, Mirco Rampazzo:
Towards Robust Stability Prediction in Smart Grids: GAN-based Approach under Data Constraints and Adversarial Challenges. CoRR abs/2501.16490 (2025) - [i190]Riccardo Petrucci, Luca Pajola, Francesco Marchiori, Luca Pasa, Mauro Conti:
Moshi Moshi? A Model Selection Hijacking Adversarial Attack. CoRR abs/2502.14586 (2025) - [i189]Matteo Brosolo, Vinod Puthuvath, Mauro Conti:
The Road Less Traveled: Investigating Robustness and Explainability in CNN Malware Detection. CoRR abs/2503.01391 (2025) - [i188]Matteo Brosolo, Vinod Puthuvath, Mauro Conti:
Through the Static: Demystifying Malware Visualization via Explainability. CoRR abs/2503.02441 (2025) - [i187]Francesco Marchiori, Mauro Conti:
Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. CoRR abs/2503.08956 (2025) - [i186]Dincy R. Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti:
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence. CoRR abs/2503.15866 (2025) - [i185]Saverio Cavasin, Pietro Biasetton, Mattia Tamiazzo, Mauro Conti, Simone Milani:
TeLL Me what you cant see. CoRR abs/2503.19478 (2025) - [i184]K. M. Sameera, P. Vinod, Anderson Rocha, Rafidha Rehiman K. A., Mauro Conti:
WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems. CoRR abs/2504.04367 (2025) - [i183]Florine W. Dekker, Zekeriya Erkin
, Mauro Conti
:
Optimal Graph Stretching for Distributed Averaging. CoRR abs/2504.10289 (2025) - [i182]Francesco Marchiori, Denis Donadel, Mauro Conti:
Can LLMs Classify CVEs? Investigating LLMs Capabilities in Computing CVSS Vectors. CoRR abs/2504.10713 (2025) - [i181]Mauro Conti, Francesco Marchiori, Sebastiano Matarazzo, Marco Rubin:
PQ-CAN: A Framework for Simulating Post-Quantum Cryptography in Embedded Systems. CoRR abs/2504.10730 (2025) - [i180]Gulshan Kumar, Rahul Saha, Mauro Conti, William J. Buchanan:
LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IACR Cryptol. ePrint Arch. 2025: 752 (2025) - 2024
- [j290]Ankit Gangwal
, Aashish Paliwal
, Mauro Conti
:
De-Authentication Using Ambient Light Sensor. IEEE Access 12: 28225-28234 (2024) - [j289]Amandeep Verma, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. IEEE Access 12: 48301-48320 (2024) - [j288]Avantika Gaur, Preeti Mishra
, Vinod P., Arjun Singh, Vijay Varadharajan, Uday Kiran Tupakula, Mauro Conti:
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment. Comput. Electr. Eng. 120: 109742 (2024) - [j287]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti
, Reji Thomas, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Clust. Comput. 27(3): 2691-2713 (2024) - [j286]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti
:
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. Clust. Comput. 27(4): 4823-4839 (2024) - [j285]Arjun Singh, Preeti Mishra
, P. Vinod, Avantika Gaur, Mauro Conti
:
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection. Clust. Comput. 27(7): 9757-9782 (2024) - [j284]PLS Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti
:
MADESANT: malware detection and severity analysis in industrial environments. Clust. Comput. 27(8): 11347-11367 (2024) - [j283]Vaishali A. Shirsath
, Madhav Chandane, Chhagan Lal, Mauro Conti
:
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy. Comput. Networks 244: 110327 (2024) - [j282]Mohd Shariq, Mauro Conti
, Karan Singh, Chhagan Lal
, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Mehedi Masud:
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing. Comput. Networks 252: 110678 (2024) - [j281]K. M. Sameera
, Vinod P., Rafidha Rehiman K. A.
, Mauro Conti
:
LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network. Comput. Networks 254: 110768 (2024) - [j280]Vaishali A. Shirsath
, Madhav Chandane, Chhagan Lal, Mauro Conti
:
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches. Comput. Commun. 216: 283-294 (2024) - [j279]Amandeep Verma
, Rahul Saha
, Gulshan Kumar, Mauro Conti
:
PETRAK: A solution against DDoS attacks in vehicular networks. Comput. Commun. 221: 142-154 (2024) - [j278]K. M. Sameera, Serena Nicolazzo
, Marco Arazzi, Antonino Nocera
, Rafidha Rehiman K. A., Vinod P., Mauro Conti
:
Privacy-preserving in Blockchain-based Federated Learning systems. Comput. Commun. 222: 38-67 (2024) - [j277]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A.
, Serena Nicolazzo
, Antonino Nocera
, Georgiana Timpau, Mauro Conti
:
OSTIS: A novel Organization-Specific Threat Intelligence System. Comput. Secur. 145: 103990 (2024) - [j276]Ying Yuan
, Giovanni Apruzzese
, Mauro Conti
:
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning. DTRAP 5(2): 16:1-16:51 (2024) - [j275]Luca Pajola
, Mauro Conti
:
Lights Toward Adversarial Machine Learning: The Achilles Heel of Artificial Intelligence. IEEE Intell. Syst. 39(5): 20-24 (2024) - [j274]Andrea Agiollo, Enkeleda Bardhi
, Mauro Conti
, Nicolò Dal Fabbro
, Riccardo Lazzeretti:
Anonymous Federated Learning via Named-Data Networking. Future Gener. Comput. Syst. 152: 288-303 (2024) - [j273]Andrea De Salve
, Alessandro Brighente
, Mauro Conti
:
EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction. Future Gener. Comput. Syst. 154: 413-425 (2024) - [j272]Derin Cayir
, Abbas Acar
, Riccardo Lazzeretti
, Marco Angelini
, Mauro Conti
, A. Selcuk Uluagac
:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. IEEE Secur. Priv. 22(1): 10-23 (2024) - [j271]Gulshan Kumar
, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Reji Thomas:
GREPHRO: Nature-inspired optimization duo for Internet-of-Things. Internet Things 25: 101067 (2024) - [j270]Alessandro Brighente
, Mauro Conti
, Gabriele Di Renzone
, Giacomo Peruzzi
, Alessandro Pozzebon
:
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective. IEEE Internet Things J. 11(5): 7309-7324 (2024) - [j269]Jin Han
, Ran Cao
, Alessandro Brighente
, Mauro Conti
:
Light-YOLOv5: A Lightweight Drone Detector for Resource-Constrained Cameras. IEEE Internet Things J. 11(6): 11046-11057 (2024) - [j268]Khalid Mahmood
, Mohammad S. Obaidat
, Salman Shamshad
, Mohammed J. F. Alenazi
, Gulshan Kumar
, Mohammad Hossein Anisi
, Mauro Conti
:
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT). IEEE Internet Things J. 11(13): 23977-23984 (2024) - [j267]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks. IEEE Internet Things J. 11(15): 26104-26117 (2024) - [j266]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Rabeeba Abdul Rasheed, Mauro Conti
:
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis. J. Netw. Syst. Manag. 32(4): 88 (2024) - [j265]Ehsan Nowroozi
, Yoosef Habibi
, Mauro Conti
:
SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents. Multim. Tools Appl. 83(26): 67795-67823 (2024) - [j264]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti
:
Is AI a Trick or T(h)reat for Securing Programmable Data Planes? IEEE Netw. 38(6): 146-152 (2024) - [j263]Saverio Cavasin, Daniele Mari, Simone Milani, Mauro Conti
:
Fingerprint membership and identity inference against generative adversarial networks. Pattern Recognit. Lett. 185: 184-189 (2024) - [j262]Yassine Mekdad
, Ahmet Aris, Abbas Acar
, Mauro Conti
, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024) - [j261]Alessandro Brighente
, Mauro Conti
, Denis Donadel
, Federico Turrin
:
EVScout2.0: Electric Vehicle Profiling through Charging Profile. ACM Trans. Cyber Phys. Syst. 8(2): 11 (2024) - [j260]Rahul Saha
, Gulshan Kumar
, G. Geetha
, Mauro Conti
, William J. Buchanan
:
Application of Randomness for Security and Privacy in Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 21(6): 5694-5705 (2024) - [j259]Jin Han
, Yun-Feng Ren
, Alessandro Brighente
, Mauro Conti
:
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems. ACM Trans. Intell. Syst. Technol. 15(2): 31:1-31:21 (2024) - [j258]Giuseppe Cascavilla
, Gemma Catolino
, Mauro Conti
, Dimos Mellios
, Damian A. Tamburri
:
Few Images, Many Insights: Illicit Content Detection Using a Limited Number of Images. ACM Trans. Intell. Syst. Technol. 15(6): 130:1-130:26 (2024) - [j257]Mohamed A. El-Zawawy
, Chhagan Lal
, Mauro Conti
:
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 25(2): 2017-2033 (2024) - [j256]Yanan Zhao
, Haiyang Yu
, Yuhao Liang, Mauro Conti
, Wael Bazzi
, Yilong Ren
:
A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 25(3): 2956-2965 (2024) - [j255]Yanan Zhao
, Haiyang Yu
, Yuhao Liang, Alessandro Brighente
, Mauro Conti
, Jianfei Sun
, Yilong Ren
:
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon. IEEE Trans. Intell. Transp. Syst. 25(5): 3671-3684 (2024) - [j254]Meng Li
, Yanzhe Shen
, Guixin Ye
, Jialing He
, Xin Zheng
, Zijian Zhang
, Liehuang Zhu
, Mauro Conti
:
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics. IEEE Trans. Knowl. Data Eng. 36(5): 1874-1888 (2024) - [j253]Meng Li
, Mingwei Zhang
, Liehuang Zhu
, Zijian Zhang
, Mauro Conti
, Mamoun Alazab
:
Decentralized and Privacy-Preserving Smart Parking With Secure Repetition and Full Verifiability. IEEE Trans. Mob. Comput. 23(12): 11635-11654 (2024) - [j252]Simone Soderi
, Alessandro Brighente
, Saiqin Xu
, Mauro Conti
:
Multi-RIS Aided VLC Physical Layer Security for 6G Wireless Networks. IEEE Trans. Mob. Comput. 23(12): 15182-15195 (2024) - [j251]Himani Sikarwar
, Harsha Vasudev
, Debasis Das
, Mauro Conti
, Koustav Kumar Mondal
:
SECURE: Secure and Efficient Protocol Using Randomness and Edge-Computing for Drone-Assisted Internet of Vehicles. IEEE Trans. Netw. Serv. Manag. 21(6): 6974-6988 (2024) - [j250]Amit Kumar Singh
, Deepa Kundur
, Mauro Conti
:
Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 151:1-151:4 (2024) - [j249]Ehsan Nowroozi
, Mohammadreza Mohammadi
, Pargol Golmohammadi, Yassine Mekdad
, Mauro Conti
, A. Selcuk Uluagac
:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. IEEE Trans. Serv. Comput. 17(1): 18-29 (2024) - [j248]Meng Li
, Jianbo Gao
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
:
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud. IEEE Trans. Serv. Comput. 17(3): 1239-1251 (2024) - [j247]Miao He
, Jianbing Ni
, Meng Li
, Alessandro Brighente
, Mauro Conti
:
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach. IEEE Trans. Wirel. Commun. 23(1): 276-289 (2024) - [j246]Amandeep Verma, Rahul Saha
, Gulshan Kumar, Mauro Conti
, Joel J. P. C. Rodrigues:
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments. Veh. Commun. 48: 100787 (2024) - [j245]Saiqin Xu
, Alessandro Brighente
, Mauro Conti
, Baixiao Chen
, Shuo Wang
:
Evaporative Angle: A Generative Approach to Mitigate Jamming Attacks in DOA Estimation. IEEE Wirel. Commun. Lett. 13(10): 2922-2926 (2024) - [c315]Matteo Brosolo
, Vinod Puthuvath
, Asmitha KA
, Rafidha Rehiman K. A.
, Mauro Conti
:
SoK: Visualization-based Malware Detection Techniques. ARES 2024: 45:1-45:13 - [c314]Meng Li, Hanni Ding, Qing Wang, Zijian Zhang, Mauro Conti
:
Threshold Signatures with Private Accountability via Secretly Designated Witnesses. ACISP (1) 2024: 389-407 - [c313]Alessandro Brighente
, Mauro Conti
, Sitora Salaeva
, Federico Turrin
:
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection. ACNS Workshops (2) 2024: 55-74 - [c312]Edoardo Liberati
, Alessandro Visintin
, Riccardo Lazzeretti
, Mauro Conti
, A. Selcuk Uluagac
:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. ACNS (1) 2024: 183-210 - [c311]Coen Schoof
, Stefanos Koffas
, Mauro Conti
, Stjepan Picek
:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. AISec@CCS 2024: 137-148 - [c310]Alberto Castagnaro
, Mauro Conti
, Luca Pajola
:
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models. AISec@CCS 2024: 184-195 - [c309]Archana Chhabra, Rahul Saha, Mauro Conti
:
PITCOR: Privacy-assured Time-controlled Revocation in Blockchain Transactions. BCCA 2024: 141-148 - [c308]Tannishtha Devgun, Gulshan Kumar, Mauro Conti:
FASALKA: Offloaded Privacy Classification for Blockchain Smart Contracts. BCCA 2024: 204-210 - [c307]Mauro Conti
, Marin Duroyon, Gabriele Orazi, Gene Tsudik:
Acoustic Side-Channel Attacks on a Computer Mouse. DIMVA 2024: 44-63 - [c306]Emad Efatinasab
, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti
:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. DIMVA 2024: 503-524 - [c305]Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti
:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. ESORICS (1) 2024: 374-393 - [c304]Mirco Beltrame, Mauro Conti
, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. ESORICS (2) 2024: 451-470 - [c303]Alessandro Brighente, Mauro Conti
, Denis Donadel, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. EuroS&P Workshops 2024: 352-360 - [c302]Francesco Marchiori, Alessandro Brighente, Mauro Conti
:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? EuroS&P Workshops 2024: 367-372 - [c301]Filippo Giambartolomei, Marc Barcelo, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. ICC 2024: 702-707 - [c300]Meng Li, Jianbo Gao, Zijian Zhang, Mauro Conti
, Mamoun Alazab:
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets. ICC 2024: 1376-1381 - [c299]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui
, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. ICC 2024: 1939-1944 - [c298]Alessandro Brighente, Saiqin Xu, Simone Soderi, Mauro Conti:
Physical Layer Authentication for Distributed RIS (DRIS) Enabled VLC Systems. ICC 2024: 3340-3345 - [c297]Harsha Vasudev
, Mohd Shariq
, Sanjeev Kumar Dwivedi
, Mauro Conti
:
LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles. ICDCN 2024: 209-216 - [c296]Mauro Conti:
Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies. ICISSP 2024: 7 - [c295]Pier Paolo Tricomi, Saurabh Kumar
, Mauro Conti, V. S. Subrahmanian:
Climbing the Influence Tiers on TikTok: A Multimodal Study. ICWSM 2024: 1503-1516 - [c294]Felix Klement
, Alessandro Brighente, Michele Polese, Mauro Conti
, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. NetSoft 2024: 185-189 - [c293]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera
, Mauro Conti:
Relation Extraction Techniques in Cyber Threat Intelligence. NLDB (1) 2024: 348-363 - [c292]Attila Mester
, Zalán Bodó
, P. Vinod
, Mauro Conti
:
Towards a Malware Family Classification Model Using Static Call Graph Instruction Visualization. NSS 2024: 167-186 - [c291]Kavya Balasubramanian
, Adithya Gowda Baragur
, Denis Donadel
, Dinuka Sahabandu
, Alessandro Brighente
, Bhaskar Ramasubramanian
, Mauro Conti
, Radha Poovendran
:
CANLP: NLP-Based Intrusion Detection System for CAN. SAC 2024: 212-214 - [c290]Jelle Vos, Mauro Conti
, Zekeriya Erkin
:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. SP 2024: 465-483 - [c289]K. M. Sameera, M. Abhinav, P. P. Amal
, T. Babu Abhiram, Raj K. Abishek
, Tomichen Amal, P. Anaina, P. Vinod
, Rafidha Rehiman K. A.
, Mauro Conti
:
DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated Learning. SPACE 2024: 129-148 - [c288]Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang:
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors. USENIX Security Symposium 2024 - [c287]Marco Palazzo, Florine W. Dekker
, Alessandro Brighente, Mauro Conti, Zekeriya Erkin:
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries. USENIX Security Symposium 2024 - [c286]Jelle Vos
, Mauro Conti
, Zekeriya Erkin
:
Oraqle: A Depth-Aware Secure Computation Compiler. WAHC@CCS 2024: 43-50 - [c285]Daniele Mari, Saverio Cavasin, Simone Milani, Mauro Conti
:
Effectiveness of learning-based image codecs on fingerprint storage. WIFS 2024: 1-6 - [c284]Giacomo Quadrio, Roberto Pompa, Enrico Bassetti, Ciro D'Elia, Gianluca Scacco, Mauro Conti:
"They Will Adapt": Improving Anomaly Detection on IoT Networks Through Continuous Learning. WiMob 2024: 1-6 - [c283]Giulio Rigoni
, Nicola Scremin, Mauro Conti:
Towards a Self-Rescuing System for UAVs Under GNSS Attack. WiMob 2024: 339-346 - [c282]Christina Kreza
, Stefanos Koffas
, Behrad Tajalli
, Mauro Conti
, Stjepan Picek
:
Backdoors on Manifold Learning. WiseML@WiSec 2024: 1-7 - [c281]Francesco Marchiori
, Mauro Conti
:
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. WiseML@WiSec 2024: 8-13 - [c280]Coen Schoof
, Stefanos Koffas
, Mauro Conti
, Stjepan Picek
:
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models. WiseML@WiSec 2024: 14-19 - [c279]Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. WISEC 2024: 174-184 - [c278]Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti:
"All of Me": Mining Users' Attributes from their Public Spotify Playlists. WWW (Companion Volume) 2024: 963-966 - [c277]Ying Yuan
, Qingying Hao
, Giovanni Apruzzese
, Mauro Conti
, Gang Wang
:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. WWW 2024: 1712-1723 - [e17]Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14344, Springer 2024, ISBN 978-3-031-50593-5 [contents] - [e16]Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14345, Springer 2024, ISBN 978-3-031-51475-3 [contents] - [e15]Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14346, Springer 2024, ISBN 978-3-031-51478-4 [contents] - [e14]Gene Tsudik, Mauro Conti
, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14347, Springer 2024, ISBN 978-3-031-51481-4 [contents] - [e13]Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3 [contents] - [i179]K. M. Sameera, Serena Nicolazzo, Marco Arazzi, Antonino Nocera
, Rafidha Rehiman K. A., Vinod P, Mauro Conti:
Privacy-Preserving in Blockchain-based Federated Learning Systems. CoRR abs/2401.03552 (2024) - [i178]Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti:
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols. CoRR abs/2401.10736 (2024) - [i177]Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti:
"All of Me": Mining Users' Attributes from their Public Spotify Playlists. CoRR abs/2401.14296 (2024) - [i176]Carlo Mazzocca, Abbas Acar, A. Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, Mauro Conti:
A Survey on Decentralized Identifiers and Verifiable Credentials. CoRR abs/2402.02455 (2024) - [i175]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. CoRR abs/2402.03114 (2024) - [i174]Filippo Giambartolomei, Marc Barceló Lladó, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. CoRR abs/2403.01871 (2024) - [i173]Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti:
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks. CoRR abs/2403.02983 (2024) - [i172]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. CoRR abs/2403.03858 (2024) - [i171]Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. CoRR abs/2403.17494 (2024) - [i170]Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. CoRR abs/2404.02832 (2024) - [i169]Francesco Marchiori, Mauro Conti:
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. CoRR abs/2404.04648 (2024) - [i168]Denis Donadel, Francesco Marchiori, Luca Pajola, Mauro Conti:
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator. CoRR abs/2404.12689 (2024) - [i167]Mirco Beltrame, Mauro Conti, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. CoRR abs/2404.12991 (2024) - [i166]Alberto Castagnaro, Mauro Conti, Luca Pajola:
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models. CoRR abs/2404.14138 (2024) - [i165]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. CoRR abs/2405.01888 (2024) - [i164]Francesco Marchiori, Alessandro Brighente, Mauro Conti:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? CoRR abs/2405.08466 (2024) - [i163]Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. CoRR abs/2405.12076 (2024) - [i162]Jahez Abraham Johny, Vinod P., K. A. Asmitha, Radhamani G, Rafidha Rehiman K. A., Mauro Conti:
Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features. CoRR abs/2405.14311 (2024) - [i161]Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera
, Vinod P:
SeCTIS: A Framework to Secure CTI Sharing. CoRR abs/2406.14102 (2024) - [i160]Saverio Cavasin, Daniele Mari, Simone Milani, Mauro Conti:
Fingerprint Membership and Identity Inference Against Generative Adversarial Networks. CoRR abs/2406.15253 (2024) - [i159]Tommaso Bianchi
, Alessandro Brighente, Mauro Conti, Andrea Valori:
Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data. CoRR abs/2407.00585 (2024) - [i158]Alessandro Brighente, Mauro Conti, Matthijs Schotsman, Savio Sciancalepore:
Obfuscated Location Disclosure for Remote ID Enabled Drones. CoRR abs/2407.14256 (2024) - [i157]Marco Simoni, Andrea Saracino, Vinod P., Mauro Conti:
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation. CoRR abs/2407.15748 (2024) - [i156]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. CoRR abs/2408.01178 (2024) - [i155]Giacomo Benedetti
, Serena Cofano, Alessandro Brighente, Mauro Conti:
The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach. CoRR abs/2409.06390 (2024) - [i154]Daniele Mari, Saverio Cavasin, Simone Milani, Mauro Conti:
Effectiveness of learning-based image codecs on fingerprint storage. CoRR abs/2409.18730 (2024) - [i153]Jiaxin Li, Gorka Abad, Stjepan Picek, Mauro Conti:
Membership Privacy Evaluation in Deep Spiking Neural Networks. CoRR abs/2409.19413 (2024) - [i152]Jiaxin Li, Marco Arazzi, Antonino Nocera
, Mauro Conti:
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning. CoRR abs/2409.19417 (2024) - [i151]Giulio Rigoni, Nicola Scremin, Mauro Conti:
Towards a Self-rescuing System for UAVs Under GNSS Attack. CoRR abs/2410.02442 (2024) - [i150]Mauro Conti, Emiliano De Cristofaro, Alessandro Galeazzi, Pujan Paudel, Gianluca Stringhini:
Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Social Media. CoRR abs/2410.17390 (2024) - [i149]Dincy R. Arikkat, Abhinav M., Navya Binu, Parvathi M., Navya Biju, K. S. Arunima, Vinod P., Rafidha Rehiman K. A., Mauro Conti:
IntellBot: Retrieval Augmented LLM Chatbot for Cyber Threat Knowledge Delivery. CoRR abs/2411.05442 (2024) - [i148]Luca Pajola, Saskia Laura Schröer, Pier Paolo Tricomi, Mauro Conti, Giovanni Apruzzese:
Elephant in the Room: Dissecting and Reflecting on the Evolution of Online Social Network Research. CoRR abs/2411.13681 (2024) - [i147]Alessandro Lotto, Alessandro Brighente, Mauro Conti:
Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check. CoRR abs/2411.14394 (2024) - [i146]Marco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti, Daniele Antonioli:
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems. CoRR abs/2411.17184 (2024) - [i145]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Depth-Aware Arithmetization of Common Primitives in Prime Fields. IACR Cryptol. ePrint Arch. 2024: 1200 (2024) - [i144]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Oraqle: A Depth-Aware Secure Computation Compiler. IACR Cryptol. ePrint Arch. 2024: 1409 (2024) - 2023
- [j244]Pier Paolo Tricomi
, Federica Nenna
, Luca Pajola
, Mauro Conti
, Luciano Gamberini:
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality. IEEE Access 11: 9859-9875 (2023) - [j243]Hossein Ahmadvand
, Chhagan Lal
, Hadi Hemmati, Mehdi Sookhak
, Mauro Conti
:
Privacy-Preserving and Security in SDN-Based IoT: A Survey. IEEE Access 11: 44772-44786 (2023) - [j242]Alireza Dehlaghi-Ghadim
, Ali Balador
, Mahshid Helali Moghadam
, Hans Hansson
, Mauro Conti
:
ICSSIM - A framework for building industrial control systems security testbeds. Comput. Ind. 148: 103906 (2023) - [j241]Yassine Mekdad
, Ahmet Aris
, Leonardo Babun
, Abdeslam El Fergougui
, Mauro Conti
, Riccardo Lazzeretti
, A. Selcuk Uluagac
:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023) - [j240]Anand Kumar, Karan Singh, Mohd Shariq
, Chhagan Lal, Mauro Conti
, Ruhul Amin
, Shehzad Ashraf Chaudhry
:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023) - [j239]Tayyab Ali Khan, Karan Singh, Mohd Shariq
, Khaleel Ahmad, K. S. Savita, Ali Ahmadian, Soheil Salahshour, Mauro Conti
:
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. Comput. Commun. 209: 217-229 (2023) - [j238]Gulshan Kumar
, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues
:
COUNT: Blockchain framework for resource accountability in e-healthcare. Comput. Commun. 209: 249-259 (2023) - [j237]Mohamed A. El-Zawawy
, Pallavi Kaliyar, Mauro Conti
, Sokratis K. Katsikas
:
Honey-list based authentication protocol for industrial IoT swarms. Comput. Commun. 211: 239-253 (2023) - [j236]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti
, Xiaochun Cheng
:
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things. Comput. Secur. 132: 103315 (2023) - [j235]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti
, Eleonora Losiouk
:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(4): 2427-2455 (2023) - [j234]Ankur O. Bang
, Udai Pratap Rao
, Pallavi Kaliyar
, Mauro Conti
:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 55(2): 44:1-44:36 (2023) - [j233]Yazeed Alrowaili
, Neetesh Saxena
, Anurag Srivastava, Mauro Conti
, Pete Burnap:
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 160-185 (2023) - [j232]Reza Mohammadi, Chhagan Lal, Mauro Conti
:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. Int. J. Inf. Sec. 22(2): 367-379 (2023) - [j231]Zhihao Wang, Ding Ding, Min Ren, Mauro Conti
:
TANGO: A temporal spatial dynamic graph model for event prediction. Neurocomputing 542: 126249 (2023) - [j230]Amina Zahoor, Khalid Mahmood
, Salman Shamshad, Muhammad Asad Saleem
, Muhammad Faizan Ayub, Mauro Conti
, Ashok Kumar Das
:
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF. Internet Things 22: 100708 (2023) - [j229]Rekha Goyat
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Rahul Saha
, Reji Thomas:
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT. IEEE Internet Things J. 10(18): 16480-16493 (2023) - [j228]Jennifer Bellizzi
, Eleonora Losiouk
, Mauro Conti
, Christian Colombo
, Mark Vella
:
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. J. Cybersecur. Priv. 3(3): 364-395 (2023) - [j227]Mauro Conti
, Luca Pajola, Pier Paolo Tricomi
:
Turning captchas against humanity: Captcha-based attacks in online social media. Online Soc. Networks Media 36: 100252 (2023) - [j226]Matteo Cardaioli, Mauro Conti
, Gabriele Orazi
, Pier Paolo Tricomi
, Gene Tsudik:
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication. Pervasive Mob. Comput. 92: 101801 (2023) - [j225]Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti
:
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning. Proc. Priv. Enhancing Technol. 2023(1): 140-157 (2023) - [j224]Anas Alsoliman
, Giulio Rigoni
, Davide Callegaro
, Marco Levorato
, Cristina M. Pinotti
, Mauro Conti
:
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. ACM Trans. Cyber Phys. Syst. 7(2): 12:1-12:29 (2023) - [j223]Gabriele Etta
, Matteo Cinelli
, Alessandro Galeazzi
, Carlo Michele Valensise
, Walter Quattrociocchi
, Mauro Conti
:
Comparing the Impact of Social Media Regulations on News Consumption. IEEE Trans. Comput. Soc. Syst. 10(3): 1252-1262 (2023) - [j222]Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
, Donghui Hu
:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 225-241 (2023) - [j221]Simone Soderi
, Riccardo Colelli
, Federico Turrin
, Federica Pascucci
, Mauro Conti
:
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming. IEEE Trans. Dependable Secur. Comput. 20(3): 2274-2288 (2023) - [j220]Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Fabio Martinelli, Mamoun Alazab
:
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts. IEEE Trans. Dependable Secur. Comput. 20(4): 2849-2866 (2023) - [j219]Meng Li
, Yifei Chen, Liehuang Zhu
, Zijian Zhang
, Jianbing Ni
, Chhagan Lal
, Mauro Conti
:
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3002-3018 (2023) - [j218]Alessandro Brighente
, Mauro Conti
, Radha Poovendran
, Jianying Zhou:
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems. IEEE Trans. Ind. Informatics 19(6): 7801 (2023) - [j217]Ehsan Nowroozi
, Abhishek
, Mohammadreza Mohammadi
, Mauro Conti
:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. IEEE Trans. Netw. Serv. Manag. 20(2): 1332-1344 (2023) - [j216]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. IEEE Trans. Netw. Serv. Manag. 20(2): 1775-1789 (2023) - [j215]Ehsan Nowroozi
, Mohammadreza Mohammadi
, Erkay Savas, Yassine Mekdad
, Mauro Conti
:
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. IEEE Trans. Netw. Serv. Manag. 20(2): 2096-2105 (2023) - [j214]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Reji Thomas
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. IEEE Trans. Serv. Comput. 16(2): 900-912 (2023) - [j213]Saiqin Xu
, Alessandro Brighente
, Baixiao Chen
, Mauro Conti
, Xiancheng Cheng, Dongchen Zhu:
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios. IEEE Trans. Veh. Technol. 72(4): 4683-4696 (2023) - [j212]Meng Li
, Jianbo Gao
, Zijian Zhang
, Liehuang Zhu
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion. IEEE Trans. Veh. Technol. 72(4): 5139-5151 (2023) - [j211]Subir Halder
, Amrita Ghosal
, Mauro Conti
:
Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks. IEEE Trans. Wirel. Commun. 22(2): 1014-1028 (2023) - [j210]Luca Pajola
, Dongkai Chen
, Mauro Conti
, V. S. Subrahmanian
:
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm. ACM Trans. Web 17(4): 27:1-27:31 (2023) - [j209]Sanaz Soltani
, Mohammad Shojafar
, Alessandro Brighente
, Mauro Conti
, Rahim Tafazolli
:
Poisoning Bearer Context Migration in O-RAN 5G Network. IEEE Wirel. Commun. Lett. 12(3): 401-405 (2023) - [j208]Saurabh Rana
, Dheerendra Mishra
, Chhagan Lal, Mauro Conti
:
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing. Wirel. Pers. Commun. 131(2): 1295-1312 (2023) - [c276]Francesco Marchiori
, Mauro Conti
, Nino Vincenzo Verde
:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. ARES 2023: 3:1-3:11 - [c275]Riccardo Cestaro
, Mauro Conti
, Elonora Mancini
, Federico Turrin
:
OpenScope-sec: An ADS-B Simulator to Support the Security Research. ARES 2023: 116:1-116:6 - [c274]Sara Bardi, Mauro Conti
, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages. ACNS (1) 2023: 309-336 - [c273]Federico Carboni
, Mauro Conti
, Denis Donadel
, Mariano Sciacco
:
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. ACNS Workshops 2023: 553-570 - [c272]Filippo Perrina, Francesco Marchiori
, Mauro Conti
, Nino Vincenzo Verde:
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. IEEE Big Data 2023: 3053-3062 - [c271]Francesco Marchiori
, Mauro Conti
:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. CCS 2023: 105-119 - [c270]Marco Arazzi
, Mauro Conti
, Antonino Nocera
, Stjepan Picek
:
Turning Privacy-preserving Mechanisms against Federated Learning. CCS 2023: 1482-1495 - [c269]Pier Paolo Tricomi
, Lisa Facciolo, Giovanni Apruzzese
, Mauro Conti
:
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2. CODASPY 2023: 27-38 - [c268]Ko Zheng Teng
, Trupil Limbasiya
, Federico Turrin
, Yan Lin Aung
, Sudipta Chattopadhyay
, Jianying Zhou
, Mauro Conti
:
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems. CPSS@AsiaCCS 2023: 3-13 - [c267]Massimiliano Baldo
, Tommaso Bianchi
, Mauro Conti
, Alessio Trevisan, Federico Turrin
:
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments. ESORICS Workshops (1) 2023: 145-159 - [c266]Victoria Bull, Niclas Finne, Andrea Agiollo, Pallavi Kaliyar, Luca Pajola, Thiemo Voigt, Mauro Conti
:
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network. ESORICS Workshops (2) 2023: 198-213 - [c265]Andrea Agiollo, Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini:
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. EuroS&P 2023: 615-630 - [c264]Samaneh Mohammadi, Mohammadreza Mohammadi
, Sima Sinaei, Ali Balador, Ehsan Nowroozi, Francesco Flammini, Mauro Conti
:
Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition. FedCSIS 2023: 191-199 - [c263]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti
:
Going in Style: Audio Backdoors Through Stylistic Transformations. ICASSP 2023: 1-5 - [c262]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta
, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti
:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [c261]Emilie Bout, Valentin Bout, Alessandro Brighente, Mauro Conti
, Valeria Loscrì:
Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks. ICC 2023: 5210-5215 - [c260]Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti
:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. ICCCN 2023: 1-10 - [c259]Riccardo Spolaor, Hao Liu, Federico Turrin, Mauro Conti
, Xiuzhen Cheng:
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. INFOCOM 2023: 1-10 - [c258]Marco Alecci
, Luca Attanasio
, Alessandro Brighente
, Mauro Conti
, Eleonora Losiouk
, Hideki Ochiai
, Federico Turrin
:
Beware of Pickpockets: A Practical Attack against Blocking Cards. RAID 2023: 195-206 - [c257]Marco Alecci
, Mauro Conti
, Francesco Marchiori
, Luca Martinelli
, Luca Pajola
:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. RAID 2023: 315-329 - [c256]Nicholas Boucher
, Luca Pajola
, Ilia Shumailov
, Ross J. Anderson
, Mauro Conti
:
Boosting Big Brother: Attacking Search Engines with Encodings. RAID 2023: 700-713 - [c255]Alessandro Brighente, Mauro Conti
, Giacomo Peruzzi
, Alessandro Pozzebon
:
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning. SAS 2023: 1-6 - [c254]Giuseppe Cascavilla
, Gemma Catolino, Mauro Conti
, Dimos Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. SECRYPT 2023: 324-334 - [c253]Francesco Luigi De Faveri
, Luca Cosuti
, Pier Paolo Tricomi
, Mauro Conti
:
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections. SocialSec 2023: 38-57 - [c252]Harsh Kasyap, Somanath Tripathy, Mauro Conti
:
HDFL: Private and Robust Federated Learning using Hyperdimensional Computing. TrustCom 2023: 214-221 - [c251]Tommaso Bianchi
, Surudhi Asokraj, Alessandro Brighente, Mauro Conti
, Radha Poovendran
:
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer. VTC2023-Spring 2023: 1-6 - [c250]Pier Paolo Tricomi
, Marco Chilese
, Mauro Conti
, Ahmad-Reza Sadeghi
:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. WebSci 2023: 346-356 - [c249]Ankit Gangwal, Apoorva Thirupathi, Alessandro Brighente, Mauro Conti
:
A First Look at Shill Looping in NFT Ecosystem. WIFS 2023: 1-6 - [c248]Alessandro Visintin, Mauro Conti
:
Leveraging Social Networks for Mergers and Acquisitions Forecasting. WISE 2023: 144-159 - [c247]Marco Casagrande
, Riccardo Cestaro
, Eleonora Losiouk
, Mauro Conti
, Daniele Antonioli
:
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. WISEC 2023: 85-95 - [c246]Alessandro Lotto
, Vaibhav Singh
, Bhaskar Ramasubramanian
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. WISEC 2023: 133-144 - [c245]Elisa Sartori
, Luca Pajola
, Giovanni Da San Martino
, Mauro Conti
:
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum. WWW 2023: 4060-4064 - [d5]Riccardo Spolaor
, Hao Liu, Federico Turrin
, Mauro Conti
, Xiuzhen Cheng:
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. Zenodo, 2023 - [i143]Alessandro Brighente, Mauro Conti, Denis Donadel
, Radha Poovendran
, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023) - [i142]Serena Tardelli, Leonardo Nizzoli, Maurizio Tesconi, Mauro Conti, Preslav Nakov, Giovanni Da San Martino, Stefano Cresci:
Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence. CoRR abs/2301.06774 (2023) - [i141]Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. CoRR abs/2301.06815 (2023) - [i140]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. CoRR abs/2302.08992 (2023) - [i139]Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. CoRR abs/2303.09999 (2023) - [i138]Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti:
Cryptocurrency wallets: assessment and security. CoRR abs/2303.12940 (2023) - [i137]Marco Venturini, Francesco Freda, Emanuele Miotto, Alberto Giaretta
, Mauro Conti:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. CoRR abs/2303.17351 (2023) - [i136]Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People through Self-managed Instagram Pages. CoRR abs/2303.17946 (2023) - [i135]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. CoRR abs/2304.02982 (2023) - [i134]Nicholas Boucher
, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. CoRR abs/2304.14031 (2023) - [i133]Marco Arazzi, Mauro Conti, Antonino Nocera
, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023) - [i132]Emad Efatinasab
, Francesco Marchiori, Denis Donadel, Alessandro Brighente, Mauro Conti:
GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems. CoRR abs/2306.05923 (2023) - [i131]Francesco Luigi De Faveri, Luca Cosuti, Pier Paolo Tricomi, Mauro Conti:
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections. CoRR abs/2306.07183 (2023) - [i130]Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. CoRR abs/2306.15363 (2023) - [i129]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado Aaron Visaggio, Mauro Conti:
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? CoRR abs/2306.16087 (2023) - [i128]Fatemeh Najafi, Masoud Kaveh, Mohammad Reza Mosavi, Alessandro Brighente, Mauro Conti:
EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks. CoRR abs/2307.09968 (2023) - [i127]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera
, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023) - [i126]Francesco Marchiori, Mauro Conti:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. CoRR abs/2309.03607 (2023) - [i125]Massimiliano Baldo, Tommaso Bianchi
, Mauro Conti, Alessio Trevisan, Federico Turrin:
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments. CoRR abs/2309.06077 (2023) - [i124]Ankit Gangwal, Aashish Paliwal, Mauro Conti:
De-authentication using Ambient Light Sensor. CoRR abs/2309.12220 (2023) - [i123]Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. CoRR abs/2310.02655 (2023) - [i122]Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek:
Invisible Threats: Backdoor Attack in OCR Systems. CoRR abs/2310.08259 (2023) - [i121]Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera
, Rafidha Rehiman K. A., P. Vinod, Mauro Conti:
NLP-Based Techniques for Cyber Threat Intelligence. CoRR abs/2311.08807 (2023) - [i120]Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, Dimos Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. CoRR abs/2311.17026 (2023) - [i119]Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek:
Dr. Jekyll and Mr. Hyde: Two Faces of LLMs. CoRR abs/2312.03853 (2023) - [i118]Florine W. Dekker
, Zekeriya Erkin, Mauro Conti:
Topology-Based Reconstruction Prevention for Decentralised Learning. CoRR abs/2312.05248 (2023) - [i117]Tommaso Bianchi
, Alessandro Brighente, Mauro Conti:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. CoRR abs/2312.12879 (2023) - [i116]Jelle Vos, Mauro Conti, Zekeriya Erkin:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. IACR Cryptol. ePrint Arch. 2023: 1777 (2023) - 2022
- [j207]Fran Casino
, Thomas K. Dasaklis, Georgios P. Spathoulas
, Marios Anagnostopoulos
, Amrita Ghosal
, István Böröcz, Agusti Solanas
, Mauro Conti
, Constantinos Patsakis
:
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 10: 25464-25493 (2022) - [j206]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey. IEEE Access 10: 121173-121192 (2022) - [j205]Reza Mohammadi, Chhagan Lal
, Mauro Conti
, Lokesh Sharma:
Software defined network-based HTTP flooding attack defender. Comput. Electr. Eng. 101: 108019 (2022) - [j204]PLS Jayalaxmi, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim, Reji Thomas:
DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102: 108214 (2022) - [j203]Mauro Conti
, Jenil Gathani, Pier Paolo Tricomi:
Virtual Influencers in Online Social Media. IEEE Commun. Mag. 60(8): 86-91 (2022) - [j202]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. Comput. Networks 206: 108804 (2022) - [j201]Mauro Conti
, Eleonora Losiouk
, Radha Poovendran
, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [j200]Jamshid Pirayesh, Alberto Giaretta
, Mauro Conti
, Parviz Keshavarzi:
A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Comput. Networks 216: 109077 (2022) - [j199]Mohd Shariq
, Karan Singh, Chhagan Lal
, Mauro Conti
, Tayyab Ali Khan:
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags. Comput. Networks 217: 109360 (2022) - [j198]Amrita Ghosal
, Subir Halder, Mauro Conti
:
Secure over-the-air software update for connected vehicles. Comput. Networks 218: 109394 (2022) - [j197]Federico Tavella
, Alberto Giaretta
, Mauro Conti
, Sasitharan Balasubramaniam
:
A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Comput. Commun. 187: 59-70 (2022) - [j196]Vasilios Koutsokostas, Nikolaos Lykousas
, Theodoros Apostolopoulos, Gabriele Orazi
, Amrita Ghosal, Fran Casino, Mauro Conti
, Constantinos Patsakis:
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents. Comput. Secur. 114: 102582 (2022) - [j195]Mauro Conti
, Shubham Khandhar, Vinod P.:
A few-shot malware classification approach for unknown family recognition using malware feature visualization. Comput. Secur. 122: 102887 (2022) - [j194]Ankur O. Bang
, Udai Pratap Rao
, Andrea Visconti, Alessandro Brighente, Mauro Conti
:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Comput. Secur. 123: 102914 (2022) - [j193]Mohamed A. El-Zawawy
, Parvez Faruki, Mauro Conti
:
Formal model for inter-component communication and its security in android. Computing 104(8): 1839-1865 (2022) - [j192]Alakesh Kalita
, Alessandro Brighente
, Manas Khatua
, Mauro Conti
:
Effect of DIS Attack on 6TiSCH Network Formation. IEEE Commun. Lett. 26(5): 1190-1193 (2022) - [j191]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Qianmu Li
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Brij Bhooshan Gupta
, Mauro Conti
:
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey. IEEE Internet Things J. 9(10): 7639-7663 (2022) - [j190]Rekha Goyat
, Gulshan Kumar
, Mamoun Alazab
, Mauro Conti
, Mritunjay Kumar Rai
, Reji Thomas
, Rahul Saha
, Tai-Hoon Kim
:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - [j189]Mauro Conti
, P. Vinod, Alessio Vitella
:
Obfuscation detection in Android applications using deep learning. J. Inf. Secur. Appl. 70: 103311 (2022) - [j188]Milad Taleby Ahvanooey
, Mark Xuefang Zhu, Wojciech Mazurczyk, Qianmu Li, Max Kilger, Kim-Kwang Raymond Choo, Mauro Conti
:
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks. J. Inf. Secur. Appl. 71: 103368 (2022) - [j187]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Mauro Conti
, Jing Zhang
:
Misinformation Detection on Social Media: Challenges and the Road Ahead. IT Prof. 24(1): 34-40 (2022) - [j186]Fabio Aiolli, Mauro Conti
, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. J. Comput. Secur. 30(4): 599-621 (2022) - [j185]Mauro Conti
, Gulshan Kumar
, Pranav Nerurkar, Rahul Saha
, Luigi Vigneri
:
A survey on security challenges and solutions in the IOTA. J. Netw. Comput. Appl. 203: 103383 (2022) - [j184]Ashish Kumar, Rahul Saha
, Mauro Conti
, Gulshan Kumar
, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022) - [j183]Arshdeep Singh, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Mamoun Alazab, Reji Thomas
:
A survey and taxonomy of consensus protocols for blockchains. J. Syst. Archit. 127: 102503 (2022) - [j182]Subir Halder
, Mauro Conti
:
CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem. IEEE Trans. Cloud Comput. 10(4): 2437-2450 (2022) - [j181]Marco Casagrande
, Eleonora Losiouk, Mauro Conti
, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 330-366 (2022) - [j180]Meng Li
, Yifei Chen
, Shuli Zheng, Donghui Hu
, Chhagan Lal
, Mauro Conti
:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1133-1148 (2022) - [j179]Xuhang Ying
, Giuseppe Bernieri, Mauro Conti
, Linda Bushnell
, Radha Poovendran
:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2665-2679 (2022) - [j178]Meng Li
, Yifei Chen
, Neeraj Kumar
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks. IEEE Trans. Green Commun. Netw. 6(3): 1267-1275 (2022) - [j177]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
:
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 18(5): 3452-3461 (2022) - [j176]Ehsan Nowroozi
, Yassine Mekdad
, Mohammad Hajian Berenjestanaki
, Mauro Conti
, Abdeslam El Fergougui
:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3387-3400 (2022) - [j175]Giovanni Apruzzese
, Luca Pajola
, Mauro Conti
:
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5152-5169 (2022) - [j174]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack. IEEE/ACM Trans. Netw. 30(5): 2060-2073 (2022) - [j173]Ding Ding
, Kyuho Jeong, Shuning Xing
, Mauro Conti
, Renato Figueiredo
, Fangai Liu
:
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships. IEEE Trans. Serv. Comput. 15(1): 346-360 (2022) - [c244]Emilie Bout, Alessandro Brighente, Mauro Conti
, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. ARES 2022: 21:1-21:10 - [c243]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal:
Sim2Testbed Transfer: NDN Performance Evaluation. ARES 2022: 63:1-63:9 - [c242]Alessandro Brighente, Mauro Conti
, Savio Sciancalepore:
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing. ARES 2022: 134:1-134:11 - [c241]Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti
, Jianying Zhou:
HolA: Holistic and Autonomous Attestation for IoT Networks. ACNS Workshops 2022: 277-296 - [c240]Giovanni Apruzzese
, Mauro Conti
, Ying Yuan
:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. ACSAC 2022: 171-185 - [c239]Stefanos Koffas, Stjepan Picek, Mauro Conti
:
Dynamic Backdoors with Global Average Pooling. AICAS 2022: 320-323 - [c238]Arshdeep Singh, Rahul Saha
, Mauro Conti
, Gulshan Kumar:
PoSC: Combined Score for Consensus in Intemet-of-Things Applications. BCCA 2022: 173-180 - [c237]Ankit Gangwal
, Rahul Valluri, Mauro Conti
:
Analyzing Price Deviations in DeFi Oracles. CANS 2022: 329-338 - [c236]Mauro Conti
, Jiaxin Li, Stjepan Picek, Jing Xu
:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. AISec@CCS 2022: 1-12 - [c235]Alessandro Brighente, Mauro Conti
, Harsha Vasudev
:
MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-8 - [c234]Adriaan de Vos
, Alessandro Brighente
, Mauro Conti
:
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 67-80 - [c233]Mauro Conti
, Denis Donadel
, Radha Poovendran
, Federico Turrin
:
EVExchange: A Relay Attack on Electric Vehicle Charging System. ESORICS (1) 2022: 488-508 - [c232]Matteo Cardaioli, Mauro Conti
, Arpita Ravindranath:
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection. ESORICS (3) 2022: 595-613 - [c231]Kiran S. Balagani, Matteo Cardaioli, Stefano Cecconello, Mauro Conti
, Gene Tsudik:
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads. ESORICS (1) 2022: 633-652 - [c230]Trupil Limbasiya, Amrita Ghosal, Mauro Conti
:
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks. ICDCN 2022: 208-216 - [c229]Valerio Bellandi
, Paolo Ceravolo, Mauro Conti
, Maryam Ehsanpour:
Contactless Authentication for Wearable Devices Using RFID. ICDH 2022: 234-239 - [c228]Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti
, Mamoun Alazab:
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud. ICICS 2022: 261-280 - [c227]Irene Amerini, Mauro Conti
, Pietro Giacomazzi, Luca Pajola
:
PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart. IJCNN 2022: 1-7 - [c226]Matteo Cardaioli, Alessio Miolla, Mauro Conti
, Giuseppe Sartori, Merylin Monaro, Cristina Scarpazza
, Nicolò Navarin
:
Face the Truth: Interpretable Emotion Genuineness Detection. IJCNN 2022: 1-8 - [c225]Mauro Conti
, Francesco Trolese, Federico Turrin
:
ICSpot: A High-Interaction Honeypot for Industrial Control Systems. ISNCC 2022: 1-4 - [c224]Alessandro Brighente, Mauro Conti
, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering. M&N 2022: 1-6 - [c223]Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin:
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation. NDSS 2022 - [c222]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. NDSS 2022 - [c221]Matteo Cardaioli, Mauro Conti
, Pier Paolo Tricomi, Gene Tsudik:
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection. PerCom 2022: 197-206 - [c220]Alessandro Brighente, Martina Camaioni, Mauro Conti
, Emilio Olivastri
:
Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses. PerCom Workshops 2022: 279-284 - [c219]Mauro Conti
, Eleonora Losiouk, Alessandro Visintin:
What you see is not what you get: a man-in-the-middle attack applied to video channels. SAC 2022: 1723-1726 - [c218]Simone Soderi
, Alessandro Brighente, Federico Turrin, Mauro Conti
:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. SECON 2022: 370-378 - [c217]Alessandro Brighente, Mauro Conti, Harsha Vasudev:
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles. SoftCOM 2022: 1-6 - [c216]Pavan Srihari Darbha, Mauro Conti
, Eleonora Losiouk
, Rajib Ranjan Maiti:
Face Recognition Systems: Are you sure they only consider your face? SP (Workshops) 2022: 258-264 - [c215]Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti
:
Graph Encryption for Shortest Path Queries with k Unsorted Nodes. TrustCom 2022: 89-96 - [c214]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. USENIX Security Symposium 2022: 1687-1704 - [c213]Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti
, Preslav Nakov:
The Spread of Propaganda by Coordinated Communities on Social Media. WebSci 2022: 191-201 - [c212]Stefanos Koffas, Jing Xu
, Mauro Conti
, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. WiseML@WiSec 2022: 57-62 - [e12]Weizhi Meng
, Mauro Conti
:
Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings. Lecture Notes in Computer Science 13172, Springer 2022, ISBN 978-3-030-94028-7 [contents] - [d4]Ehsan Nowroozi
, Abhishek, Mohammadreza Mohammadi
, Mauro Conti
:
Pristine and Malicious URLs. IEEE DataPort, 2022 - [d3]Ehsan Nowroozi
, Mohammadreza Mohammadi, Mauro Conti
, Pargol Golmohammadi, Yassine Mekdad
, Arif Selcuk Uluagac
:
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security. Zenodo, 2022 - [d2]Ehsan Nowroozi
, Seyedsadra Seyedshoari, Mauro Conti
:
SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. IEEE DataPort, 2022 - [i115]Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Captcha Attack: Turning Captchas Against Humanity. CoRR abs/2201.04014 (2022) - [i114]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad:
Detecting High-Quality GAN-Generated Face Images using Neural Networks. CoRR abs/2203.01716 (2022) - [i113]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. CoRR abs/2203.02079 (2022) - [i112]Giovanni Apruzzese, Luca Pajola, Mauro Conti:
The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems. CoRR abs/2203.04686 (2022) - [i111]Mauro Conti, Denis Donadel
, Radha Poovendran
, Federico Turrin:
EVExchange: A Relay Attack on Electric Vehicle Charging System. CoRR abs/2203.05266 (2022) - [i110]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis
, Jun Xu:
Building Embedded Systems Like It's 1996. CoRR abs/2203.06834 (2022) - [i109]Alessandro Brighente, Mauro Conti, Sathish A. P. Kumar:
Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit. CoRR abs/2203.09843 (2022) - [i108]Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, A. Selcuk Uluagac, Berrin Yanikoglu:
Real or Virtual: A Video Conferencing Background Manipulation-Detection System. CoRR abs/2204.11853 (2022) - [i107]Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. CoRR abs/2204.13172 (2022) - [i106]Alessandro Brighente, Mauro Conti, Hanan Idriss, Stefano Tomasin:
Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy. CoRR abs/2205.02506 (2022) - [i105]Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. CoRR abs/2205.03915 (2022) - [i104]Simone Soderi
, Alessandro Brighente, Federico Turrin, Mauro Conti:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. CoRR abs/2205.09026 (2022) - [i103]Tommaso Bianchi
, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran
:
Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems. CoRR abs/2205.10292 (2022) - [i102]Alessandro Brighente, Mauro Conti, Savio Sciancalepore
:
Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles. CoRR abs/2205.13808 (2022) - [i101]Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. CoRR abs/2206.12904 (2022) - [i100]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. CoRR abs/2207.13766 (2022) - [i99]Surudhi Asokraj, Tommaso Bianchi
, Alessandro Brighente, Mauro Conti, Radha Poovendran
:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. CoRR abs/2208.02857 (2022) - [i98]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. CoRR abs/2209.02835 (2022) - [i97]Alessandro Brighente, Mauro Conti, Denis Donadel
, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. CoRR abs/2209.03095 (2022) - [i96]Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, A. Selcuk Uluagac:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. CoRR abs/2209.04930 (2022) - [i95]Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini:
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality. CoRR abs/2209.10849 (2022) - [i94]Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad:
SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks. CoRR abs/2209.12195 (2022) - [i93]Ankit Gangwal, Aakash Jain, Mauro Conti:
On the Feasibility of Profiling Electric Vehicles through Charging Data. CoRR abs/2210.05433 (2022) - [i92]Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti:
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2. CoRR abs/2210.09028 (2022) - [i91]Alireza Dehlaghi-Ghadim, Ali Balador, Hans Hansson, Mauro Conti:
ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds. CoRR abs/2210.13325 (2022) - [i90]Giovanni Apruzzese
, Mauro Conti, Ying Yuan:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. CoRR abs/2210.13660 (2022) - [i89]Mauro Conti, Jiaxin Li, Stjepan Picek:
On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models. CoRR abs/2210.16258 (2022) - [i88]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti:
Going In Style: Audio Backdoors Through Stylistic Transformations. CoRR abs/2211.03117 (2022) - [i87]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta
, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - [i86]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs. IACR Cryptol. ePrint Arch. 2022: 721 (2022) - 2021
- [j172]S. Sullivan, Alessandro Brighente
, Sathish A. P. Kumar
, Mauro Conti
:
5G Security Challenges and Solutions: A Review by OSI Layers. IEEE Access 9: 116294-116314 (2021) - [j171]Amrita Ghosal, Sang Uk Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti
, Radha Poovendran
, Linda Bushnell
:
Truck platoon security: State-of-the-art and road ahead. Comput. Networks 185: 107658 (2021) - [j170]Koosha Mohammad Hossein
, Mohammad Esmaeil Esmaeili, Tooska Dargahi
, Ahmad Khonsari, Mauro Conti
:
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications. Comput. Commun. 180: 31-47 (2021) - [j169]Mohamed A. El-Zawawy
, Eleonora Losiouk
, Mauro Conti
:
Vulnerabilities in Android webview objects: Still not the end! Comput. Secur. 109: 102395 (2021) - [j168]Mauro Conti
, Denis Donadel
, Federico Turrin
:
A Survey on Industrial Control System Testbeds and Datasets for Security Research. IEEE Commun. Surv. Tutorials 23(4): 2248-2294 (2021) - [j167]Zahra Pooranian
, Mauro Conti
, Hamed Haddadi, Rahim Tafazolli
:
Online Advertising Security: Issues, Taxonomy, and Future Directions. IEEE Commun. Surv. Tutorials 23(4): 2494-2524 (2021) - [j166]Aanshi Bhardwaj
, Veenu Mangat
, Renu Vig, Subir Halder, Mauro Conti
:
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions. Comput. Sci. Rev. 39: 100332 (2021) - [j165]Claudio A. Ardagna
, Mauro Conti
, Ernesto Damiani, Chia-Mu Yu:
Editorial: Special issue on trusted Cloud-Edges computations. Future Gener. Comput. Syst. 114: 661-664 (2021) - [j164]Meng Li
, Chhagan Lal, Mauro Conti
, Donghui Hu:
LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Gener. Comput. Syst. 115: 406-420 (2021) - [j163]Gulshan Kumar, Rahul Saha
, Chhagan Lal, Mauro Conti
:
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Gener. Comput. Syst. 120: 13-25 (2021) - [j162]Mohamed A. El-Zawawy
, Eleonora Losiouk
, Mauro Conti
:
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps. Int. J. Inf. Sec. 20(1): 39-58 (2021) - [j161]Abdelmadjid Benarfa
, Muhammad Hassan
, Eleonora Losiouk
, Alberto Compagno, Mohamed Bachir Yagoubi, Mauro Conti
:
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN. Int. J. Inf. Sec. 20(3): 269-285 (2021) - [j160]Neda Maleki
, Amir Masoud Rahmani, Mauro Conti
:
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling. J. Netw. Comput. Appl. 176: 102944 (2021) - [j159]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal, Mauro Conti
, Fabio Martinelli:
Privacy for 5G-Supported Vehicular Networks. IEEE Open J. Commun. Soc. 2: 1935-1956 (2021) - [j158]Subir Halder
, Mauro Conti
, Sajal K. Das:
A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks. Pervasive Mob. Comput. 73: 101385 (2021) - [j157]Moreno Ambrosin, Mauro Conti
, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. ACM Trans. Cyber Phys. Syst. 5(1): 1:1-1:2 (2021) - [j156]Yuan-Gen Wang
, Guopu Zhu
, Jin Li
, Mauro Conti
, Jiwu Huang
:
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole. IEEE Trans. Circuits Syst. Video Technol. 31(1): 76-87 (2021) - [j155]Reza Mohammadi
, Amin Nazari
, Mohammad Nassiri, Mauro Conti
:
An SDN-based framework for QoS routing in internet of underwater things. Telecommun. Syst. 78(2): 253-266 (2021) - [j154]Federico Tavella
, Alberto Giaretta
, Triona Marie Dooley-Cullinane
, Mauro Conti
, Lee Coffey
, Sasitharan Balasubramaniam
:
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Trans. Emerg. Top. Comput. 9(3): 1566-1580 (2021) - [j153]Nagarathna Ravi
, S. Mercy Shalinie
, Chhagan Lal
, Mauro Conti
:
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller. IEEE Trans. Netw. Serv. Manag. 18(1): 745-759 (2021) - [j152]Andrea Agiollo
, Mauro Conti
, Pallavi Kaliyar
, Tsung-Nan Lin
, Luca Pajola
:
DETONAR: Detection of Routing Attacks in RPL-Based IoT. IEEE Trans. Netw. Serv. Manag. 18(2): 1178-1190 (2021) - [j151]Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain. IEEE Trans. Netw. Serv. Manag. 18(4): 4434-4449 (2021) - [j150]Habib Mostafaei
, Mohammad Shojafar
, Mauro Conti
:
TEL: Low-Latency Failover Traffic Engineering in Data Plane. IEEE Trans. Netw. Serv. Manag. 18(4): 4697-4710 (2021) - [j149]Giuseppe Bianchi
, Mauro Conti
, Tooska Dargahi
, Ali Dehghantanha
:
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence. IEEE Trans. Sustain. Comput. 6(2): 182-183 (2021) - [c211]Flavio Toffalini, Mariano Graziano, Mauro Conti
, Jianying Zhou:
SnakeGX: A Sneaky Attack Against SGX Enclaves. ACNS (1) 2021: 333-362 - [c210]Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti
, Alessio Merlo:
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization. ACSAC 2021: 970-981 - [c209]Rahul Saha
, Gulshan Kumar, Alessandro Brighente, Mauro Conti
:
Towards An Enhanced Reputation System for IOTA's Coordicide. BCCA 2021: 26-33 - [c208]Alessandro Brighente, Mauro Conti
, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Knocking on Tangle's Doors: Security Analysis of IOTA Ports. Blockchain 2021: 433-439 - [c207]Yassine Mekdad
, Giuseppe Bernieri, Mauro Conti
, Abdeslam El Fergougui
:
A threat model method for ICS malware: the TRISIS case. CF 2021: 221-228 - [c206]Marco Casagrande
, Mauro Conti
, Eleonora Losiouk:
Contact Tracing Made Un-relay-able. CODASPY 2021: 221-232 - [c205]Luca Attanasio, Mauro Conti
, Denis Donadel
, Federico Turrin
:
MiniV2G: An Electric Vehicle Charging Emulator. CPSS@AsiaCCS 2021: 65-73 - [c204]Oguzhan Ersoy, Ziya Alper Genç, Zekeriya Erkin
, Mauro Conti
:
Practical Exchange for Unique Digital Goods. DAPPS 2021: 49-58 - [c203]Mauro Conti
, P. Vinod, Pier Paolo Tricomi:
Secure Static Content Delivery for CDN Using Blockchain Technology. DPM/CBT@ESORICS 2021: 301-309 - [c202]Yassine Mekdad
, Giuseppe Bernieri, Mauro Conti
, Abdeslam El Fergougui
:
The Rise of ICS Malware: A Comparative Analysis. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 496-511 - [c201]Alessandro Brighente, Mauro Conti
, Izza Sadaf:
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand. ESORICS (1) 2021: 651-667 - [c200]Luca Pajola
, Mauro Conti
:
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. EuroS&P 2021: 198-211 - [c199]Daniele Mari
, Samuele Giuliano Piazzetta, Sara Bordin, Luca Pajola
, Sebastiano Verde
, Simone Milani, Mauro Conti
:
Looking Through Walls: Inferring Scenes from Video-Surveillance Encrypted Traffic. ICASSP 2021: 2595-2599 - [c198]Giovanni Barbieri, Mauro Conti
, Nils Ole Tippenhauer, Federico Turrin
:
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis. ICCCN 2021: 1-9 - [c197]Matteo Cardaioli, Mauro Conti
, Andrea Di Sorbo
, Enrico Fabrizio, Sonia Laudanna
, Corrado Aaron Visaggio:
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency. ICCCN 2021: 1-9 - [c196]Anas Alsoliman, Giulio Rigoni
, Marco Levorato, Cristina M. Pinotti
, Nils Ole Tippenhauer
, Mauro Conti
:
COTS Drone Detection using Video Streaming Characteristics. ICDCN 2021: 166-175 - [c195]Matteo Cardaioli, Stefano Cecconello, Merylin Monaro, Giuseppe Sartori, Mauro Conti
, Graziella Orrù
:
Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests. ICONIP (6) 2021: 433-440 - [c194]Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk
:
ICN PATTA: ICN Privacy Attack Through Traffic Analysis. LCN 2021: 443-446 - [c193]Dario Pasquini, Ankit Gangwal
, Giuseppe Ateniese
, Massimo Bernaschi, Mauro Conti
:
Improving Password Guessing via Representation Learning. SP 2021: 1382-1399 - [c192]Yifei Chen
, Meng Li, Shuli Zheng, Chhagan Lal, Mauro Conti
:
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services. STM 2021: 43-61 - [c191]Mohamad Mansouri, Wafa Ben Jaballah, Melek Önen, Md Masoom Rabbani
, Mauro Conti
:
FADIA: fairness-driven collaborative remote attestation. WISEC 2021: 60-71 - [e11]Mauro Conti
, Marc Stevens
, Stephan Krenn
:
Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings. Lecture Notes in Computer Science 13099, Springer 2021, ISBN 978-3-030-92547-5 [contents] - [e10]Jiannong Cao, Man Ho Au, Mauro Conti, Nils Ole Tippenhauer, Alessandro Brighente:
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021. ACM 2021, ISBN 978-1-4503-8402-5 [contents] - [d1]Ehsan Nowroozi
, Mauro Conti
, Simone Milani
, Yassine Mekdad
, Gabriele Orazi:
Dataset for Real and Virtual Backgrounds of Video Calls. Zenodo, 2021 - [i85]Luca Attanasio, Mauro Conti, Denis Donadel, Federico Turrin:
MiniV2G: An Electric Vehicle Charging Emulator. CoRR abs/2101.11720 (2021) - [i84]Mauro Conti, Denis Donadel
, Federico Turrin:
A Survey on Industrial Control System Testbeds and Datasets for Security Research. CoRR abs/2102.05631 (2021) - [i83]Francesco Betti Sorbelli, Mauro Conti, Cristina M. Pinotti, Giulio Rigoni:
UAVs Path Deviation Attacks: Survey and Research Challenges. CoRR abs/2102.06638 (2021) - [i82]Luca Pajola, Mauro Conti:
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. CoRR abs/2104.05996 (2021) - [i81]Gabriele Etta, Matteo Cinelli, Alessandro Galeazzi, Carlo Michele Valensise, Mauro Conti, Walter Quattrociocchi:
News consumption and social media regulations policy. CoRR abs/2106.03924 (2021) - [i80]Mauro Conti, Simone Milani, Ehsan Nowroozi, Gabriele Orazi:
Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System. CoRR abs/2106.15130 (2021) - [i79]Alessandro Brighente, Mauro Conti, Denis Donadel
, Federico Turrin:
EVScout2.0: Electric Vehicle Profiling Through Charging Profile. CoRR abs/2106.16016 (2021) - [i78]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers. CoRR abs/2107.14569 (2021) - [i77]Fran Casino, Tom K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, István Böröcz, Agusti Solanas, Mauro Conti, Constantinos Patsakis:
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics. CoRR abs/2108.04634 (2021) - [i76]Kristina Hristakieva, Stefano Cresci, Giovanni Da San Martino, Mauro Conti, Preslav Nakov:
The Spread of Propaganda by Coordinated Communities on Social Media. CoRR abs/2109.13046 (2021) - [i75]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues of UAVs. CoRR abs/2109.14442 (2021) - [i74]Ehsan Nowroozi, Mauro Conti, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Abdeslam El Fergougui:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. CoRR abs/2110.04488 (2021) - [i73]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. CoRR abs/2110.08113 (2021) - 2020
- [j148]Jyoti Gajrani
, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah
, Mauro Conti
:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020) - [j147]Mauro Conti
, Pallavi Kaliyar, Md Masoom Rabbani
, Silvio Ranise:
Attestation-enabled secure and scalable routing protocol for IoT networks. Ad Hoc Networks 98 (2020) - [j146]Rahim Taheri
, Reza Javidan, Mohammad Shojafar
, P. Vinod, Mauro Conti
:
Can machine learning model with static features be fooled: an adversarial machine learning approach. Clust. Comput. 23(4): 3233-3253 (2020) - [j145]Amrita Ghosal, Mauro Conti
:
Security issues and challenges in V2X: A Survey. Comput. Networks 169: 107093 (2020) - [j144]Wafa Ben Jaballah, Mauro Conti
, Chhagan Lal:
Security and design requirements for software-defined VANETs. Comput. Networks 169: 107099 (2020) - [j143]Muhammad Hassan
, Mauro Conti
, Chhagan Lal
:
NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN. Comput. Networks 174: 107222 (2020) - [j142]Subir Halder, Amrita Ghosal, Mauro Conti
:
Secure over-the-air software updates in connected vehicles: A survey. Comput. Networks 178: 107343 (2020) - [j141]Giuseppe Bernieri, Stefano Cecconello, Mauro Conti
, Gianluca Lain:
TAMBUS: A novel authentication method through covert channels for securing industrial networks. Comput. Networks 183: 107583 (2020) - [j140]Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti
:
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Comput. Commun. 154: 148-159 (2020) - [j139]Mohammad Hadi Alaeiyan
, Saeed Parsa
, Vinod P, Mauro Conti
:
Detection of algorithmically-generated domains: An adversarial machine learning approach. Comput. Commun. 160: 661-673 (2020) - [j138]Mauro Conti
, Chhagan Lal
:
Context-based Co-presence detection techniques: A survey. Comput. Secur. 88 (2020) - [j137]Pallavi Kaliyar
, Wafa Ben Jaballah, Mauro Conti
, Chhagan Lal
:
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Comput. Secur. 94: 101849 (2020) - [j136]Mauro Conti
, Ankit Gangwal
, Muhammad Hassan
, Chhagan Lal
, Eleonora Losiouk
:
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions. IEEE Commun. Surv. Tutorials 22(3): 2104-2129 (2020) - [j135]Moreno Ambrosin, Mauro Conti
, Riccardo Lazzeretti
, Md Masoom Rabbani
, Silvio Ranise
:
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges. IEEE Commun. Surv. Tutorials 22(4): 2447-2461 (2020) - [j134]Bharat Manral
, Gaurav Somani
, Kim-Kwang Raymond Choo
, Mauro Conti
, Manoj Singh Gaur
:
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions. ACM Comput. Surv. 52(6): 124:1-124:38 (2020) - [j133]Rahim Taheri
, Meysam Ghahramani
, Reza Javidan, Mohammad Shojafar
, Zahra Pooranian
, Mauro Conti
:
Similarity-based Android malware detection using Hamming distance of static binary features. Future Gener. Comput. Syst. 105: 230-247 (2020) - [j132]Claudio Agostino Ardagna, Mauro Conti
, Chia-Mu Yu:
Special issue on Trusted Cloud-Edges Computations. Future Gener. Comput. Syst. 112: 1180-1183 (2020) - [j131]Neda Maleki
, Hamid Reza Faragardi, Amir Masoud Rahmani, Mauro Conti
, Jay F. Lofstead
:
TMaR: a two-stage MapReduce scheduler for heterogeneous environments. Hum. centric Comput. Inf. Sci. 10: 42 (2020) - [j130]Stefano Calzavara
, Mauro Conti
, Riccardo Focardi
, Alvise Rabitti, Gabriele Tolomei
:
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery. IEEE Secur. Priv. 18(3): 8-16 (2020) - [j129]Shanshan Wang, Zhenxiang Chen, Qiben Yan
, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti
:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020) - [j128]Mauro Conti
, Pallavi Kaliyar, Chhagan Lal:
A robust multicast communication protocol for Low power and Lossy networks. J. Netw. Comput. Appl. 164: 102675 (2020) - [j127]Rahim Taheri
, Reza Javidan, Mohammad Shojafar
, Zahra Pooranian
, Ali Miri, Mauro Conti
:
On defending against label flipping attacks on malware detection systems. Neural Comput. Appl. 32(18): 14781-14800 (2020) - [j126]Minho Jo, Kai Hu, Richard Yu, Li Sun, Mauro Conti
, Qinghe Du:
Private Blockchain in Industrial IoT. IEEE Netw. 34(5): 76-77 (2020) - [j125]Chia-Mu Yu
, Sarada Prasad Gochhayat
, Mauro Conti
, Chun-Shien Lu
:
Privacy Aware Data Deduplication for Side Channel in Cloud Storage. IEEE Trans. Cloud Comput. 8(2): 597-609 (2020) - [j124]Mohammad Hadi Alaeiyan
, Ali Dehghantanha, Tooska Dargahi
, Mauro Conti
, Saeed Parsa
:
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks. ACM Trans. Cyber Phys. Syst. 4(3): 31:1-31:22 (2020) - [j123]Mauro Conti
, Fabio De Gaspari
, Luigi V. Mancini
:
A Novel Stealthy Attack to Gather SDN Configuration-Information. IEEE Trans. Emerg. Top. Comput. 8(2): 328-340 (2020) - [j122]Neetesh Saxena
, Mauro Conti
, Kim-Kwang Raymond Choo
, Narendra S. Chaudhari:
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices. IEEE Trans. Inf. Forensics Secur. 15: 1470-1485 (2020) - [j121]Ankit Gangwal
, Mauro Conti
:
Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel. IEEE Trans. Inf. Forensics Secur. 15: 1630-1639 (2020) - [j120]Anshul Arora
, Sateesh Kumar Peddoju
, Mauro Conti
:
PermPair: Android Malware Detection Using Permission Pairs. IEEE Trans. Inf. Forensics Secur. 15: 1968-1982 (2020) - [j119]Edlira Dushku
, Md Masoom Rabbani
, Mauro Conti
, Luigi V. Mancini
, Silvio Ranise
:
SARA: Secure Asynchronous Remote Attestation for IoT Systems. IEEE Trans. Inf. Forensics Secur. 15: 3123-3136 (2020) - [j118]Meng Li
, Donghui Hu
, Chhagan Lal
, Mauro Conti
, Zijian Zhang
:
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(10): 6564-6574 (2020) - [j117]Agostino Sturaro, Simone Silvestri
, Mauro Conti
, Sajal K. Das
:
A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 7(2): 817-831 (2020) - [j116]Santhanakrishnan Anand
, Ding Ding, Paolo Gasti
, Mike O'Neal, Mauro Conti
, Kiran S. Balagani
:
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures. IEEE Trans. Netw. Serv. Manag. 17(1): 201-212 (2020) - [j115]Neminath Hubballi
, Mayank Swarnkar
, Mauro Conti
:
BitProb: Probabilistic Bit Signatures for Accurate Application Identification. IEEE Trans. Netw. Serv. Manag. 17(3): 1730-1741 (2020) - [j114]Anshu S. Anand, Mauro Conti
, Pallavi Kaliyar, Chhagan Lal
:
TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks. Wirel. Networks 26(4): 2449-2463 (2020) - [c190]Mauro Conti
, Giulio Rigoni
, Flavio Toffalini:
ASAINT: a spy App identification system based on network traffic. ARES 2020: 51:1-51:8 - [c189]Andrea Calesso, Mauro Conti
, Martino Grasselli:
CyberWolf: assessing vulnerabilities of ICT-intensive financial markets. ARES 2020: 86:1-86:7 - [c188]Matteo Cardaioli, Merylin Monaro, Giuseppe Sartori, Mauro Conti
:
Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics. AHFE (19) 2020: 41-48 - [c187]Matteo Cardaioli, Pallavi Kaliyar, Pasquale Capuozzo, Mauro Conti
, Giuseppe Sartori, Merylin Monaro:
Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario. ASONAM 2020: 159-165 - [c186]Ioanna Angeliki Kapetanidou
, Muhammad Hassan
, Christos-Alexandros Sarros
, Mauro Conti
, Vassilis Tsaoussidis
:
Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking. BigDataSE 2020: 114-121 - [c185]Francesco Bizzaro, Mauro Conti
, Maria Silvia Pini:
Proof of Evolution: leveraging blockchain mining for a cooperative execution of Genetic Algorithms. Blockchain 2020: 450-455 - [c184]Ankit Gangwal
, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti
:
Detecting Covert Cryptomining Using HPC. CANS 2020: 344-364 - [c183]Federico Turrin
, Alessandro Erba
, Nils Ole Tippenhauer
, Mauro Conti
:
A Statistical Analysis Framework for ICS Process Datasets. CPSIOTSEC@CCS 2020: 25-30 - [c182]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Luca Pajola, Federico Turrin:
Fake News Spreaders Profiling Through Behavioural Analysis. CLEF (Working Notes) 2020 - [c181]Mattia Carlucci, Stefano Cecconello, Mauro Conti
, Piero Romare
:
Eathentication: A Chewing-based Authentication Method. CNS 2020: 1-9 - [c180]Fabio Aiolli, Mauro Conti
, Stjepan Picek, Mirko Polato:
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems. ESORICS (2) 2020: 165-184 - [c179]Mauro Conti
, Pier Paolo Tricomi, Gene Tsudik:
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon. ESORICS (1) 2020: 277-294 - [c178]Matteo Cardaioli, Mauro Conti
, Kiran S. Balagani, Paolo Gasti:
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage. ESORICS (1) 2020: 720-735 - [c177]Amrita Ghosal, Subir Halder, Mauro Conti
:
STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles. ICC 2020: 1-6 - [c176]Subir Halder, Mauro Conti
, Sajal K. Das:
COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks. ICDCN 2020: 22:1-22:10 - [c175]Yifei Chen
, Meng Li, Shuli Zheng, Donghui Hu, Chhagan Lal, Mauro Conti
:
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud. ICICS 2020: 350-365 - [c174]Md Masoom Rabbani, Jo Vliegen, Mauro Conti, Nele Mentens
:
SHeFU: Secure Hardware-Enabled Protocol for Firmware Updates. ISCAS 2020: 1-5 - [c173]Mauro Conti
, Pier Paolo Tricomi
:
PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition. ISC 2020: 393-408 - [c172]Alberto Compagno, Mauro Conti
, Eleonora Losiouk
, Gene Tsudik, Sebastiano Valle:
A Proactive Cache Privacy Attack on NDN. NOMS 2020: 1-7 - [c171]Giuseppe Bernieri, Mauro Conti
, Matteo Sovilla, Federico Turrin
:
ALISI: a lightweight identification system based on Iroha. SAC 2020: 271-273 - [c170]Filippo Berto
, Luca Calderoni
, Mauro Conti
, Eleonora Losiouk
:
Spatial bloom filter in named data networking: a memory efficient solution. SAC 2020: 274-277 - [c169]Francesco Betti Sorbelli
, Mauro Conti
, Cristina M. Pinotti
, Giulio Rigoni
:
UAVs Path Deviation Attacks: Survey and Research Challenges. SECON Workshops 2020: 1-6 - [c168]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen
, Hidayet Aksu, Mauro Conti
, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! WISEC 2020: 207-218 - [e9]Mauro Conti
, Jianying Zhou, Emiliano Casalicchio
, Angelo Spognardi
:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12146, Springer 2020, ISBN 978-3-030-57807-7 [contents] - [e8]Mauro Conti
, Jianying Zhou, Emiliano Casalicchio
, Angelo Spognardi
:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12147, Springer 2020, ISBN 978-3-030-57877-0 [contents] - [e7]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i72]Zahra Pooranian, Mauro Conti, Hamed Hadaddi:
Online Advertising Security: Issues, Taxonomy, and Future Directions. CoRR abs/2006.03986 (2020) - [i71]Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin:
Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis. CoRR abs/2007.01114 (2020) - [i70]Federico Tavella, Alberto Giaretta, Mauro Conti, Sasitharan Balasubramaniam:
A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems. CoRR abs/2009.13380 (2020) - [i69]Habib Mostafaei, Mohammad Shojafar, Mauro Conti:
TEL: Low-Latency Failover Traffic Engineering in Data Plane. CoRR abs/2009.13640 (2020) - [i68]Marco Alecci, Riccardo Cestaro, Mauro Conti, Ketan Kanishka, Eleonora Losiouk:
Mascara: A Novel Attack Leveraging Android Virtualization. CoRR abs/2010.10639 (2020) - [i67]Marco Casagrande, Mauro Conti, Eleonora Losiouk:
Contact Tracing Made Un-relay-able. CoRR abs/2010.12641 (2020)
2010 – 2019
- 2019
- [j113]Armir Bujari
, Mauro Conti
, Carla De Francesco
, Claudio E. Palazzi
:
Fast multi-hop broadcast of alert messages in VANETs: An analytical model. Ad Hoc Networks 82: 126-133 (2019) - [j112]Balu Deokate, Chhagan Lal
, Denis Trcek, Mauro Conti
:
Mobility-aware cross-layer routing for peer-to-peer networks. Comput. Electr. Eng. 73: 209-226 (2019) - [j111]Subir Halder
, Amrita Ghosal
, Mauro Conti
:
Efficient physical intrusion detection in Internet of Things: A Node deployment approach. Comput. Networks 154: 28-46 (2019) - [j110]Mohammad Mahdi Tajiki
, Mohammad Shojafar
, Behzad Akbari, Stefano Salsano, Mauro Conti
, Mukesh Singhal:
Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN. Comput. Networks 162 (2019) - [j109]Mauro Conti
, Muhammad Hassan
, Chhagan Lal:
BlockAuth: BlockChain based distributed producer authentication in ICN. Comput. Networks 164 (2019) - [j108]Mohammad Hadi Alaeiyan
, Saeed Parsa
, Mauro Conti
:
Analysis and classification of context-based malware behavior. Comput. Commun. 136: 76-90 (2019) - [j107]Vanga Odelu
, Sourav Saha
, Rajendra Prasath
, Lakshminarayana Sadineni
, Mauro Conti
, Minho Jo
:
Efficient privacy preserving device authentication in WBANs for industrial e-health applications. Comput. Secur. 83: 300-312 (2019) - [j106]Amrita Ghosal
, Mauro Conti
:
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey. IEEE Commun. Surv. Tutorials 21(3): 2831-2848 (2019) - [j105]Mauro Conti
, Pallavi Kaliyar, Chhagan Lal
:
CENSOR: Cloud-enabled secure IoT architecture over SDN paradigm. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j104]Mohammad Mahdi Tajiki
, Mohammad Shojafar
, Behzad Akbari, Stefano Salsano
, Mauro Conti
:
Software defined service function chaining with failure consideration for fog computing. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j103]Deepa K, Radhamani G
, Vinod P
, Mohammad Shojafar
, Neeraj Kumar
, Mauro Conti
:
Identification of Android malware using refined system calls. Concurr. Comput. Pract. Exp. 31(20) (2019) - [j102]Ding Ding, Mauro Conti
, Renato Figueiredo
:
SAND: Social-aware, network-failure resilient, and decentralized microblogging system. Future Gener. Comput. Syst. 93: 637-650 (2019) - [j101]Vinod P, Akka Zemmari
, Mauro Conti
:
A machine learning based approach to detect malicious android apps using discriminant system calls. Future Gener. Comput. Syst. 94: 333-350 (2019) - [j100]Giuseppe Bianchi, Tooska Dargahi
, Alberto Caponi
, Mauro Conti
:
Intelligent conditional collaborative private data sharing. Future Gener. Comput. Syst. 96: 1-10 (2019) - [j99]Seyed Farhad Aghili
, Hamid Mala, Pallavi Kaliyar, Mauro Conti
:
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. Future Gener. Comput. Syst. 101: 621-634 (2019) - [j98]Reza Mohammadi
, Mauro Conti, Chhagan Lal
, Satish C. Kulhari:
SYN-Guard: An effective counter for SYN flooding attack in software-defined networking. Int. J. Commun. Syst. 32(17) (2019) - [j97]Anil Saini, Manoj Singh Gaur, Vijay Laxmi
, Mauro Conti
:
You click, I steal: analyzing and detecting click hijacking attacks in web pages. Int. J. Inf. Sec. 18(4): 481-504 (2019) - [j96]Md Masoom Rabbani
, Jo Vliegen, Jori Winderickx
, Mauro Conti
, Nele Mentens
:
SHeLA: Scalable Heterogeneous Layered Attestation. IEEE Internet Things J. 6(6): 10240-10250 (2019) - [j95]Attaullah Buriro
, Bruno Crispo
, Mauro Conti
:
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones. J. Inf. Secur. Appl. 44: 89-103 (2019) - [j94]Kiran S. Balagani, Matteo Cardaioli, Mauro Conti
, Paolo Gasti, Martin Georgiev
, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin
, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN information leakage from obfuscated typing videos. J. Comput. Secur. 27(4): 405-425 (2019) - [j93]Brijesh B. Mehta
, Udai Pratap Rao, Ruchika Gupta, Mauro Conti
:
Towards privacy preserving unstructured big data publishing. J. Intell. Fuzzy Syst. 36(4): 3471-3482 (2019) - [j92]Paola Gabriela Vinueza Naranjo, Zahra Pooranian
, Mohammad Shojafar
, Mauro Conti
, Rajkumar Buyya
:
FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments. J. Parallel Distributed Comput. 132: 274-283 (2019) - [j91]Kim-Kwang Raymond Choo, Mauro Conti, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1. IEEE Trans. Big Data 5(3): 279-281 (2019) - [j90]Kim-Kwang Raymond Choo
, Mauro Conti
, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2. IEEE Trans. Big Data 5(4): 423-424 (2019) - [j89]Gergely Ács
, Mauro Conti
, Paolo Gasti
, Cesar Ghali
, Gene Tsudik, Christopher A. Wood
:
Privacy-Aware Caching in Information-Centric Networking. IEEE Trans. Dependable Secur. Comput. 16(2): 313-328 (2019) - [j88]Neeraj Kumar
, Gagangeet Singh Aujla
, Ashok Kumar Das
, Mauro Conti
:
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System. IEEE Trans. Ind. Informatics 15(12): 6572-6582 (2019) - [j87]Stefano Cecconello, Alberto Compagno, Mauro Conti
, Daniele Lain, Gene Tsudik:
Skype & Type: Keyboard Eavesdropping in Voice-over-IP. ACM Trans. Priv. Secur. 22(4): 24:1-24:34 (2019) - [j86]Neda Maleki, Amir Masoud Rahmani
, Mauro Conti
:
MapReduce: an infrastructure review and research insights. J. Supercomput. 75(10): 6934-7002 (2019) - [j85]Ding Ding
, Mauro Conti
, Renato Figueiredo
:
Wide-Scale Internet Disconnection: Impact and Recovery on Social-Based P2P Overlays. IEEE Trans. Netw. Sci. Eng. 6(4): 734-747 (2019) - [j84]Tooska Dargahi
, Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti
, Giuseppe Bianchi, Loris Benedetto:
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features. J. Comput. Virol. Hacking Tech. 15(4): 277-305 (2019) - [j83]Mauro Conti
, Chhagan Lal
, Reza Mohammadi
, Umashankar Rawat
:
Lightweight solutions to counter DDoS attacks in software defined networking. Wirel. Networks 25(5): 2751-2768 (2019) - [j82]Subir Halder
, Amrita Ghosal, Mauro Conti
:
LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things. Wirel. Networks 25(8): 4459-4477 (2019) - [c167]Mauro Conti
, Ankit Gangwal
, Michele Todero:
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages. ARES 2019: 16:1-16:8 - [c166]Mohammad Hajian Berenjestanaki
, Mauro Conti
, Ankit Gangwal
:
On the Exploitation of Online SMS Receiving Services to Forge ID Verification. ARES 2019: 22:1-22:5 - [c165]Giuseppe Bernieri, Mauro Conti
, Gabriele Pozzan:
AMON: an Automaton MONitor for Industrial Cyber-Physical Security. ARES 2019: 33:1-33:10 - [c164]Michal Piskozub, Riccardo Spolaor, Mauro Conti
, Ivan Martinovic:
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks. MTD@CCS 2019: 1-12 - [c163]Eduard Marin
, Nicola Bucciol, Mauro Conti
:
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures. CCS 2019: 1101-1114 - [c162]Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti
, Linda Bushnell
, Radha Poovendran
:
Detecting ADS-B Spoofing Attacks Using Deep Neural Networks. CNS 2019: 187-195 - [c161]Jo Vliegen, Md Masoom Rabbani, Mauro Conti
, Nele Mentens
:
SACHa: Self-Attestation of Configurable Hardware. DATE 2019: 746-751 - [c160]Stefano Calzavara
, Mauro Conti
, Riccardo Focardi
, Alvise Rabitti, Gabriele Tolomei:
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities. EuroS&P 2019: 528-543 - [c159]Shubhani Aggarwal
, Mohammad Shojafar
, Neeraj Kumar
, Mauro Conti
:
A New Secure Data Dissemination Model in Internet of Drones. ICC 2019: 1-6 - [c158]Amrita Ghosal, Subir Halder, Mauro Conti
:
DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things. ICCCN 2019: 1-9 - [c157]Xuhang Ying, Giuseppe Bernieri
, Mauro Conti
, Radha Poovendran
:
TACAN: transmitter authentication through covert channels in controller area networks. ICCPS 2019: 23-34 - [c156]Neda Maleki, Mohammad Loni, Masoud Daneshtalab, Mauro Conti
, Hossein Fotouhi:
SoFA: A Spark-oriented Fog Architecture. IECON 2019: 2792-2799 - [c155]Seyed Farhad Aghili
, Hamid Mala, Mohammad Shojafar
, Mauro Conti
:
PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things. INFOCOM Workshops 2019: 348-353 - [c154]Mauro Conti
, Edlira Dushku
, Luigi V. Mancini, Md Masoom Rabbani
, Silvio Ranise:
Remote Attestation as a Service for IoT. IoTSMS 2019: 320-325 - [c153]Muhammad Hassan
, Hani Salah, Mauro Conti
, Frank H. P. Fitzek
, Thorsten Strufe:
CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN. ISCC 2019: 1-7 - [c152]Giuseppe Bernieri
, Mauro Conti
, Federico Turrin
:
Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks. M&N 2019: 1-6 - [c151]Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti:
ScaRR: Scalable Runtime Remote Attestation for Complex Systems. RAID 2019: 121-134 - [c150]Subir Halder, Mauro Conti
:
Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystem. SAC 2019: 284-291 - [c149]Fabio Aiolli, Mauro Conti
, Ankit Gangwal
, Mirko Polato:
Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis. SAC 2019: 1484-1491 - [c148]Mauro Conti
, Edlira Dushku
, Luigi V. Mancini:
RADIS: Remote Attestation of Distributed IoT Services. SDS 2019: 25-32 - [c147]Giuseppe Bernieri
, Mauro Conti
, Federico Turrin
:
KingFisher: an Industrial Security Framework based on Variational Autoencoders. SenSys-ML 2019: 7-12 - [c146]Giuseppe Bernieri, Mauro Conti
, Federica Pascucci:
MimePot: a Model-based Honeypot for Industrial Control Networks. SMC 2019: 433-438 - [c145]Luca Pajola, Luca Pasa, Mauro Conti:
Threat is in the Air: Machine Learning for Wireless Network Applications. WiseML@WiSec 2019: 16-21 - [c144]Abdelmadjid Benarfa
, Muhammad Hassan
, Alberto Compagno, Eleonora Losiouk
, Mohamed Bachir Yagoubi, Mauro Conti
:
ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN. WWIC 2019: 53-65 - [p9]Mauro Conti
, Pallavi Kaliyar, Chhagan Lal:
Secure Machine to Machine Communication in Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 199-219 - [p8]Ema Kusen
, Mark Strembeck, Mauro Conti:
Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube. Influence and Behavior Analysis in Social Networks and Social Media 2019: 63-83 - [e6]Sjouke Mauw, Mauro Conti:
Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings. Lecture Notes in Computer Science 11738, Springer 2019, ISBN 978-3-030-31510-8 [contents] - [i66]Mauro Conti, Ankit Gangwal, Michele Todero:
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages. CoRR abs/1901.10019 (2019) - [i65]Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Radha Poovendran:
TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks. CoRR abs/1903.05231 (2019) - [i64]Mauro Conti, Ankit Gangwal, Muhammad Hassan, Chhagan Lal, Eleonora Losiouk:
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions. CoRR abs/1903.07446 (2019) - [i63]Kiran S. Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos. CoRR abs/1904.00188 (2019) - [i62]Subir Halder, Amrita Ghosal, Mauro Conti:
Secure OTA Software Updates in Connected Vehicles: A survey. CoRR abs/1904.00685 (2019) - [i61]Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
Reliable Group Communication Protocol for Internet of Things. CoRR abs/1904.04542 (2019) - [i60]Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions. CoRR abs/1904.04577 (2019) - [i59]Rahim Taheri, Reza Javidan, Mohammad Shojafar, Vinod P, Mauro Conti:
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach. CoRR abs/1904.09433 (2019) - [i58]Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran:
Detecting ADS-B Spoofing Attacks using Deep Neural Networks. CoRR abs/1904.09969 (2019) - [i57]Matteo Cardaioli, Mauro Conti, Kiran S. Balagani, Paolo Gasti:
Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage. CoRR abs/1905.08742 (2019) - [i56]Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti:
On Defending Against Label Flipping Attacks on Malware Detection Systems. CoRR abs/1908.04473 (2019) - [i55]Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti:
Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features. CoRR abs/1908.05759 (2019) - [i54]Mauro Conti, Ankit Gangwal, Gianluca Lain, Samuele Giuliano Piazzetta:
Detecting Covert Cryptomining using HPC. CoRR abs/1909.00268 (2019) - [i53]Alessandro Visintin, Flavio Toffalini, Mauro Conti, Jianying Zhou:
SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices. CoRR abs/1909.08168 (2019) - [i52]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. CoRR abs/1910.04232 (2019) - [i51]Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. CoRR abs/1912.04735 (2019) - [i50]Matteo Cinelli, Mauro Conti, Livio Finos, Francesco Grisolia, Petra Kralj Novak, Antonio Peruzzi, Maurizio Tesconi, Fabiana Zollo, Walter Quattrociocchi:
(Mis)Information Operations: An Integrated Perspective. CoRR abs/1912.10795 (2019) - [i49]Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens:
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware. IACR Cryptol. ePrint Arch. 2019: 405 (2019) - [i48]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. IACR Cryptol. ePrint Arch. 2019: 1188 (2019) - 2018
- [j81]Chuan Zhao
, Shengnan Zhao
, Bo Zhang
, Zhongtian Jia, Zhenxiang Chen, Mauro Conti
:
Secure Comparison Under Ideal/Real Simulation Paradigm. IEEE Access 6: 31236-31248 (2018) - [j80]Hidayet Aksu, Leonardo Babun, Mauro Conti
, Gabriele Tolomei, A. Selcuk Uluagac
:
Advertising in the IoT Era: Vision and Challenges. IEEE Commun. Mag. 56(11): 138-144 (2018) - [j79]Wafa Ben Jaballah, Mauro Conti
, Gilberto Filé, Mohamed Mosbah
, Akka Zemmari
:
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks. Comput. Commun. 119: 66-82 (2018) - [j78]Mauro Conti
, Ralph E. Droms
, Muhammad Hassan
, Chhagan Lal
:
Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN. Comput. Commun. 129: 209-225 (2018) - [j77]Mauro Conti
, Ankit Gangwal
, Sushmita Ruj
:
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective. Comput. Secur. 79: 162-189 (2018) - [j76]Moreno Ambrosin
, Alberto Compagno
, Mauro Conti
, Cesar Ghali
, Gene Tsudik:
Security and Privacy Analysis of National Science Foundation Future Internet Architectures. IEEE Commun. Surv. Tutorials 20(2): 1418-1442 (2018) - [j75]Mauro Conti
, QianQian Li, Alberto Maragno
, Riccardo Spolaor
:
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis. IEEE Commun. Surv. Tutorials 20(4): 2658-2713 (2018) - [j74]Mauro Conti
, Sandeep Kumar E
, Chhagan Lal
, Sushmita Ruj
:
A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutorials 20(4): 3416-3452 (2018) - [j73]Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Mauro Conti
:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. ACM Comput. Surv. 51(4): 79:1-79:35 (2018) - [j72]Giuseppe Cascavilla
, Mauro Conti
, David G. Schwartz
, Inbal Yahav
:
The insider on the outside: a novel system for the detection of information leakers in social networks. Eur. J. Inf. Syst. 27(4): 470-485 (2018) - [j71]Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson
:
Internet of Things security and forensics: Challenges and opportunities. Future Gener. Comput. Syst. 78: 544-546 (2018) - [j70]Rifaqat Ali
, Arup Kumar Pal, Saru Kumari
, Marimuthu Karuppiah
, Mauro Conti:
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener. Comput. Syst. 84: 200-215 (2018) - [j69]Seyed Hossein Hosseini Nazhad, Mohammad Shojafar
, Shahaboddin Shamshirband, Mauro Conti
:
An efficient routing protocol for the QoS support of large-scale MANETs. Int. J. Commun. Syst. 31(1) (2018) - [j68]Mohammad Wazid
, Ashok Kumar Das
, Vanga Odelu
, Neeraj Kumar
, Mauro Conti
, Minho Jo
:
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet Things J. 5(1): 269-282 (2018) - [j67]Amin Azmoodeh, Ali Dehghantanha
, Mauro Conti, Kim-Kwang Raymond Choo
:
Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intell. Humaniz. Comput. 9(4): 1141-1152 (2018) - [j66]Giuseppe Cascavilla
, Filipe Beato, Andrea Burattin
, Mauro Conti
, Luigi Vincenzo Mancini:
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles. Online Soc. Networks Media 6: 58-68 (2018) - [j65]Gaurav Somani
, Manoj Singh Gaur
, Dheeraj Sanghi, Mauro Conti
, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Trans. Dependable Secur. Comput. 15(6): 959-973 (2018) - [j64]Vincent F. Taylor
, Riccardo Spolaor
, Mauro Conti
, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. IEEE Trans. Inf. Forensics Secur. 13(1): 63-78 (2018) - [j63]Shanshan Wang, Qiben Yan
, Zhenxiang Chen
, Bo Yang
, Chuan Zhao, Mauro Conti
:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [j62]Po-Yen Lee, Chia-Mu Yu
, Tooska Dargahi
, Mauro Conti
, Giuseppe Bianchi:
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. IEEE Trans. Inf. Forensics Secur. 13(8): 2031-2046 (2018) - [j61]Mohammad Wazid
, Ashok Kumar Das
, Neeraj Kumar
, Mauro Conti
, Athanasios V. Vasilakos
:
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment. IEEE J. Biomed. Health Informatics 22(4): 1299-1309 (2018) - [j60]Riccardo Spolaor
, Elia Dal Santo, Mauro Conti
:
DELTA: Data Extraction and Logging Tool for Android. IEEE Trans. Mob. Comput. 17(6): 1289-1302 (2018) - [j59]Prashant Kumar, Meenakshi Tripathi
, Ajay Nehra
, Mauro Conti
, Chhagan Lal
:
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN. IEEE Trans. Netw. Serv. Manag. 15(4): 1545-1559 (2018) - [j58]Vanga Odelu, Ashok Kumar Das
, Mohammad Wazid
, Mauro Conti
:
Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 9(3): 1900-1910 (2018) - [j57]Chhagan Lal
, Vijay Laxmi
, Manoj Singh Gaur, Mauro Conti
:
Enhancing QoE for video streaming in MANETs via multi-constraint routing. Wirel. Networks 24(1): 235-256 (2018) - [c143]Mayank Swarnkar
, Neminath Hubballi, Nikhil Tripathi
, Mauro Conti
:
AppHunter: Mobile Application Traffic Classification. ANTS 2018: 1-6 - [c142]