BibTeX records: Roberto Di Pietro

download as .bib file

@book{DBLP:series/ais/FernandezOP24,
  author       = {Javier Hernandez Fernandez and
                  Aymen Omri and
                  Roberto Di Pietro},
  title        = {Physical Layer Security in Power Line Communications - Fundamentals,
                  Models and Applications},
  series       = {Advances in Information Security},
  volume       = {108},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57349-1},
  doi          = {10.1007/978-3-031-57349-1},
  isbn         = {978-3-031-57348-4},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FernandezOP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RabhiP24,
  author       = {Mouna Rabhi and
                  Roberto Di Pietro},
  title        = {An efficient failure-resilient mutual exclusion algorithm for distributed
                  systems leveraging a novel zero-message overlay structure},
  journal      = {Comput. Commun.},
  volume       = {218},
  pages        = {1--13},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.02.007},
  doi          = {10.1016/J.COMCOM.2024.02.007},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/RabhiP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IbrahimSP24,
  author       = {Omar Adel Ibrahim and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {MAG-PUFs: Authenticating IoT devices via electromagnetic physical
                  unclonable functions and deep learning},
  journal      = {Comput. Secur.},
  volume       = {143},
  pages        = {103905},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103905},
  doi          = {10.1016/J.COSE.2024.103905},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/IbrahimSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/YangAFJPE24,
  author       = {Zebo Yang and
                  Haneen Alfauri and
                  Behrooz Farkiani and
                  Raj Jain and
                  Roberto Di Pietro and
                  Aiman Erbad},
  title        = {A Survey and Comparison of Post-Quantum and Quantum Blockchains},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {26},
  number       = {2},
  pages        = {967--1002},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMST.2023.3325761},
  doi          = {10.1109/COMST.2023.3325761},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/YangAFJPE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/RabhiBP24,
  author       = {Mouna Rabhi and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  title        = {Audio-deepfake detection: Adversarial attacks and countermeasures},
  journal      = {Expert Syst. Appl.},
  volume       = {250},
  pages        = {123941},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.123941},
  doi          = {10.1016/J.ESWA.2024.123941},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/RabhiBP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SalmanGPBAJC24,
  author       = {Tara Salman and
                  Ali Ghubaish and
                  Roberto Di Pietro and
                  Mohamed Baza and
                  Hani Alshahrani and
                  Raj Jain and
                  Kim{-}Kwang Raymond Choo},
  title        = {CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its
                  Use in Security},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3030--3047},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3322038},
  doi          = {10.1109/TDSC.2023.3322038},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SalmanGPBAJC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/IbrahimP24,
  author       = {Omar Adel Ibrahim and
                  Roberto Di Pietro},
  editor       = {Joaquin Garc{\'{\i}}a{-}Alfaro and
                  Rafal Kozik and
                  Michal Choras and
                  Sokratis K. Katsikas},
  title        = {{MAG-JAM:} Jamming Detection via Magnetic Emissions},
  booktitle    = {Computer Security - {ESORICS} 2024 - 29th European Symposium on Research
                  in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14982},
  pages        = {167--186},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-70879-4\_9},
  doi          = {10.1007/978-3-031-70879-4\_9},
  timestamp    = {Fri, 13 Sep 2024 21:29:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/IbrahimP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-10543,
  author       = {Maurantonio Caprolu and
                  Roberto Di Pietro and
                  Flavio Lombardi and
                  Elia Onofri},
  title        = {Characterizing Polkadot's Transactions Ecosystem: methodology, tools,
                  and insights},
  journal      = {CoRR},
  volume       = {abs/2404.10543},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.10543},
  doi          = {10.48550/ARXIV.2404.10543},
  eprinttype    = {arXiv},
  eprint       = {2404.10543},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-10543.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/EliyanP23,
  author       = {Lubna Fayez Eliyan and
                  Roberto Di Pietro},
  title        = {DeMi: {A} Solution to Detect and Mitigate DoS Attacks in {SDN}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {82477--82495},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3301994},
  doi          = {10.1109/ACCESS.2023.3301994},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/EliyanP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlyP23,
  author       = {Hussein A. Aly and
                  Roberto Di Pietro},
  title        = {PulseOblivion: An Effective Session-Based Continuous Authentication
                  Scheme Using {PPG} Signals},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {124213--124227},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3329993},
  doi          = {10.1109/ACCESS.2023.3329993},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlyP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/OmriFP23,
  author       = {Aymen Omri and
                  Javier Hernandez Fernandez and
                  Roberto Di Pietro},
  title        = {Extending device noise measurement capacity for OFDM-based {PLC} systems:
                  Design, implementation, and on-field validation},
  journal      = {Comput. Networks},
  volume       = {237},
  pages        = {110038},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.110038},
  doi          = {10.1016/J.COMNET.2023.110038},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/OmriFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SalveMRP23,
  author       = {Andrea De Salve and
                  Paolo Mori and
                  Laura Ricci and
                  Roberto Di Pietro},
  title        = {Content privacy enforcement models in decentralized online social
                  networks: State of play, solutions, limitations, and future directions},
  journal      = {Comput. Commun.},
  volume       = {203},
  pages        = {199--225},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.02.023},
  doi          = {10.1016/J.COMCOM.2023.02.023},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/SalveMRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Al-SadiPLS23,
  author       = {Mohammed Al{-}Sadi and
                  Roberto Di Pietro and
                  Flavio Lombardi and
                  Matteo Signorini},
  title        = {{LENTO:} Unpredictable Latency-based continuous authEntication for
                  Network inTensive IoT envirOnments},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {139},
  pages        = {151--166},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2022.09.023},
  doi          = {10.1016/J.FUTURE.2022.09.023},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/Al-SadiPLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WisseTSP23,
  author       = {Eva Wisse and
                  Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {A\({}^{\mbox{2}}\)RID - Anonymous Direct Authentication and Remote
                  Identification of Commercial Drones},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {12},
  pages        = {10587--10604},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3240477},
  doi          = {10.1109/JIOT.2023.3240477},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WisseTSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TedeschiSP23,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{PPCA} - Privacy-Preserving Collision Avoidance for Autonomous Unmanned
                  Aerial Vehicles},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1541--1558},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3159837},
  doi          = {10.1109/TDSC.2022.3159837},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TedeschiSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TedeschiBP23,
  author       = {Pietro Tedeschi and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  title        = {SpreadMeNot: {A} Provably Secure and Privacy-Preserving Contact Tracing
                  Protocol},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2500--2515},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3186153},
  doi          = {10.1109/TDSC.2022.3186153},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TedeschiBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OligeriSRP23,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Simone Raponi and
                  Roberto Di Pietro},
  title        = {{PAST-AI:} Physical-Layer Authentication of Satellite Transmitters
                  via Deep Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {274--289},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3219287},
  doi          = {10.1109/TIFS.2022.3219287},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OligeriSRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TedeschiSP23,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled
                  Drones},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {178--189},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627174},
  doi          = {10.1145/3627106.3627174},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TedeschiSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dappcon/CaproluBBP23,
  author       = {Maurantonio Caprolu and
                  Elmahdi Bentafat and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  title        = {{UBIC-A} Blockchain-Less Cryptocurrency},
  booktitle    = {{IEEE} International Conference on Decentralized Applications and
                  Infrastructures, {DAPPS} 2023, Athens, Greece, July 17-20, 2023},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DAPPS57946.2023.00013},
  doi          = {10.1109/DAPPS57946.2023.00013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dappcon/CaproluBBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AbbasCP23,
  author       = {Hanaa Abbas and
                  Maurantonio Caprolu and
                  Roberto Di Pietro},
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {Understanding Polkadot Through Graph Analysis: Transaction Model,
                  Network Properties, and Insights},
  booktitle    = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13951},
  pages        = {259--275},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47751-5\_15},
  doi          = {10.1007/978-3-031-47751-5\_15},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/AbbasCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/BelloSP23,
  author       = {Ahmad Sani Bello and
                  Jens Schneider and
                  Roberto Di Pietro},
  title        = {{LLD:} {A} Low Latency Detection Solution to Thwart Cryptocurrency
                  Pump {\&} Dumps},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICBC56567.2023.10174922},
  doi          = {10.1109/ICBC56567.2023.10174922},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/BelloSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/CaproluP23,
  author       = {Maurantonio Caprolu and
                  Roberto Di Pietro},
  title        = {Account Clustering in the Polkadot Network: Heuristic, Experiments,
                  and Insights},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICBC56567.2023.10174938},
  doi          = {10.1109/ICBC56567.2023.10174938},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/CaproluP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/CaproluSP23,
  author       = {Maurantonio Caprolu and
                  Alireza Sadighian and
                  Roberto Di Pietro},
  title        = {Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses
                  of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key
                  Findings},
  booktitle    = {32nd International Conference on Computer Communications and Networks,
                  {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCN58024.2023.10230192},
  doi          = {10.1109/ICCCN58024.2023.10230192},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/CaproluSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idsta/MahrousSP23,
  author       = {Ahmed Mahrous and
                  Jens Schneider and
                  Roberto Di Pietro},
  editor       = {Mohammad A. Alsmirat and
                  Yaser Jararweh and
                  Moayad Aloqaily and
                  Jaime Lloret},
  title        = {The Role of Emojis in Sentiment Analysis of Financial Microblogs},
  booktitle    = {Fourth International Conference on Intelligent Data Science Technologies
                  and Applications, {IDSTA} 2023, Kuwai, Kuwait, October 24-26, 2023},
  pages        = {76--84},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IDSTA58916.2023.10317863},
  doi          = {10.1109/IDSTA58916.2023.10317863},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idsta/MahrousSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/OmriFP23,
  author       = {Aymen Omri and
                  Javier Hernandez Fernandez and
                  Roberto Di Pietro},
  title        = {Subcarrier-Index Modulation for OFDM-based {PLC} Systems},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth,
                  Tunisia, July 9-12, 2023},
  pages        = {649--655},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISCC58397.2023.10217844},
  doi          = {10.1109/ISCC58397.2023.10217844},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/OmriFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/FernandezOP23,
  author       = {Javier Hernandez Fernandez and
                  Aymen Omri and
                  Roberto Di Pietro},
  title        = {Performance Analysis of Physical Layer Security in Power Line Communication
                  Networks},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth,
                  Tunisia, July 9-12, 2023},
  pages        = {777--782},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISCC58397.2023.10217916},
  doi          = {10.1109/ISCC58397.2023.10217916},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/FernandezOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/OmriFP23,
  author       = {Aymen Omri and
                  Javier Hernandez Fernandez and
                  Roberto Di Pietro},
  title        = {Secure and Successful Transmission Probability Analysis for {PLC}
                  Networks},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2023, Doha, Qatar, October 23-26, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISNCC58260.2023.10323769},
  doi          = {10.1109/ISNCC58260.2023.10323769},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isncc/OmriFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/IbrahimP23,
  author       = {Omar Adel Ibrahim and
                  Roberto Di Pietro},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Mag-Auth: Authenticating Wireless Transmitters and Receivers on the
                  Receiver Side via Magnetic Emissions},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {305--316},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590198},
  doi          = {10.1145/3558482.3590198},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/IbrahimP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-17251,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Angelo Spognardi and
                  Maurizio Tesconi and
                  Marinella Petrocchi},
  title        = {Demystifying Misconceptions in Social Bots Research},
  journal      = {CoRR},
  volume       = {abs/2303.17251},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.17251},
  doi          = {10.48550/ARXIV.2303.17251},
  eprinttype    = {arXiv},
  eprint       = {2303.17251},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-17251.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-12161,
  author       = {Mouna Rabhi and
                  Roberto Di Pietro},
  title        = {Adversarial Attacks Neutralization via Data Set Randomization},
  journal      = {CoRR},
  volume       = {abs/2306.12161},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.12161},
  doi          = {10.48550/ARXIV.2306.12161},
  eprinttype    = {arXiv},
  eprint       = {2306.12161},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-12161.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-12643,
  author       = {Waqas Aman and
                  Flavio Giorgi and
                  Giulio Attenni and
                  Saif Al{-}Kuwari and
                  Elmehdi Illi and
                  Marwa K. Qaraqe and
                  Gaia Maselli and
                  Roberto Di Pietro},
  title        = {Expanding Boundaries: Cross-Media Routing for Seamless Underwater
                  and Aerial Communication},
  journal      = {CoRR},
  volume       = {abs/2307.12643},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.12643},
  doi          = {10.48550/ARXIV.2307.12643},
  eprinttype    = {arXiv},
  eprint       = {2307.12643},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-12643.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-10598,
  author       = {Abdulah Jarouf and
                  Javier Hernandez Fernandez and
                  Aymen Omri and
                  Roberto Di Pietro},
  title        = {Inferring Power Grid Information with Power Line Communications: Review
                  and Insights},
  journal      = {CoRR},
  volume       = {abs/2308.10598},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.10598},
  doi          = {10.48550/ARXIV.2308.10598},
  eprinttype    = {arXiv},
  eprint       = {2308.10598},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-10598.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FernandezOP22,
  author       = {Javier Hernandez Fernandez and
                  Aymen Omri and
                  Roberto Di Pietro},
  title        = {Channel Impulse Response Multilevel Quantization for Power Line Communications},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {66113--66126},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3184038},
  doi          = {10.1109/ACCESS.2022.3184038},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FernandezOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/OligeriSIP22,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Omar Adel Ibrahim and
                  Roberto Di Pietro},
  title        = {{GPS} spoofing detection via crowd-sourced information for connected
                  vehicles},
  journal      = {Comput. Networks},
  volume       = {216},
  pages        = {109230},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109230},
  doi          = {10.1016/J.COMNET.2022.109230},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/OligeriSIP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/TedeschiSP22,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Satellite-based communications security: {A} survey of threats, solutions,
                  and research challenges},
  journal      = {Comput. Networks},
  volume       = {216},
  pages        = {109246},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109246},
  doi          = {10.1016/J.COMNET.2022.109246},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/TedeschiSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/IbrahimSP22,
  author       = {Omar Adel Ibrahim and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Noise2Weight: On detecting payload weight from drones acoustic emissions},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {134},
  pages        = {319--333},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.03.041},
  doi          = {10.1016/J.FUTURE.2022.03.041},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/IbrahimSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RaponiSOP22,
  author       = {Simone Raponi and
                  Savio Sciancalepore and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {3},
  pages        = {71--79},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2021.3110307},
  doi          = {10.1109/MSEC.2021.3110307},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RaponiSOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TedeschiJSWBP22,
  author       = {Pietro Tedeschi and
                  Kang Eun Jeon and
                  James She and
                  Simon Wong and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  title        = {Privacy-Preserving and Sustainable Contact Tracing Using Batteryless
                  Bluetooth Low-Energy Beacons},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {3},
  pages        = {91--100},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2021.3115497},
  doi          = {10.1109/MSEC.2021.3115497},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TedeschiJSWBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/PietroTI22,
  author       = {Roberto Di Pietro and
                  Ni Trieu and
                  Vincenzo Iovino},
  title        = {{COVID-19} and cybersecurity},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {321--323},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12084},
  doi          = {10.1049/ISE2.12084},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/PietroTI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/MarinPP22,
  author       = {Eduard Marin and
                  Diego Perino and
                  Roberto Di Pietro},
  title        = {Serverless computing: a security perspective},
  journal      = {J. Cloud Comput.},
  volume       = {11},
  pages        = {69},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13677-022-00347-w},
  doi          = {10.1186/S13677-022-00347-W},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/MarinPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TedeschiOP22,
  author       = {Pietro Tedeschi and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Localization of a Power-Modulated Jammer},
  journal      = {Sensors},
  volume       = {22},
  number       = {2},
  pages        = {646},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22020646},
  doi          = {10.3390/S22020646},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/TedeschiOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SciancaleporeTA22,
  author       = {Savio Sciancalepore and
                  Pietro Tedeschi and
                  Ahmed Aziz and
                  Roberto Di Pietro},
  title        = {Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication
                  of Vessels {AIS} Broadcasts},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2709--2726},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3069428},
  doi          = {10.1109/TDSC.2021.3069428},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SciancaleporeTA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/RaponiKOP22,
  author       = {Simone Raponi and
                  Zeinab Khalifa and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Fake News Propagation: {A} Review of Epidemic Models, Datasets, and
                  Insights},
  journal      = {{ACM} Trans. Web},
  volume       = {16},
  number       = {3},
  pages        = {12:1--12:34},
  year         = {2022},
  url          = {https://doi.org/10.1145/3522756},
  doi          = {10.1145/3522756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/RaponiKOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/AbbasCP22,
  author       = {Hanaa Abbas and
                  Maurantonio Caprolu and
                  Roberto Di Pietro},
  title        = {Analysis of Polkadot: Architecture, Internals, and Contradictions},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2022, Espoo,
                  Finland, August 22-25, 2022},
  pages        = {61--70},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/Blockchain55522.2022.00019},
  doi          = {10.1109/BLOCKCHAIN55522.2022.00019},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/AbbasCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IbrahimOP22,
  author       = {Omar Adel Ibrahim and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {109--117},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947258},
  doi          = {10.1109/CNS56114.2022.9947258},
  timestamp    = {Fri, 25 Nov 2022 09:04:32 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IbrahimOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SciancaleporeRC22,
  author       = {Savio Sciancalepore and
                  Simone Raponi and
                  Daniele Caldarola and
                  Roberto Di Pietro},
  editor       = {Cristina Alcaraz and
                  Liqun Chen and
                  Shujun Li and
                  Pierangela Samarati},
  title        = {{FRACTAL:} Single-Channel Multi-factor Transaction Authentication
                  Through a Compromised Terminal},
  booktitle    = {Information and Communications Security - 24th International Conference,
                  {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13407},
  pages        = {201--217},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15777-6\_12},
  doi          = {10.1007/978-3-031-15777-6\_12},
  timestamp    = {Fri, 02 Sep 2022 10:50:10 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/SciancaleporeRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/RabhiBP22,
  author       = {Mouna Rabhi and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  editor       = {Cristina Alcaraz and
                  Liqun Chen and
                  Shujun Li and
                  Pierangela Samarati},
  title        = {{FN2:} Fake News DetectioN Based on Textual and Contextual Features},
  booktitle    = {Information and Communications Security - 24th International Conference,
                  {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13407},
  pages        = {472--491},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15777-6\_26},
  doi          = {10.1007/978-3-031-15777-6\_26},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/RabhiBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Pietro22,
  author       = {Roberto Di Pietro},
  editor       = {Sven Dietrich and
                  Omar Chowdhury and
                  Daniel Takabi},
  title        = {Securing Content in Decentralized Online Social Networks: Solutions,
                  Limitations, and the Road Ahead},
  booktitle    = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and
                  Technologies, New York, NY, USA, June 8 - 10, 2022},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532105.3535041},
  doi          = {10.1145/3532105.3535041},
  timestamp    = {Mon, 13 Jun 2022 16:29:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Pietro22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/IbrahimSP22,
  author       = {Omar Adel Ibrahim and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {{MAG-PUF:} Magnetic Physical Unclonable Functions for Device Authentication
                  in the IoT},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_8},
  doi          = {10.1007/978-3-031-25538-0\_8},
  timestamp    = {Thu, 06 Jul 2023 17:45:42 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/IbrahimSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/IbrahimSP22,
  author       = {Omar Adel Ibrahim and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {{MAG-PUF} - Authenticating IoT Devices via Magnetic Physical Unclonable
                  Functions},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {290--291},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529656},
  doi          = {10.1145/3507657.3529656},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/IbrahimSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eicc/2022,
  editor       = {David Meg{\'{\i}}as and
                  Roberto Di Pietro and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {{EICC} 2022: European Interdisciplinary Cybersecurity Conference,
                  Barcelona, Spain, June 15 - 16, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528580},
  doi          = {10.1145/3528580},
  isbn         = {978-1-4503-9603-5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eicc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022-1,
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6},
  doi          = {10.1007/978-3-031-17140-6},
  isbn         = {978-3-031-17139-0},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022-2,
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8},
  doi          = {10.1007/978-3-031-17146-8},
  isbn         = {978-3-031-17145-1},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022-3,
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7},
  doi          = {10.1007/978-3-031-17143-7},
  isbn         = {978-3-031-17142-0},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-07590,
  author       = {Roberto Di Pietro and
                  Stefano Cresci},
  title        = {Metaverse: Security and Privacy Issues},
  journal      = {CoRR},
  volume       = {abs/2205.07590},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.07590},
  doi          = {10.48550/ARXIV.2205.07590},
  eprinttype    = {arXiv},
  eprint       = {2205.07590},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-07590.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-03084,
  author       = {Andrea De Salve and
                  Paolo Mori and
                  Laura Ricci and
                  Roberto Di Pietro},
  title        = {Content Privacy Enforcement Models in Decentralized Online Social
                  Networks: State of Play, Solutions, Limitations, and Future Directions},
  journal      = {CoRR},
  volume       = {abs/2206.03084},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.03084},
  doi          = {10.48550/ARXIV.2206.03084},
  eprinttype    = {arXiv},
  eprint       = {2206.03084},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-03084.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-02051,
  author       = {Hanaa Abbas and
                  Roberto Di Pietro},
  title        = {Sanitization of Visual Multimedia Content: {A} Survey of Techniques,
                  Attacks, and Future Directions},
  journal      = {CoRR},
  volume       = {abs/2207.02051},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.02051},
  doi          = {10.48550/ARXIV.2207.02051},
  eprinttype    = {arXiv},
  eprint       = {2207.02051},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-02051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-14128,
  author       = {Hanaa Abbas and
                  Maurantonio Caprolu and
                  Roberto Di Pietro},
  title        = {Analysis of Polkadot: Architecture, Internals, and Contradictions},
  journal      = {CoRR},
  volume       = {abs/2207.14128},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.14128},
  doi          = {10.48550/ARXIV.2207.14128},
  eprinttype    = {arXiv},
  eprint       = {2207.14128},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-14128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-04903,
  author       = {Maurantonio Caprolu and
                  Alireza Sadighian and
                  Roberto Di Pietro},
  title        = {Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses
                  of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary
                  Findings},
  journal      = {CoRR},
  volume       = {abs/2208.04903},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.04903},
  doi          = {10.48550/ARXIV.2208.04903},
  eprinttype    = {arXiv},
  eprint       = {2208.04903},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-04903.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-11743,
  author       = {Eva Wisse and
                  Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {A\({}^{\mbox{2}}\)RID - Anonymous Direct Authentication and Remote
                  Identification of Commercial Drones},
  journal      = {CoRR},
  volume       = {abs/2210.11743},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.11743},
  doi          = {10.48550/ARXIV.2210.11743},
  eprinttype    = {arXiv},
  eprint       = {2210.11743},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-11743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/PietroRCC21,
  author       = {Roberto Di Pietro and
                  Simone Raponi and
                  Maurantonio Caprolu and
                  Stefano Cresci},
  title        = {New Dimensions of Information Warfare},
  series       = {Advances in Information Security},
  volume       = {84},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-60618-3},
  doi          = {10.1007/978-3-030-60618-3},
  isbn         = {978-3-030-60617-6},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/PietroRCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PopperMP21,
  author       = {Christina P{\"{o}}pper and
                  Michail Maniatakos and
                  Roberto Di Pietro},
  title        = {Cyber security research in the Arab region: a blooming ecosystem with
                  global ambitions},
  journal      = {Commun. {ACM}},
  volume       = {64},
  number       = {4},
  pages        = {96--101},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447741},
  doi          = {10.1145/3447741},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/PopperMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/TedeschiBP21,
  author       = {Pietro Tedeschi and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  title        = {IoTrace: {A} Flexible, Efficient, and Privacy-Preserving IoT-Enabled
                  Architecture for Contact Tracing},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {59},
  number       = {6},
  pages        = {82--88},
  year         = {2021},
  url          = {https://doi.org/10.1109/MCOM.001.2000729},
  doi          = {10.1109/MCOM.001.2000729},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/TedeschiBP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/CaproluROP21,
  author       = {Maurantonio Caprolu and
                  Simone Raponi and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Cryptomining makes noise: Detecting cryptojacking via Machine Learning},
  journal      = {Comput. Commun.},
  volume       = {171},
  pages        = {126--139},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comcom.2021.02.016},
  doi          = {10.1016/J.COMCOM.2021.02.016},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/CaproluROP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/CaproluSP21,
  author       = {Maurantonio Caprolu and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Short-Range Audio Channels Security: Survey of Mechanisms, Applications,
                  and Research Challenges},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {23},
  number       = {1},
  pages        = {311--340},
  year         = {2021},
  url          = {https://doi.org/10.1109/COMST.2020.2969030},
  doi          = {10.1109/COMST.2020.2969030},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/CaproluSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AliCP20,
  author       = {Isra Mohamed Ali and
                  Maurantonio Caprolu and
                  Roberto Di Pietro},
  title        = {Foundations, Properties, and Security Applications of Puzzles: {A}
                  Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {53},
  number       = {4},
  pages        = {72:1--72:38},
  year         = {2021},
  url          = {https://doi.org/10.1145/3396374},
  doi          = {10.1145/3396374},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AliCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/EliyanP21,
  author       = {Lubna Fayez Eliyan and
                  Roberto Di Pietro},
  title        = {DoS and DDoS attacks in Software Defined Networks: {A} survey of existing
                  solutions and research challenges},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {122},
  pages        = {149--171},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2021.03.011},
  doi          = {10.1016/J.FUTURE.2021.03.011},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/EliyanP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SciancaleporeP21,
  author       = {Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{PPRQ:} Privacy-Preserving {MAX/MIN} Range Queries in IoT Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {6},
  pages        = {5075--5092},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3037115},
  doi          = {10.1109/JIOT.2020.3037115},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/SciancaleporeP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SciancaleporeAP21,
  author       = {Savio Sciancalepore and
                  Saeif Alhazbi and
                  Roberto Di Pietro},
  title        = {Receivers location privacy in avionic crowdsourced networks: Issues
                  and countermeasures},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {174},
  pages        = {102892},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2020.102892},
  doi          = {10.1016/J.JNCA.2020.102892},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SciancaleporeAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SciancaleporeP21,
  author       = {Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{SOS:} Standard-Compliant and Packet Loss Tolerant Security Framework
                  for {ADS-B} Communications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1681--1698},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2934446},
  doi          = {10.1109/TDSC.2019.2934446},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SciancaleporeP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/IbrahimSOP21,
  author       = {Omar Adel Ibrahim and
                  Savio Sciancalepore and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {{MAGNETO:} Fingerprinting {USB} Flash Drives via Unintentional Magnetic
                  Emissions},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {8:1--8:26},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422308},
  doi          = {10.1145/3422308},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tecs/IbrahimSOP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkdd/SalveMGRP21,
  author       = {Andrea De Salve and
                  Paolo Mori and
                  Barbara Guidi and
                  Laura Ricci and
                  Roberto Di Pietro},
  title        = {Predicting Influential Users in Online Social Network Groups},
  journal      = {{ACM} Trans. Knowl. Discov. Data},
  volume       = {15},
  number       = {3},
  pages        = {35:1--35:50},
  year         = {2021},
  url          = {https://doi.org/10.1145/3441447},
  doi          = {10.1145/3441447},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkdd/SalveMGRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/TedeschiSP21,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{ARID:} Anonymous Remote IDentification of Unmanned Aerial Vehicles},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485834},
  doi          = {10.1145/3485832.3485834},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/TedeschiSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/CaproluPSSP21,
  author       = {Maurantonio Caprolu and
                  Matteo Pontecorvi and
                  Matteo Signorini and
                  Carlos Segarra and
                  Roberto Di Pietro},
  editor       = {Yang Xiang and
                  Ziyuan Wang and
                  Honggang Wang and
                  Valtteri Niemi},
  title        = {Analysis and Patterns of Unknown Transactions in Bitcoin},
  booktitle    = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021,
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {170--179},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/Blockchain53845.2021.00031},
  doi          = {10.1109/BLOCKCHAIN53845.2021.00031},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/CaproluPSSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SciancaleporeTR21,
  author       = {Savio Sciancalepore and
                  Pietro Tedeschi and
                  Usman Riasat and
                  Roberto Di Pietro},
  title        = {Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted
                  Channel Access},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {10--18},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705038},
  doi          = {10.1109/CNS53000.2021.9705038},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SciancaleporeTR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/TedeschiSP21,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Modelling a Communication Channel under Jamming: Experimental Model
                  and Applications},
  booktitle    = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking
                  (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September
                  30 - Oct. 3, 2021},
  pages        = {1562--1573},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00210},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00210},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/TedeschiSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/RaponiCP21,
  author       = {Simone Raponi and
                  Maurantonio Caprolu and
                  Roberto Di Pietro},
  editor       = {Alessandro Armando and
                  Michele Colajanni},
  title        = {Beyond SolarWinds: The Systemic Risks of Critical Infrastructures,
                  State of Play, Future Directions},
  booktitle    = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021,
                  All Digital Event, April 7-9, 2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2940},
  pages        = {394--405},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2940/paper33.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/RaponiCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/PietroC21,
  author       = {Roberto Di Pietro and
                  Stefano Cresci},
  title        = {Metaverse: Security and Privacy Issues},
  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  pages        = {281--288},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPSISA52974.2021.00032},
  doi          = {10.1109/TPSISA52974.2021.00032},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/PietroC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2021,
  editor       = {Jorge Lobo and
                  Roberto Di Pietro and
                  Omar Chowdhury and
                  Hongxin Hu},
  title        = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and
                  Technologies, Virtual Event, Spain, June 16-18, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450569},
  doi          = {10.1145/3450569},
  isbn         = {978-1-4503-8365-3},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spaccs/2020,
  editor       = {Guojun Wang and
                  Bing Chen and
                  Wei Li and
                  Roberto Di Pietro and
                  Xuefeng Yan and
                  Hao Han},
  title        = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 13th International Conference, SpaCCS 2020, Nanjing, China,
                  December 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12382},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-68851-6},
  doi          = {10.1007/978-3-030-68851-6},
  isbn         = {978-3-030-68850-9},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spaccs/2020w,
  editor       = {Guojun Wang and
                  Bing Chen and
                  Wei Li and
                  Roberto Di Pietro and
                  Xuefeng Yan and
                  Hao Han},
  title        = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - SpaCCS 2020 International Workshops, Nanjing, China, December
                  18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12383},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-68884-4},
  doi          = {10.1007/978-3-030-68884-4},
  isbn         = {978-3-030-68883-7},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/2020w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-06221,
  author       = {Pietro Tedeschi and
                  Kang Eun Jeon and
                  James She and
                  Simon Wong and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  title        = {Privacy-Preserving and Sustainable Contact Tracing Using Batteryless
                  {BLE} Beacons},
  journal      = {CoRR},
  volume       = {abs/2103.06221},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.06221},
  eprinttype    = {arXiv},
  eprint       = {2103.06221},
  timestamp    = {Tue, 16 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-06221.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-09459,
  author       = {Maurantonio Caprolu and
                  Matteo Pontecorvi and
                  Matteo Signorini and
                  Carlos Segarra and
                  Roberto Di Pietro},
  title        = {A Novel Framework for the Analysis of Unknown Transactions in Bitcoin:
                  Theory, Model, and Experimental Results},
  journal      = {CoRR},
  volume       = {abs/2103.09459},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.09459},
  eprinttype    = {arXiv},
  eprint       = {2103.09459},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-09459.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-03832,
  author       = {Eduard Marin and
                  Diego Perino and
                  Roberto Di Pietro},
  title        = {Serverless Computing: {A} Security Perspective},
  journal      = {CoRR},
  volume       = {abs/2107.03832},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.03832},
  eprinttype    = {arXiv},
  eprint       = {2107.03832},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-03832.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-11324,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Satellite-Based Communications Security: {A} Survey of Threats, Solutions,
                  and Research Challenges},
  journal      = {CoRR},
  volume       = {abs/2112.11324},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.11324},
  eprinttype    = {arXiv},
  eprint       = {2112.11324},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-11324.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TedeschiOP20,
  author       = {Pietro Tedeschi and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Leveraging Jamming to Help Drones Complete Their Mission},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {5049--5064},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2963105},
  doi          = {10.1109/ACCESS.2019.2963105},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/TedeschiOP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RaponiP20,
  author       = {Simone Raponi and
                  Roberto Di Pietro},
  title        = {A Longitudinal Study on Web-Sites Password Management (in)Security:
                  Evidence and Remedies},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {52075--52090},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2981207},
  doi          = {10.1109/ACCESS.2020.2981207},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RaponiP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SignoriniPKP20,
  author       = {Matteo Signorini and
                  Matteo Pontecorvi and
                  Wa{\"{e}}l Kanoun and
                  Roberto Di Pietro},
  title        = {{BAD:} {A} Blockchain Anomaly Detection Solution},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {173481--173490},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3025622},
  doi          = {10.1109/ACCESS.2020.3025622},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SignoriniPKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/CaproluPRST20,
  author       = {Maurantonio Caprolu and
                  Roberto Di Pietro and
                  Simone Raponi and
                  Savio Sciancalepore and
                  Pietro Tedeschi},
  title        = {Vessels Cybersecurity: Issues, Challenges, and the Road Ahead},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {58},
  number       = {6},
  pages        = {90--96},
  year         = {2020},
  url          = {https://doi.org/10.1109/MCOM.001.1900632},
  doi          = {10.1109/MCOM.001.1900632},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/CaproluPRST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SciancaleporeIO20,
  author       = {Savio Sciancalepore and
                  Omar Adel Ibrahim and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {PiNcH: An effective, efficient, and robust solution to drone detection
                  via network traffic analysis},
  journal      = {Comput. Networks},
  volume       = {168},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2019.107044},
  doi          = {10.1016/J.COMNET.2019.107044},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SciancaleporeIO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/CresciPPST20,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {Emergent properties, models, and laws of behavioral similarities within
                  groups of twitter users},
  journal      = {Comput. Commun.},
  volume       = {150},
  pages        = {47--61},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2019.10.019},
  doi          = {10.1016/J.COMCOM.2019.10.019},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/CresciPPST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/TedeschiSP20,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Security in Energy Harvesting Networks: {A} Survey of Current Solutions
                  and Research Challenges},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {4},
  pages        = {2658--2693},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2020.3017665},
  doi          = {10.1109/COMST.2020.3017665},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/TedeschiSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TedeschiSEP20,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Areej Eliyan and
                  Roberto Di Pietro},
  title        = {LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {1},
  pages        = {621--638},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2953549},
  doi          = {10.1109/JIOT.2019.2953549},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/TedeschiSEP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SalvePMR20,
  author       = {Andrea De Salve and
                  Roberto Di Pietro and
                  Paolo Mori and
                  Laura Ricci},
  title        = {A Logical Key Hierarchy Based Approach to Preserve Content Privacy
                  in Decentralized Online Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {2--21},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2729553},
  doi          = {10.1109/TDSC.2017.2729553},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SalvePMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AzizTSP20,
  author       = {Ahmed Aziz and
                  Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {SecureAIS - Securing Pairwise Vessels Communications},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162320},
  doi          = {10.1109/CNS48642.2020.9162320},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AzizTSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/CaproluCRP20,
  author       = {Maurantonio Caprolu and
                  Stefano Cresci and
                  Simone Raponi and
                  Roberto Di Pietro},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jean Leneutre and
                  Nora Cuppens and
                  Reda Yaich},
  title        = {New Dimensions of Information Warfare: The Economic Pillar - Fintech
                  and Cryptocurrencies},
  booktitle    = {Risks and Security of Internet and Systems - 15th International Conference,
                  CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12528},
  pages        = {3--27},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68887-5\_1},
  doi          = {10.1007/978-3-030-68887-5\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/CaproluCRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/MartinoCBYPN20,
  author       = {Giovanni Da San Martino and
                  Stefano Cresci and
                  Alberto Barr{\'{o}}n{-}Cede{\~{n}}o and
                  Seunghak Yu and
                  Roberto Di Pietro and
                  Preslav Nakov},
  editor       = {Christian Bessiere},
  title        = {A Survey on Computational Propaganda Detection},
  booktitle    = {Proceedings of the Twenty-Ninth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2020},
  pages        = {4826--4832},
  publisher    = {ijcai.org},
  year         = {2020},
  url          = {https://doi.org/10.24963/ijcai.2020/672},
  doi          = {10.24963/IJCAI.2020/672},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/MartinoCBYPN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OligeriSP20,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {{GNSS} spoofing detection via opportunistic {IRIDIUM} signals},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {42--52},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399350},
  doi          = {10.1145/3395351.3399350},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OligeriSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OligeriSRP20,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Simone Raponi and
                  Roberto Di Pietro},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {BrokenStrokes: on the (in)security of wireless keyboards},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {231--241},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399351},
  doi          = {10.1145/3395351.3399351},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OligeriSRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-02877,
  author       = {Maurantonio Caprolu and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Short-Range Audio Channels Security: Survey of Mechanisms, Applications,
                  and Research Challenges},
  journal      = {CoRR},
  volume       = {abs/2001.02877},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.02877},
  eprinttype    = {arXiv},
  eprint       = {2001.02877},
  timestamp    = {Mon, 13 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-02877.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-05051,
  author       = {Simone Raponi and
                  Savio Sciancalepore and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Fridges on the Highway: Road Traffic Poisoning of Navigation Apps},
  journal      = {CoRR},
  volume       = {abs/2002.05051},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.05051},
  eprinttype    = {arXiv},
  eprint       = {2002.05051},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-05051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-05905,
  author       = {Omar Adel Ibrahim and
                  Savio Sciancalepore and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {{MAGNETO:} Fingerprinting {USB} Flash Drives via Unintentional Magnetic
                  Emissions},
  journal      = {CoRR},
  volume       = {abs/2002.05905},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.05905},
  eprinttype    = {arXiv},
  eprint       = {2002.05905},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-05905.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-01991,
  author       = {Maurantonio Caprolu and
                  Roberto Di Pietro and
                  Simone Raponi and
                  Savio Sciancalepore and
                  Pietro Tedeschi},
  title        = {Vessels Cybersecurity: Issues, Challenges, and the Road Ahead},
  journal      = {CoRR},
  volume       = {abs/2003.01991},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.01991},
  eprinttype    = {arXiv},
  eprint       = {2003.01991},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-01991.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-10394,
  author       = {Pietro Tedeschi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Security in Energy Harvesting Networks: {A} Survey of Current Solutions
                  and Research Challenges},
  journal      = {CoRR},
  volume       = {abs/2004.10394},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.10394},
  eprinttype    = {arXiv},
  eprint       = {2004.10394},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-10394.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-01347,
  author       = {Omar Adel Ibrahim and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Noise2Weight: On Detecting Payload Weight from Drones Acoustic Emissions},
  journal      = {CoRR},
  volume       = {abs/2005.01347},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.01347},
  eprinttype    = {arXiv},
  eprint       = {2005.01347},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-01347.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-10284,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{GNSS} Spoofing Detection via Opportunistic {IRIDIUM} Signals},
  journal      = {CoRR},
  volume       = {abs/2006.10284},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.10284},
  eprinttype    = {arXiv},
  eprint       = {2006.10284},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-10284.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-08024,
  author       = {Giovanni Da San Martino and
                  Stefano Cresci and
                  Alberto Barr{\'{o}}n{-}Cede{\~{n}}o and
                  Seunghak Yu and
                  Roberto Di Pietro and
                  Preslav Nakov},
  title        = {A Survey on Computational Propaganda Detection},
  journal      = {CoRR},
  volume       = {abs/2007.08024},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.08024},
  eprinttype    = {arXiv},
  eprint       = {2007.08024},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-08024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-11928,
  author       = {Pietro Tedeschi and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  title        = {IoTrace: {A} Flexible, Efficient, and Privacy-Preserving IoT-enabled
                  Architecture for Contact Tracing},
  journal      = {CoRR},
  volume       = {abs/2007.11928},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.11928},
  eprinttype    = {arXiv},
  eprint       = {2007.11928},
  timestamp    = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-11928.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-05470,
  author       = {Gabriele Oligeri and
                  Simone Raponi and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{PAST-AI:} Physical-layer Authentication of Satellite Transmitters
                  via Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2010.05470},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.05470},
  eprinttype    = {arXiv},
  eprint       = {2010.05470},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-05470.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-07306,
  author       = {Pietro Tedeschi and
                  Spiridon Bakiras and
                  Roberto Di Pietro},
  title        = {SpreadMeNot: {A} Provably Secure and Privacy-Preserving Contact Tracing
                  Protocol},
  journal      = {CoRR},
  volume       = {abs/2011.07306},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.07306},
  eprinttype    = {arXiv},
  eprint       = {2011.07306},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-07306.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SciancaleporeP19,
  author       = {Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {156175--156190},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2949716},
  doi          = {10.1109/ACCESS.2019.2949716},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SciancaleporeP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SciancaleporeOP19,
  author       = {Savio Sciancalepore and
                  Gabriele Oligeri and
                  Giuseppe Piro and
                  Gennaro Boggia and
                  Roberto Di Pietro},
  title        = {EXCHANge: Securing IoT via channel anonymity},
  journal      = {Comput. Commun.},
  volume       = {134},
  pages        = {14--29},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comcom.2018.11.003},
  doi          = {10.1016/J.COMCOM.2018.11.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SciancaleporeOP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaproluRP19,
  author       = {Maurantonio Caprolu and
                  Simone Raponi and
                  Roberto Di Pietro},
  title        = {{FORTRESS:} An Efficient and Distributed Firewall for Stateful Data
                  Plane {SDN}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6874592:1--6874592:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6874592},
  doi          = {10.1155/2019/6874592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaproluRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PietroJLS19,
  author       = {Roberto Di Pietro and
                  Leonardo Jero and
                  Flavio Lombardi and
                  Agusti Solanas},
  title        = {{GPU} Algorithms for K-Anonymity in Microdata},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802735},
  doi          = {10.1109/CNS.2019.8802735},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PietroJLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PietroOT19,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Pietro Tedeschi},
  title        = {{JAM-ME:} Exploiting Jamming to Accomplish Drone Mission},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802717},
  doi          = {10.1109/CNS.2019.8802717},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/PietroOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SciancaleporeP19,
  author       = {Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{DRAKE:} Distributed Relay-Assisted Key Establishment},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {100--108},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802764},
  doi          = {10.1109/CNS.2019.8802764},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SciancaleporeP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsaa/CresciPT19,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Maurizio Tesconi},
  editor       = {Lisa Singh and
                  Richard D. De Veaux and
                  George Karypis and
                  Francesco Bonchi and
                  Jennifer Hill},
  title        = {Semantically-Aware Statistical Metrics via Weighting Kernels},
  booktitle    = {2019 {IEEE} International Conference on Data Science and Advanced
                  Analytics, {DSAA} 2019, Washington, DC, USA, October 5-8, 2019},
  pages        = {51--60},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSAA.2019.00019},
  doi          = {10.1109/DSAA.2019.00019},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsaa/CresciPT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/CaproluPLR19,
  author       = {Maurantonio Caprolu and
                  Roberto Di Pietro and
                  Flavio Lombardi and
                  Simone Raponi},
  editor       = {Elisa Bertino and
                  Carl K. Chang and
                  Peter Chen and
                  Ernesto Damiani and
                  Michael Goul and
                  Katsunori Oyama},
  title        = {Edge Computing Perspectives: Architectures, Technologies, and Open
                  Security Issues},
  booktitle    = {3rd {IEEE} International Conference on Edge Computing, {EDGE} 2019,
                  Milan, Italy, July 8-13, 2019},
  pages        = {116--123},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EDGE.2019.00035},
  doi          = {10.1109/EDGE.2019.00035},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edge/CaproluPLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge2/RaponiCP19,
  author       = {Simone Raponi and
                  Maurantonio Caprolu and
                  Roberto Di Pietro},
  editor       = {Tao Zhang and
                  Jinpeng Wei and
                  Liang{-}Jie Zhang},
  title        = {Intrusion Detection at the Network Edge: Solutions, Limitations, and
                  Future Directions},
  booktitle    = {Edge Computing - {EDGE} 2019 - Third International Conference, Held
                  as Part of the Services Conference Federation, {SCF} 2019, San Diego,
                  CA, USA, June 25-30, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11520},
  pages        = {59--75},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23374-7\_5},
  doi          = {10.1007/978-3-030-23374-7\_5},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edge2/RaponiCP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Pietro19,
  author       = {Roberto Di Pietro},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Next Generation Information Warfare: Challenges and Research Directions},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {7--8},
  publisher    = {SciTePress},
  year         = {2019},
  timestamp    = {Wed, 05 Jun 2019 13:01:15 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Pietro19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PietroCR19,
  author       = {Roberto Di Pietro and
                  Maurantonio Caprolu and
                  Simone Raponi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Next Generation Information Warfare: Rationales, Scenarios, Threats,
                  and Open Issues},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {24--47},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_2},
  doi          = {10.1007/978-3-030-49443-8\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/PietroCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SciancaleporeAP19,
  author       = {Savio Sciancalepore and
                  Saeif Alhazbi and
                  Roberto Di Pietro},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {Reliability of {ADS-B} communications: novel insights based on an
                  experimental assessment},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {2414--2421},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297518},
  doi          = {10.1145/3297280.3297518},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SciancaleporeAP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SciancaleporeAP19,
  author       = {Savio Sciancalepore and
                  Saeif Alhazbi and
                  Roberto Di Pietro},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Location Privacy Issues in the OpenSky Network Crowdsourcing Platform},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {304},
  pages        = {549--568},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37228-6\_27},
  doi          = {10.1007/978-3-030-37228-6\_27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/SciancaleporeAP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OligeriSIP19,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Omar Adel Ibrahim and
                  Roberto Di Pietro},
  title        = {Drive me not: {GPS} spoofing detection via cellular network: (architectures,
                  models, and experiments)},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {12--22},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319719},
  doi          = {10.1145/3317549.3319719},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OligeriSIP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SciancaleporeIO19,
  author       = {Savio Sciancalepore and
                  Omar Adel Ibrahim and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Detecting Drones Status via Encrypted Traffic Analysis},
  booktitle    = {Proceedings of the {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2019, Miami, Florida, USA, May 14, 2019},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3324921.3328791},
  doi          = {10.1145/3324921.3328791},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SciancaleporeIO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-03535,
  author       = {Savio Sciancalepore and
                  Omar Adel Ibrahim and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Picking a Needle in a Haystack: Detecting Drones via Network Traffic
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/1901.03535},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.03535},
  eprinttype    = {arXiv},
  eprint       = {1901.03535},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-03535.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-10164,
  author       = {Isra Mohamed Ali and
                  Maurantonio Caprolu and
                  Roberto Di Pietro},
  title        = {Foundations, Properties, and Security Applications of Puzzles: {A}
                  Survey},
  journal      = {CoRR},
  volume       = {abs/1904.10164},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.10164},
  eprinttype    = {arXiv},
  eprint       = {1904.10164},
  timestamp    = {Fri, 26 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-10164.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-03895,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Simone Raponi and
                  Roberto Di Pietro},
  title        = {BrokenStrokes: On the (in)Security of Wireless Keyboards},
  journal      = {CoRR},
  volume       = {abs/1910.03895},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.03895},
  eprinttype    = {arXiv},
  eprint       = {1910.03895},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-03895.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-09272,
  author       = {Maurantonio Caprolu and
                  Simone Raponi and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Crypto Mining Makes Noise},
  journal      = {CoRR},
  volume       = {abs/1910.09272},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.09272},
  eprinttype    = {arXiv},
  eprint       = {1910.09272},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-09272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-08565,
  author       = {Simone Raponi and
                  Roberto Di Pietro},
  title        = {Web-sites password management (in)security: Evidence and remedies},
  journal      = {CoRR},
  volume       = {abs/1911.08565},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.08565},
  eprinttype    = {arXiv},
  eprint       = {1911.08565},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-08565.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/MartinRCP18,
  author       = {Antony Martin and
                  Simone Raponi and
                  Th{\'{e}}o Combe and
                  Roberto Di Pietro},
  title        = {Docker ecosystem - Vulnerability Analysis},
  journal      = {Comput. Commun.},
  volume       = {122},
  pages        = {30--43},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comcom.2018.03.011},
  doi          = {10.1016/J.COMCOM.2018.03.011},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/MartinRCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PietroO18,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {GopJam: Key-less jamming mitigation via gossiping},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {123},
  pages        = {57--68},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.08.001},
  doi          = {10.1016/J.JNCA.2018.08.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/PietroO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SciancaleporeOP18,
  author       = {Savio Sciancalepore and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Strength of Crowd {(SOC)} - Defeating a Reactive Jammer in IoT with
                  Decoy Messages},
  journal      = {Sensors},
  volume       = {18},
  number       = {10},
  pages        = {3492},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18103492},
  doi          = {10.3390/S18103492},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/SciancaleporeOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CresciPPST18,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired
                  Behavioral Modeling},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {561--576},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2017.2681672},
  doi          = {10.1109/TDSC.2017.2681672},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/CresciPPST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/PietroL18,
  author       = {Roberto Di Pietro and
                  Flavio Lombardi},
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Virtualization Technologies and Cloud Security: Advantages, Issues,
                  and Perspectives},
  booktitle    = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  pages        = {166--185},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1\_9},
  doi          = {10.1007/978-3-030-04834-1\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/PietroL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/PietroOSS18,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Xavier Salleras and
                  Matteo Signorini},
  title        = {N-Guard: a Solution to Secure Access to {NFC} tags},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433182},
  doi          = {10.1109/CNS.2018.8433182},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/PietroOSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SciancaleporeOP18,
  author       = {Savio Sciancalepore and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  title        = {Shooting to the Stars: Secure Location Verification via Meteor Burst
                  Communications},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433171},
  doi          = {10.1109/CNS.2018.8433171},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/SciancaleporeOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/IbrahimHOP18,
  author       = {Omar Adel Ibrahim and
                  Ahmed Mohamed Hussain and
                  Gabriele Oligeri and
                  Roberto Di Pietro},
  editor       = {Brahim Hamid and
                  Barbara Gallina and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Key is in the Air: Hacking Remote Keyless Entry Systems},
  booktitle    = {Security and Safety Interplay of Intelligent Software Systems - {ESORICS}
                  2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona,
                  Spain, September 6-7, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11552},
  pages        = {125--132},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-16874-2\_9},
  doi          = {10.1007/978-3-030-16874-2\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/IbrahimHOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/PietroSSW18,
  author       = {Roberto Di Pietro and
                  Xavier Salleras and
                  Matteo Signorini and
                  Erez Waisbard},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {A blockchain-based Trust System for the Internet of Things},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {77--83},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3205993},
  doi          = {10.1145/3205977.3205993},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/PietroSSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/SignoriniKP18,
  author       = {Matteo Signorini and
                  Wael Kanoun and
                  Roberto Di Pietro},
  title        = {ADvISE: Anomaly Detection tool for blockchaIn SystEms},
  booktitle    = {2018 {IEEE} World Congress on Services, {SERVICES} 2018, San Francisco,
                  CA, USA, July 2-7, 2018},
  pages        = {65--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SERVICES.2018.00046},
  doi          = {10.1109/SERVICES.2018.00046},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/SignoriniKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/SciancaleporeP18,
  author       = {Savio Sciancalepore and
                  Roberto Di Pietro},
  editor       = {Guojun Wang and
                  Jinjun Chen and
                  Laurence T. Yang},
  title        = {{SOS} - Securing Open Skies},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 11th International Conference and Satellite Workshops, SpaCCS
                  2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11342},
  pages        = {15--32},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05345-1\_2},
  doi          = {10.1007/978-3-030-05345-1\_2},
  timestamp    = {Tue, 03 Mar 2020 16:31:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/SciancaleporeP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RaponiP18,
  author       = {Simone Raponi and
                  Roberto Di Pietro},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {A Spark Is Enough in a Straw World: {A} Study of Websites Password
                  Management in the Wild},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {37--53},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_3},
  doi          = {10.1007/978-3-030-01141-3\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RaponiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-07016,
  author       = {Simone Raponi and
                  Roberto Di Pietro},
  title        = {A Spark is Enough in a Straw World: a Study of Websites Password Management
                  in the Wild},
  journal      = {CoRR},
  volume       = {abs/1804.07016},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.07016},
  eprinttype    = {arXiv},
  eprint       = {1804.07016},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-07016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-03833,
  author       = {Matteo Signorini and
                  Matteo Pontecorvi and
                  Wael Kanoun and
                  Roberto Di Pietro},
  title        = {{BAD:} Blockchain Anomaly Detection},
  journal      = {CoRR},
  volume       = {abs/1807.03833},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.03833},
  eprinttype    = {arXiv},
  eprint       = {1807.03833},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-03833.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-11016,
  author       = {Roberto Di Pietro and
                  Flavio Lombardi},
  title        = {Virtualization Technologies and Cloud Security: advantages, issues,
                  and perspectives},
  journal      = {CoRR},
  volume       = {abs/1807.11016},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.11016},
  eprinttype    = {arXiv},
  eprint       = {1807.11016},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-11016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-09026,
  author       = {Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {{SOS} - Securing Open Skies},
  journal      = {CoRR},
  volume       = {abs/1809.09026},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.09026},
  eprinttype    = {arXiv},
  eprint       = {1809.09026},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-09026.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PietroO17,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {Enabling broadcast communications in presence of jamming via probabilistic
                  pairing},
  journal      = {Comput. Networks},
  volume       = {116},
  pages        = {33--46},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2017.02.010},
  doi          = {10.1016/J.COMNET.2017.02.010},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PietroO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AlibertiPG17,
  author       = {Giulio Aliberti and
                  Roberto Di Pietro and
                  Stefano Guarino},
  title        = {Epidemic data survivability in Unattended Wireless Sensor Networks:
                  New models and results},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {99},
  pages        = {146--165},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.09.008},
  doi          = {10.1016/J.JNCA.2017.09.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AlibertiPG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsaa/CresciPPST17,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {Exploiting Digital {DNA} for the Analysis of Similarities in Twitter
                  Behaviours},
  booktitle    = {2017 {IEEE} International Conference on Data Science and Advanced
                  Analytics, {DSAA} 2017, Tokyo, Japan, October 19-21, 2017},
  pages        = {686--695},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSAA.2017.57},
  doi          = {10.1109/DSAA.2017.57},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsaa/CresciPPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euspn/DazaPLS17,
  author       = {Vanesa Daza and
                  Roberto Di Pietro and
                  Flavio Lombardi and
                  Matteo Signorini},
  editor       = {Elhadi M. Shakshuki},
  title        = {CoLLIDE: CLoud Latency-based IDEntification},
  booktitle    = {The 8th International Conference on Emerging Ubiquitous Systems and
                  Pervasive Networks {(EUSPN} 2017) / The 7th International Conference
                  on Current and Future Trends of Information and Communication Technologies
                  in Healthcare {(ICTH-2017)} / Affiliated Workshops, September 18-20,
                  2017, Lund, Sweden},
  series       = {Procedia Computer Science},
  volume       = {113},
  pages        = {81--88},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.procs.2017.08.295},
  doi          = {10.1016/J.PROCS.2017.08.295},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euspn/DazaPLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/DazaPKS17,
  author       = {Vanesa Daza and
                  Roberto Di Pietro and
                  Ivan Klimek and
                  Matteo Signorini},
  title        = {{CONNECT:} CONtextual NamE disCovery for blockchain-based services
                  in the IoT},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996641},
  doi          = {10.1109/ICC.2017.7996641},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/DazaPKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PietroFL17,
  author       = {Roberto Di Pietro and
                  Federico Franzoni and
                  Flavio Lombardi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {HyBIS: Advanced Introspection for Effective Windows Guest Protection},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {189--204},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_13},
  doi          = {10.1007/978-3-319-58469-0\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/PietroFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlibertiPG17,
  author       = {Giulio Aliberti and
                  Roberto Di Pietro and
                  Stefano Guarino},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {{SLAP:} Secure Lightweight Authentication Protocol for Resource-constrained
                  Devices},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {163--174},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006431101630174},
  doi          = {10.5220/0006431101630174},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlibertiPG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CresciPPST17,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools
                  for the Arms Race},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web
                  Companion, Perth, Australia, April 3-7, 2017},
  pages        = {963--972},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041021.3055135},
  doi          = {10.1145/3041021.3055135},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/CresciPPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CresciPPST17,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {The paradigm-shift of social spambots: Evidence, theories, and tools
                  for the arms race},
  journal      = {CoRR},
  volume       = {abs/1701.03017},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.03017},
  eprinttype    = {arXiv},
  eprint       = {1701.03017},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CresciPPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CresciPPST17a,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {Social Fingerprinting: detection of spambot groups through DNA-inspired
                  behavioral modeling},
  journal      = {CoRR},
  volume       = {abs/1703.04482},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.04482},
  eprinttype    = {arXiv},
  eprint       = {1703.04482},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CresciPPST17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cloudcomp/CombeMP16,
  author       = {Th{\'{e}}o Combe and
                  Antony Martin and
                  Roberto Di Pietro},
  title        = {To Docker or Not to Docker: {A} Security Perspective},
  journal      = {{IEEE} Cloud Comput.},
  volume       = {3},
  number       = {5},
  pages        = {54--62},
  year         = {2016},
  url          = {https://doi.org/10.1109/MCC.2016.100},
  doi          = {10.1109/MCC.2016.100},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cloudcomp/CombeMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AlibertiPG16,
  author       = {Giulio Aliberti and
                  Roberto Di Pietro and
                  Stefano Guarino},
  title        = {Reliable and perfectly secret communication over the generalized Ozarow-Wyner's
                  wire-tap channel},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {21--30},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.034},
  doi          = {10.1016/J.COMNET.2016.06.034},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AlibertiPG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PietroS16,
  author       = {Roberto Di Pietro and
                  Alessandro Sorniotti},
  title        = {Proof of ownership for deduplication systems: {A} secure, scalable,
                  and efficient solution},
  journal      = {Comput. Commun.},
  volume       = {82},
  pages        = {71--82},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comcom.2016.01.011},
  doi          = {10.1016/J.COMCOM.2016.01.011},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/PietroS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BattistoniPL16,
  author       = {Roberto Battistoni and
                  Roberto Di Pietro and
                  Flavio Lombardi},
  title        = {{CURE} - Towards enforcing a reliable timeline for cloud forensics:
                  Model, architecture, and experiments},
  journal      = {Comput. Commun.},
  volume       = {91-92},
  pages        = {29--43},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comcom.2016.03.024},
  doi          = {10.1016/J.COMCOM.2016.03.024},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/BattistoniPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/CresciPPST16,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {DNA-Inspired Online Behavioral Modeling and Its Application to Spambot
                  Detection},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {31},
  number       = {5},
  pages        = {58--64},
  year         = {2016},
  url          = {https://doi.org/10.1109/MIS.2016.29},
  doi          = {10.1109/MIS.2016.29},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/expert/CresciPPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DazaPLS16,
  author       = {Vanesa Daza and
                  Roberto Di Pietro and
                  Flavio Lombardi and
                  Matteo Signorini},
  title        = {FRoDO: Fraud Resilient Device for Off-Line Micro-Payments},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {2},
  pages        = {296--311},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2432813},
  doi          = {10.1109/TDSC.2015.2432813},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/DazaPLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/PietroLV16,
  author       = {Roberto Di Pietro and
                  Flavio Lombardi and
                  Antonio Villani},
  title        = {{CUDA} Leaks: {A} Detailed Hack for {CUDA} and a (Partial) Fix},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {15:1--15:25},
  year         = {2016},
  url          = {https://doi.org/10.1145/2801153},
  doi          = {10.1145/2801153},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tecs/PietroLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/Suarez-TangilTL16,
  author       = {Guillermo Suarez{-}Tangil and
                  Juan E. Tapiador and
                  Flavio Lombardi and
                  Roberto Di Pietro},
  title        = {Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {789--802},
  year         = {2016},
  url          = {https://doi.org/10.1109/TMC.2015.2444847},
  doi          = {10.1109/TMC.2015.2444847},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/Suarez-TangilTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/SalvePMR16,
  author       = {Andrea De Salve and
                  Roberto Di Pietro and
                  Paolo Mori and
                  Laura Ricci},
  title        = {Logical key hierarchy for groups management in Distributed Online
                  Social Network},
  booktitle    = {{IEEE} Symposium on Computers and Communication, {ISCC} 2016, Messina,
                  Italy, June 27-30, 2016},
  pages        = {710--717},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCC.2016.7543820},
  doi          = {10.1109/ISCC.2016.7543820},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/SalvePMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PietroFL16,
  author       = {Roberto Di Pietro and
                  Federico Franzoni and
                  Flavio Lombardi},
  title        = {HyBIS: Windows Guest Protection through Advanced Memory Introspection},
  journal      = {CoRR},
  volume       = {abs/1601.05851},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.05851},
  eprinttype    = {arXiv},
  eprint       = {1601.05851},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PietroFL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CresciPPST16,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {DNA-inspired online behavioral modeling and its application to spambot
                  detection},
  journal      = {CoRR},
  volume       = {abs/1602.00110},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.00110},
  eprinttype    = {arXiv},
  eprint       = {1602.00110},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CresciPPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/CresciPTPS16,
  author       = {Stefano Cresci and
                  Marinella Petrocchi and
                  Maurizio Tesconi and
                  Roberto Di Pietro and
                  Angelo Spognardi},
  title        = {Social Fingerprinting - or the Truth About You},
  journal      = {{ERCIM} News},
  volume       = {2016},
  number       = {106},
  year         = {2016},
  url          = {http://ercim-news.ercim.eu/en106/special/social-fingerprinting-or-the-truth-about-you},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/CresciPTPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PietroO15,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {{ESC:} An efficient, scalable, and crypto-less solution to secure
                  wireless networks},
  journal      = {Comput. Networks},
  volume       = {84},
  pages        = {46--63},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2015.04.006},
  doi          = {10.1016/J.COMNET.2015.04.006},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PietroO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BalzarottiPV15,
  author       = {Davide Balzarotti and
                  Roberto Di Pietro and
                  Antonio Villani},
  title        = {The impact of GPU-assisted malware on memory forensics: {A} case study},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S16--S24},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.010},
  doi          = {10.1016/J.DIIN.2015.05.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BalzarottiPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/CresciPPST15,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {Fame for sale: Efficient detection of fake Twitter followers},
  journal      = {Decis. Support Syst.},
  volume       = {80},
  pages        = {56--71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dss.2015.09.003},
  doi          = {10.1016/J.DSS.2015.09.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/CresciPPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AlibertiCPM15,
  author       = {Giulio Aliberti and
                  Alessandro Colantonio and
                  Roberto Di Pietro and
                  Riccardo Mariani},
  title        = {{EXPEDITE:} EXPress closED ITemset Enumeration},
  journal      = {Expert Syst. Appl.},
  volume       = {42},
  number       = {8},
  pages        = {3933--3944},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.eswa.2014.12.031},
  doi          = {10.1016/J.ESWA.2014.12.031},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AlibertiCPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/PietroLMS15,
  author       = {Roberto Di Pietro and
                  Flavio Lombardi and
                  Fabio Martinelli and
                  Daniele Sgandurra},
  title        = {AntiCheetah: Trustworthy computing in an outsourced (cheating) environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {48},
  pages        = {28--38},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.future.2015.02.004},
  doi          = {10.1016/J.FUTURE.2015.02.004},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/PietroLMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PietroO15,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {Silence is Golden: Exploiting Jamming and Radio Silence to Communicate},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {9:1--9:24},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699906},
  doi          = {10.1145/2699906},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PietroO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/GuarinoCCPS15,
  author       = {Stefano Guarino and
                  Ey{\"{u}}p S. Canlar and
                  Mauro Conti and
                  Roberto Di Pietro and
                  Agusti Solanas},
  title        = {Provable Storage Medium for Data Storage Outsourcing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {8},
  number       = {6},
  pages        = {985--997},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSC.2014.2355229},
  doi          = {10.1109/TSC.2014.2355229},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/GuarinoCCPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ColantonioPPS15,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi},
  editor       = {Roger L. Wainwright and
                  Juan Manuel Corchado and
                  Alessio Bechini and
                  Jiman Hong},
  title        = {Visual detection of singularities in review platforms},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
                  Salamanca, Spain, April 13-17, 2015},
  pages        = {1294--1295},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2695664.2696044},
  doi          = {10.1145/2695664.2696044},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ColantonioPPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/ColantonioPPS15,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {{VISIO:} {A} Visual Approach for Singularity Detection in Recommendation
                  Systems},
  booktitle    = {Trust, Privacy and Security in Digital Business - 12th International
                  Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9264},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22906-5\_3},
  doi          = {10.1007/978-3-319-22906-5\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/ColantonioPPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PietroO15,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {Freedom of speech: thwarting jammers via a probabilistic approach},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766515},
  doi          = {10.1145/2766498.2766515},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PietroO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/ContiPM15,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luciana Marconi},
  editor       = {Guillermo Navarro{-}Arribas and
                  Vicen{\c{c}} Torra},
  title        = {Privacy for LBSs: On Using a Footprint Model to Face the Enemy},
  booktitle    = {Advanced Research in Data Privacy},
  series       = {Studies in Computational Intelligence},
  volume       = {567},
  pages        = {169--195},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-09885-2\_10},
  doi          = {10.1007/978-3-319-09885-2\_10},
  timestamp    = {Tue, 07 May 2024 20:28:19 +0200},
  biburl       = {https://dblp.org/rec/series/sci/ContiPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BattistoniPL15,
  author       = {Roberto Battistoni and
                  Roberto Di Pietro and
                  Flavio Lombardi},
  title        = {CloRoFor: Cloud Robust Forensics},
  journal      = {CoRR},
  volume       = {abs/1506.01739},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.01739},
  eprinttype    = {arXiv},
  eprint       = {1506.01739},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BattistoniPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CresciPPST15,
  author       = {Stefano Cresci and
                  Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {Fame for sale: efficient detection of fake Twitter followers},
  journal      = {CoRR},
  volume       = {abs/1509.04098},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.04098},
  eprinttype    = {arXiv},
  eprint       = {1509.04098},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CresciPPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/SolanasPCVRFPPPPM14,
  author       = {Agusti Solanas and
                  Constantinos Patsakis and
                  Mauro Conti and
                  Ioannis S. Vlachos and
                  Victoria Ramos and
                  Francisco Falcone and
                  Octavian Postolache and
                  Pablo A. P{\'{e}}rez{-}Mart{\'{\i}}nez and
                  Roberto Di Pietro and
                  Despina N. Perrea and
                  Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}}},
  title        = {Smart health: {A} context-aware health paradigm within smart cities},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {52},
  number       = {8},
  pages        = {74--81},
  year         = {2014},
  url          = {https://doi.org/10.1109/MCOM.2014.6871673},
  doi          = {10.1109/MCOM.2014.6871673},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/SolanasPCVRFPPPPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PietroGVD14,
  author       = {Roberto Di Pietro and
                  Stefano Guarino and
                  Nino Vincenzo Verde and
                  Josep Domingo{-}Ferrer},
  title        = {Security in wireless ad-hoc networks - {A} survey},
  journal      = {Comput. Commun.},
  volume       = {51},
  pages        = {1--20},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comcom.2014.06.003},
  doi          = {10.1016/J.COMCOM.2014.06.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/PietroGVD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Suarez-TangilTLP14,
  author       = {Guillermo Suarez{-}Tangil and
                  Juan E. Tapiador and
                  Flavio Lombardi and
                  Roberto Di Pietro},
  title        = {Thwarting Obfuscated Malware via Differential Fault Analysis},
  journal      = {Computer},
  volume       = {47},
  number       = {6},
  pages        = {24--31},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.169},
  doi          = {10.1109/MC.2014.169},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Suarez-TangilTLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/PietroLS14,
  author       = {Roberto Di Pietro and
                  Flavio Lombardi and
                  Matteo Signorini},
  title        = {CloRExPa: Cloud resilience via execution path analysis},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {32},
  pages        = {168--179},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.future.2012.05.010},
  doi          = {10.1016/J.FUTURE.2012.05.010},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/PietroLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ContiPS14,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Angelo Spognardi},
  title        = {Clone wars: Distributed detection of clone attacks in mobile WSNs},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {80},
  number       = {3},
  pages        = {654--669},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jcss.2013.06.017},
  doi          = {10.1016/J.JCSS.2013.06.017},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/ContiPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlisPOS14,
  author       = {Jorge Blasco Al{\'{\i}}s and
                  Roberto Di Pietro and
                  Agust{\'{\i}}n Orfila and
                  Alessandro Sorniotti},
  title        = {A tunable proof of ownership scheme for deduplication using Bloom
                  filters},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {481--489},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997518},
  doi          = {10.1109/CNS.2014.6997518},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlisPOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/CresciPSTP14,
  author       = {Stefano Cresci and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi and
                  Roberto Di Pietro},
  title        = {A Criticism to Society (As Seen by Twitter Analytics)},
  booktitle    = {34th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  pages        = {194--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCSW.2014.31},
  doi          = {10.1109/ICDCSW.2014.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/CresciPSTP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/DazaPLS14,
  author       = {Vanesa Daza and
                  Roberto Di Pietro and
                  Flavio Lombardi and
                  Matteo Signorini},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Joaquim Filipe},
  title        = {{SOLDI:} Secure Off-Line Disposable CredIts to Secure Mobile Micro
                  Payments},
  booktitle    = {E-Business and Telecommunications - 11th International Joint Conference,
                  {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {554},
  pages        = {340--362},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-25915-4\_18},
  doi          = {10.1007/978-3-319-25915-4\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/DazaPLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DazaPLS14,
  author       = {Vanesa Daza and
                  Roberto Di Pietro and
                  Flavio Lombardi and
                  Matteo Signorini},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{FORCE} - Fully Off-line secuRe CrEdits for Mobile Micro Payments},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {125--136},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005053201250136},
  doi          = {10.5220/0005053201250136},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DazaPLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/PietroPS14,
  author       = {Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi},
  editor       = {Boualem Benatallah and
                  Azer Bestavros and
                  Yannis Manolopoulos and
                  Athena Vakali and
                  Yanchun Zhang},
  title        = {A Lot of Slots - Outliers Confinement in Review-Based Systems},
  booktitle    = {Web Information Systems Engineering - {WISE} 2014 - 15th International
                  Conference, Thessaloniki, Greece, October 12-14, 2014, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8786},
  pages        = {15--30},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11749-2\_2},
  doi          = {10.1007/978-3-319-11749-2\_2},
  timestamp    = {Sun, 02 Jun 2019 21:10:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/PietroPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/PietroPST14,
  author       = {Roberto Di Pietro and
                  Marinella Petrocchi and
                  Angelo Spognardi and
                  Maurizio Tesconi},
  title        = {Discriminating Between the Wheat and the Chaff in Online Recommendation
                  Systems},
  journal      = {{ERCIM} News},
  volume       = {2014},
  number       = {96},
  year         = {2014},
  url          = {http://ercim-news.ercim.eu/en96/ri/discriminating-between-the-wheat-and-the-chaff-in-online-recommendation-systems},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/PietroPST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RiccardiPPV13,
  author       = {Marco Riccardi and
                  Roberto Di Pietro and
                  Marta Palanques and
                  Jorge Aguila Vila},
  title        = {Titans' revenge: Detecting Zeus via its own flaws},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {2},
  pages        = {422--435},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.06.023},
  doi          = {10.1016/J.COMNET.2012.06.023},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/RiccardiPPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CanlarCCP13,
  author       = {Ey{\"{u}}p S. Canlar and
                  Mauro Conti and
                  Bruno Crispo and
                  Roberto Di Pietro},
  title        = {Windows Mobile LiveSD Forensics},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {677--684},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.024},
  doi          = {10.1016/J.JNCA.2012.12.024},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CanlarCCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/PietroO13,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {Jamming mitigation in cognitive radio networks},
  journal      = {{IEEE} Netw.},
  volume       = {27},
  number       = {3},
  pages        = {10--15},
  year         = {2013},
  url          = {https://doi.org/10.1109/MNET.2013.6523802},
  doi          = {10.1109/MNET.2013.6523802},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/PietroO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/PietroV13,
  author       = {Roberto Di Pietro and
                  Nino Vincenzo Verde},
  title        = {Epidemic theory and data survivability in unattended wireless sensor
                  networks: Models and gaps},
  journal      = {Pervasive Mob. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {588--597},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.pmcj.2012.07.010},
  doi          = {10.1016/J.PMCJ.2012.07.010},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/PietroV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/CristofaroP13,
  author       = {Emiliano De Cristofaro and
                  Roberto Di Pietro},
  title        = {Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing
                  Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {2},
  pages        = {311--322},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2012.2221957},
  doi          = {10.1109/JSYST.2012.2221957},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/CristofaroP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/0004ZCPJM13,
  author       = {Lei Zhang and
                  Honggang Zhang and
                  Mauro Conti and
                  Roberto Di Pietro and
                  Sushil Jajodia and
                  Luigi Vincenzo Mancini},
  title        = {Preserving privacy against external and internal threats in {WSN}
                  data aggregation},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {4},
  pages        = {2163--2176},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9539-8},
  doi          = {10.1007/S11235-011-9539-8},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/0004ZCPJM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PietroO13,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {{COKE} Crypto-Less Over-the-Air Key Establishment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {1},
  pages        = {163--173},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2012.2226718},
  doi          = {10.1109/TIFS.2012.2226718},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PietroO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/PietroOST13,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {United We Stand: Intrusion Resilience in Mobile Unattended WSNs},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {12},
  number       = {7},
  pages        = {1456--1468},
  year         = {2013},
  url          = {https://doi.org/10.1109/TMC.2012.126},
  doi          = {10.1109/TMC.2012.126},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/PietroOST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/CanlarCCP13,
  author       = {Ey{\"{u}}p S. Canlar and
                  Mauro Conti and
                  Bruno Crispo and
                  Roberto Di Pietro},
  editor       = {Bruno Crispo and
                  Ravi S. Sandhu and
                  Nora Cuppens{-}Boulahia and
                  Mauro Conti and
                  Jean{-}Louis Lanet},
  title        = {{CREPUSCOLO:} {A} collusion resistant privacy preserving location
                  verification system},
  booktitle    = {2013 International Conference on Risks and Security of Internet and
                  Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CRiSIS.2013.6766357},
  doi          = {10.1109/CRISIS.2013.6766357},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/CanlarCCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/JaballahCPMV13,
  author       = {Wafa Ben Jaballah and
                  Mauro Conti and
                  Roberto Di Pietro and
                  Mohamed Mosbah and
                  Nino Vincenzo Verde},
  editor       = {Bruno Crispo and
                  Ravi S. Sandhu and
                  Nora Cuppens{-}Boulahia and
                  Mauro Conti and
                  Jean{-}Louis Lanet},
  title        = {{MASS:} An efficient and secure broadcast authentication scheme for
                  resource constrained devices},
  booktitle    = {2013 International Conference on Risks and Security of Internet and
                  Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CRiSIS.2013.6766350},
  doi          = {10.1109/CRISIS.2013.6766350},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/JaballahCPMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/PietroMVV13,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Antonio Villani and
                  Domenico Vitali},
  editor       = {Bruno Crispo and
                  Ravi S. Sandhu and
                  Nora Cuppens{-}Boulahia and
                  Mauro Conti and
                  Jean{-}Louis Lanet},
  title        = {Uniqueness of the file systems genome: Supporting arguments and massive
                  experimental measurements},
  booktitle    = {2013 International Conference on Risks and Security of Internet and
                  Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CRiSIS.2013.6766355},
  doi          = {10.1109/CRISIS.2013.6766355},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/PietroMVV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/PietroLMS13,
  author       = {Roberto Di Pietro and
                  Flavio Lombardi and
                  Fabio Martinelli and
                  Daniele Sgandurra},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {CheR: Cheating Resilience in the Cloud via Smart Resource Allocation},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {339--352},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_21},
  doi          = {10.1007/978-3-319-05302-8\_21},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/PietroLMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PietroG13,
  author       = {Roberto Di Pietro and
                  Stefano Guarino},
  title        = {Data confidentiality and availability via secret sharing and node
                  mobility in {UWSN}},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {205--209},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6566764},
  doi          = {10.1109/INFCOM.2013.6566764},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/PietroG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/PietroLMS13,
  author       = {Roberto Di Pietro and
                  Flavio Lombardi and
                  Fabio Martinelli and
                  Daniele Sgandurra},
  title        = {AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing},
  booktitle    = {2013 {IEEE} 10th International Conference on Ubiquitous Intelligence
                  and Computing and 2013 {IEEE} 10th International Conference on Autonomic
                  and Trusted Computing, {UIC/ATC} 2013, Vietri sul Mare, Sorrento Peninsula,
                  Italy, December 18-21, 2013},
  pages        = {371--379},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/UIC-ATC.2013.77},
  doi          = {10.1109/UIC-ATC.2013.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/PietroLMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/PietroG13,
  author       = {Roberto Di Pietro and
                  Stefano Guarino},
  title        = {Confidentiality and availability issues in Mobile Unattended Wireless
                  Sensor Networks},
  booktitle    = {{IEEE} 14th International Symposium on "A World of Wireless, Mobile
                  and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4-7, 2013},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WoWMoM.2013.6583467},
  doi          = {10.1109/WOWMOM.2013.6583467},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/PietroG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/PietroMV13,
  author       = {Roberto Di Pietro and
                  Roberto Mandati and
                  Nino Vincenzo Verde},
  title        = {Track me if you can: Transparent obfuscation for Location based Services},
  booktitle    = {{IEEE} 14th International Symposium on "A World of Wireless, Mobile
                  and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4-7, 2013},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WoWMoM.2013.6583401},
  doi          = {10.1109/WOWMOM.2013.6583401},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/PietroMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/wi/13/PietroD13,
  author       = {Roberto Di Pietro and
                  Josep Domingo{-}Ferrer},
  editor       = {Stefano Basagni and
                  Marco Conti and
                  Silvia Giordano and
                  Ivan Stojmenovic},
  title        = {Security in Wireless Ad Hoc Networks},
  booktitle    = {Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition},
  pages        = {106--153},
  publisher    = {Wiley / {IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1002/9781118511305.ch4},
  doi          = {10.1002/9781118511305.CH4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/wi/13/PietroD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2012-7731,
  editor       = {Roberto Di Pietro and
                  Javier Herranz and
                  Ernesto Damiani and
                  Radu State},
  title        = {Data Privacy Management and Autonomous Spontaneous Security, 7th International
                  Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012,
                  Pisa, Italy, September 13-14, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7731},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-35890-6},
  doi          = {10.1007/978-3-642-35890-6},
  isbn         = {978-3-642-35889-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2012-7731.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2012,
  editor       = {Angelos D. Keromytis and
                  Roberto Di Pietro},
  title        = {Security and Privacy in Communication Networks - 8th International
                  {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012.
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {106},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36883-7},
  doi          = {10.1007/978-3-642-36883-7},
  isbn         = {978-3-642-36882-0},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PietroLV13,
  author       = {Roberto Di Pietro and
                  Flavio Lombardi and
                  Antonio Villani},
  title        = {{CUDA} Leaks: Information Leakage in {GPU} Architectures},
  journal      = {CoRR},
  volume       = {abs/1305.7383},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.7383},
  eprinttype    = {arXiv},
  eprint       = {1305.7383},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PietroLV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PietroMVV13,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Antonio Villani and
                  Domenico Vitali},
  title        = {Mapping the File Systems Genome: rationales, technique, results and
                  applications},
  journal      = {CoRR},
  volume       = {abs/1306.2833},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.2833},
  eprinttype    = {arXiv},
  eprint       = {1306.2833},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PietroMVV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PietroO13,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {Silence is Golden: exploiting jamming and radio silence to communicate},
  journal      = {CoRR},
  volume       = {abs/1307.5714},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.5714},
  eprinttype    = {arXiv},
  eprint       = {1307.5714},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PietroO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ColantonioPV12,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Nino Vincenzo Verde},
  title        = {A business-driven decomposition methodology for role mining},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {7},
  pages        = {844--855},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2012.01.005},
  doi          = {10.1016/J.COSE.2012.01.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ColantonioPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ColantonioPOV12,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  title        = {Visual Role Mining: {A} Picture Is Worth a Thousand Roles},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {24},
  number       = {6},
  pages        = {1120--1133},
  year         = {2012},
  url          = {https://doi.org/10.1109/TKDE.2011.37},
  doi          = {10.1109/TKDE.2011.37},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ColantonioPOV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/PietroMST12,
  author       = {Roberto Di Pietro and
                  Di Ma and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {Self-healing in unattended wireless sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {9},
  number       = {1},
  pages        = {7:1--7:21},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379799.2379806},
  doi          = {10.1145/2379799.2379806},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosn/PietroMST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PietroS12,
  author       = {Roberto Di Pietro and
                  Alessandro Sorniotti},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Boosting efficiency and security in proof of ownership for deduplication},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {81--82},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414504},
  doi          = {10.1145/2414456.2414504},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PietroS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/CristofaroP12,
  author       = {Emiliano De Cristofaro and
                  Roberto Di Pietro},
  editor       = {Luciano Bononi and
                  Ajoy Kumar Datta and
                  St{\'{e}}phane Devismes and
                  Archan Misra},
  title        = {Preserving Query Privacy in Urban Sensing Systems},
  booktitle    = {Distributed Computing and Networking - 13th International Conference,
                  {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7129},
  pages        = {218--233},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25959-3\_17},
  doi          = {10.1007/978-3-642-25959-3\_17},
  timestamp    = {Mon, 26 Jun 2023 20:44:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/CristofaroP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/ContiPS12,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Angelo Spognardi},
  editor       = {Luciano Bononi and
                  Ajoy Kumar Datta and
                  St{\'{e}}phane Devismes and
                  Archan Misra},
  title        = {Wireless Sensor Replica Detection in Mobile Environments},
  booktitle    = {Distributed Computing and Networking - 13th International Conference,
                  {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7129},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25959-3\_19},
  doi          = {10.1007/978-3-642-25959-3\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/ContiPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/BlassPMO12,
  author       = {Erik{-}Oliver Blass and
                  Roberto Di Pietro and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {{PRISM} - Privacy-Preserving Search in MapReduce},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {180--200},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_10},
  doi          = {10.1007/978-3-642-31680-7\_10},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/BlassPMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CanlarCCP12,
  author       = {Ey{\"{u}}p S. Canlar and
                  Mauro Conti and
                  Bruno Crispo and
                  Roberto Di Pietro},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Sense-And-Trace: {A} Privacy Preserving Distributed Geolocation Tracking
                  System},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_22},
  doi          = {10.1007/978-3-642-35694-0\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CanlarCCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/PietroMV12,
  author       = {Roberto Di Pietro and
                  Fabio Martinelli and
                  Nino Vincenzo Verde},
  title        = {Broadcast Authentication for Resource Constrained Devices: {A} Major
                  Pitfall and Some Solutions},
  booktitle    = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012,
                  Irvine, CA, USA, October 8-11, 2012},
  pages        = {213--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SRDS.2012.13},
  doi          = {10.1109/SRDS.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/PietroMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/PalanquesDOMMF12,
  author       = {Marta Palanques and
                  Roberto Di Pietro and
                  Carlos del Ojo and
                  Marcel Malet and
                  Miquel Marino and
                  Toni Felguera},
  title        = {Secure Cloud Browser: Model and Architecture to Support Secure {WEB}
                  Navigation},
  booktitle    = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012,
                  Irvine, CA, USA, October 8-11, 2012},
  pages        = {402--403},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SRDS.2012.64},
  doi          = {10.1109/SRDS.2012.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/PalanquesDOMMF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2012,
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2185448},
  isbn         = {978-1-4503-1265-3},
  timestamp    = {Thu, 19 Apr 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PietroV11,
  author       = {Roberto Di Pietro and
                  Alexandre Viejo},
  title        = {Location privacy and resilience in wireless sensor networks querying},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {3},
  pages        = {515--523},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.05.014},
  doi          = {10.1016/J.COMCOM.2010.05.014},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/PietroV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AllegraPNRV11,
  author       = {Elisabetta Allegra and
                  Roberto Di Pietro and
                  Mauro La Noce and
                  Valerio Ruocco and
                  Nino Vincenzo Verde},
  title        = {Cross-border co-operation and education in digital investigations:
                  {A} European perspective},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {106--113},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.09.001},
  doi          = {10.1016/J.DIIN.2011.09.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AllegraPNRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/ColantonioPOV11,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  title        = {A new role mining framework to elicit business roles and to mitigate
                  enterprise risk},
  journal      = {Decis. Support Syst.},
  volume       = {50},
  number       = {4},
  pages        = {715--731},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.dss.2010.08.022},
  doi          = {10.1016/J.DSS.2010.08.022},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/ColantonioPOV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ContiPS11,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Angelo Spognardi},
  title        = {"Who Counterfeited My Viagra?" Probabilistic Item Removal
                  Detection via {RFID} Tag Cooperation},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/575171},
  doi          = {10.1155/2011/575171},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ContiPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MarconiCP11,
  author       = {Luciana Marconi and
                  Mauro Conti and
                  Roberto Di Pietro},
  title        = {{CASSANDRA:} a probabilistic, efficient, and privacy-preserving solution
                  to compute set intersection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {5},
  pages        = {301--319},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0133-6},
  doi          = {10.1007/S10207-011-0133-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MarconiCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PietroM11,
  author       = {Roberto Di Pietro and
                  Refik Molva},
  title        = {An optimal probabilistic solution for information confinement, privacy,
                  and security in {RFID} systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {34},
  number       = {3},
  pages        = {853--863},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jnca.2010.04.015},
  doi          = {10.1016/J.JNCA.2010.04.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/PietroM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LombardiP11,
  author       = {Flavio Lombardi and
                  Roberto Di Pietro},
  title        = {Secure virtualization for cloud computing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {34},
  number       = {4},
  pages        = {1113--1122},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jnca.2010.06.008},
  doi          = {10.1016/J.JNCA.2010.06.008},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LombardiP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/PietroSST11,
  author       = {Roberto Di Pietro and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Intrusion-resilient integrity in data-centric unattended WSNs},
  journal      = {Pervasive Mob. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {495--508},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.pmcj.2010.12.003},
  doi          = {10.1016/J.PMCJ.2010.12.003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/PietroSST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ContiPGM11,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Andrea Gabrielli and
                  Luigi V. Mancini},
  title        = {Secure topology maintenance and events collection in WSNs},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {7},
  pages        = {744--762},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.280},
  doi          = {10.1002/SEC.280},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ContiPGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ContiPMM11,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi Vincenzo Mancini and
                  Alessandro Mei},
  title        = {Distributed Detection of Clone Attacks in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {5},
  pages        = {685--698},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2010.25},
  doi          = {10.1109/TDSC.2010.25},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ContiPMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OligeriCPG11,
  author       = {Gabriele Oligeri and
                  Stefano Chessa and
                  Roberto Di Pietro and
                  Gaetano Giunta},
  title        = {Robust and efficient authentication of video stream broadcasting},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {5:1--5:25},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952987},
  doi          = {10.1145/1952982.1952987},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OligeriCPG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RiccardiPV11,
  author       = {Marco Riccardi and
                  Roberto Di Pietro and
                  Jorge Aguila Vila},
  title        = {Taming Zeus by leveraging its own crypto internals},
  booktitle    = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November
                  7-9, 2011},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/eCrime.2011.6151981},
  doi          = {10.1109/ECRIME.2011.6151981},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RiccardiPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PietroV11,
  author       = {Roberto Di Pietro and
                  Nino Vincenzo Verde},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Epidemic data survivability in unattended wireless sensor networks},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998417},
  doi          = {10.1145/1998412.1998417},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PietroV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/OrtolaniCCP11,
  author       = {Stefano Ortolani and
                  Mauro Conti and
                  Bruno Crispo and
                  Roberto Di Pietro},
  title        = {Events privacy in WSNs: {A} new model and its application},
  booktitle    = {12th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June,
                  2011},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WoWMoM.2011.5986491},
  doi          = {10.1109/WOWMOM.2011.5986491},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/OrtolaniCCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/PietroV11,
  author       = {Roberto Di Pietro and
                  Nino Vincenzo Verde},
  title        = {Introducing epidemic models for data survivability in Unattended Wireless
                  Sensor Networks},
  booktitle    = {12th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June,
                  2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WoWMoM.2011.5986165},
  doi          = {10.1109/WOWMOM.2011.5986165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/PietroV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassPMO11,
  author       = {Erik{-}Oliver Blass and
                  Roberto Di Pietro and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {{PRISM} - Privacy-Preserving Search in MapReduce},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassPMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ColantonioPOV10,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  title        = {Taming role mining complexity in {RBAC}},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {548--564},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.01.001},
  doi          = {10.1016/J.COSE.2010.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ColantonioPOV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ColantonioP10,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro},
  title        = {Concise: Compressed 'n' Composable Integer Set},
  journal      = {Inf. Process. Lett.},
  volume       = {110},
  number       = {16},
  pages        = {644--650},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ipl.2010.05.018},
  doi          = {10.1016/J.IPL.2010.05.018},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ColantonioP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PietroMM10,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Hierarchies of keys in secure multicast communications},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {839--860},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0384},
  doi          = {10.3233/JCS-2009-0384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PietroMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ContiPMS10,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Angelo Spognardi},
  title        = {eRIPP-FS: Enforcing privacy and security in {RFID}},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {58--70},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.120},
  doi          = {10.1002/SEC.120},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ContiPMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ZhangZCPJM10,
  author       = {Lei Zhang and
                  Honggang Zhang and
                  Mauro Conti and
                  Roberto Di Pietro and
                  Sushil Jajodia and
                  Luigi Vincenzo Mancini},
  title        = {Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless
                  Sensor Networks},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {910--915},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.169},
  doi          = {10.1109/CIT.2010.169},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ZhangZCPJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/LombardiP10,
  author       = {Flavio Lombardi and
                  Roberto Di Pietro},
  title        = {A Security Management Architecture for the Protection of Kernel Virtual
                  Machines},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {948--953},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.175},
  doi          = {10.1109/CIT.2010.175},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/LombardiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/BragantiniCP10,
  author       = {Roberto Bragantini and
                  Mauro Conti and
                  Roberto Di Pietro},
  title        = {Security in Outsourced Storage: Efficiently Checking Integrity and
                  Service Level Agreement Compliance},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {1096--1101},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.200},
  doi          = {10.1109/CIT.2010.200},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/BragantiniCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ColantonioPOV10,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {Evaluating the Risk of Adopting {RBAC} Roles},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {303--310},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_21},
  doi          = {10.1007/978-3-642-13739-6\_21},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ColantonioPOV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LombardiP10,
  author       = {Flavio Lombardi and
                  Roberto Di Pietro},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {{CUDACS:} Securing the Cloud with CUDA-Enabled Secure Virtualization},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_8},
  doi          = {10.1007/978-3-642-17650-0\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LombardiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MarconiPCC10,
  author       = {Luciana Marconi and
                  Roberto Di Pietro and
                  Bruno Crispo and
                  Mauro Conti},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Time Warp: How Time Affects Privacy in LBSs},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {325--339},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_23},
  doi          = {10.1007/978-3-642-17650-0\_23},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MarconiPCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/OrtolaniCCP10,
  author       = {Stefano Ortolani and
                  Mauro Conti and
                  Bruno Crispo and
                  Roberto Di Pietro},
  editor       = {Jan Camenisch and
                  Valentin S. Kisimov and
                  Maria Dubovitskaya},
  title        = {Event Handoff Unobservability in {WSN}},
  booktitle    = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International
                  Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6555},
  pages        = {20--28},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19228-9\_3},
  doi          = {10.1007/978-3-642-19228-9\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/OrtolaniCCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PietroOST10,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {Intrusion-Resilience in Mobile Unattended WSNs},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {2303--2311},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462056},
  doi          = {10.1109/INFCOM.2010.5462056},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/PietroOST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiwac/ContiPGMM10,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Andrea Gabrielli and
                  Luigi V. Mancini and
                  Alessandro Mei},
  editor       = {Albert Y. Zomaya and
                  Bj{\"{o}}rn Landfeldt},
  title        = {The smallville effect: social ties make mobile networks more secure
                  against node capture attack},
  booktitle    = {Proceedings of the 8th {ACM} International Workshop on Mobility Management
                  {\&} Wireless Access, {MOBIWAC} 2010, Bodrum, Turkey October 17-18,
                  2010},
  pages        = {99--106},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1868497.1868514},
  doi          = {10.1145/1868497.1868514},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiwac/ContiPGMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/LombardiP10,
  author       = {Flavio Lombardi and
                  Roberto Di Pietro},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Transparent security for cloud},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {414--415},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774176},
  doi          = {10.1145/1774088.1774176},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/LombardiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ColantonioPOV10,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {{ABBA:} adaptive bicluster-based approach to impute missing values
                  in binary matrices},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1026--1033},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774304},
  doi          = {10.1145/1774088.1774304},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ColantonioPOV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ColantonioPOV10,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Mining Business-Relevant {RBAC} States through Decomposition},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {19--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_3},
  doi          = {10.1007/978-3-642-15257-3\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ColantonioPOV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MarconiCP10,
  author       = {Luciana Marconi and
                  Mauro Conti and
                  Roberto Di Pietro},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {CED\({}^{\mbox{2}}\): Communication Efficient Disjointness Decision},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {290--306},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_17},
  doi          = {10.1007/978-3-642-16161-2\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MarconiCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/PietroOST10,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {Securing Mobile Unattended WSNs against a Mobile Adversary},
  booktitle    = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
                  New Delhi, Punjab, India, October 31 - November 3, 2010},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SRDS.2010.10},
  doi          = {10.1109/SRDS.2010.10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/PietroOST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/LombardiPS10,
  author       = {Flavio Lombardi and
                  Roberto Di Pietro and
                  Claudio Soriente},
  title        = {CReW: Cloud Resilience for Windows Guests through Monitored Virtualization},
  booktitle    = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
                  New Delhi, Punjab, India, October 31 - November 3, 2010},
  pages        = {338--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SRDS.2010.48},
  doi          = {10.1109/SRDS.2010.48},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/LombardiPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-0403,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro},
  title        = {{CONCISE:} Compressed 'n' Composable Integer Set},
  journal      = {CoRR},
  volume       = {abs/1004.0403},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.0403},
  eprinttype    = {arXiv},
  eprint       = {1004.0403},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-0403.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/PietroMSST09,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Playing hide-and-seek with a focused mobile adversary in unattended
                  wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {8},
  pages        = {1463--1475},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2009.04.002},
  doi          = {10.1016/J.ADHOC.2009.04.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/PietroMSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ContiPMM09,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Mobility and Cooperation to Thwart Node Capture Attacks in MANETs},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/945943},
  doi          = {10.1155/2009/945943},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ContiPMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/ContiPMM09,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Distributed data source verification in wireless sensor networks},
  journal      = {Inf. Fusion},
  volume       = {10},
  number       = {4},
  pages        = {342--353},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.inffus.2009.01.002},
  doi          = {10.1016/J.INFFUS.2009.01.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/ContiPMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PietroMM09,
  author       = {Roberto Di Pietro and
                  Pietro Michiardi and
                  Refik Molva},
  title        = {Confidentiality and integrity for data aggregation in {WSN} using
                  peer monitoring},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {2},
  pages        = {181--194},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.93},
  doi          = {10.1002/SEC.93},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PietroMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ContiZRPJM09,
  author       = {Mauro Conti and
                  Lei Zhang and
                  Sankardas Roy and
                  Roberto Di Pietro and
                  Sushil Jajodia and
                  Luigi V. Mancini},
  title        = {Privacy-preserving robust data aggregation in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {2},
  pages        = {195--213},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.95},
  doi          = {10.1002/SEC.95},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ContiZRPJM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/PietroMSST09,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Data Security in Unattended Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {58},
  number       = {11},
  pages        = {1500--1511},
  year         = {2009},
  url          = {https://doi.org/10.1109/TC.2009.109},
  doi          = {10.1109/TC.2009.109},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/PietroMSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/LombardiP09,
  author       = {Flavio Lombardi and
                  Roberto Di Pietro},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {KvmSec: a security extension for Linux kernel virtual machines},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {2029--2034},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529733},
  doi          = {10.1145/1529282.1529733},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/LombardiP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ColantonioPOV09,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {A formal framework to elicit roles with business meaning in {RBAC}
                  systems},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {85--94},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542223},
  doi          = {10.1145/1542207.1542223},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ColantonioPOV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ColantonioPOV09,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Mining Stable Roles in {RBAC}},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {259--269},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_23},
  doi          = {10.1007/978-3-642-01244-0\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ColantonioPOV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ColantonioPOV09a,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {A Probabilistic Bound on the Basic Role Mining Problem and Its Applications},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {376--386},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_33},
  doi          = {10.1007/978-3-642-01244-0\_33},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ColantonioPOV09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GabrielliCPM09,
  author       = {Andrea Gabrielli and
                  Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {Sec-TMP: {A} Secure Topology Maintenance Protocol for Event Delivery
                  Enforcement in {WSN}},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {265--284},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_15},
  doi          = {10.1007/978-3-642-05284-2\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/GabrielliCPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PietroSST09,
  author       = {Roberto Di Pietro and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Collaborative authentication in unattended WSNs},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {237--244},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514307},
  doi          = {10.1145/1514274.1514307},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/PietroSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wwic/ContiPGMM09,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Andrea Gabrielli and
                  Luigi V. Mancini and
                  Alessandro Mei},
  editor       = {Hans van den Berg and
                  Geert J. Heijenk and
                  Evgeny Osipov and
                  Dirk Staehle},
  title        = {The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc
                  Networks},
  booktitle    = {Wired/Wireless Internet Communications, 7th International Conference,
                  {WWIC} 2009, Enschede, The Netherlands, May 27-29, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5546},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02118-3\_8},
  doi          = {10.1007/978-3-642-02118-3\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wwic/ContiPGMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-2199,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Andrea Gabrielli and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {The Smallville Effect: Social Ties Make Mobile Networks More Secure
                  Against the Node Capture Attack},
  journal      = {CoRR},
  volume       = {abs/0912.2199},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.2199},
  eprinttype    = {arXiv},
  eprint       = {0912.2199},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-2199.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/CencioniP08,
  author       = {Paolo Cencioni and
                  Roberto Di Pietro},
  title        = {A mechanism to enforce privacy in vehicle-to-infrastructure communication},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {12},
  pages        = {2790--2802},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.12.009},
  doi          = {10.1016/J.COMCOM.2007.12.009},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/CencioniP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijscn/PietroI08,
  author       = {Roberto Di Pietro and
                  Stefano Iannitti},
  title        = {Maximizing service availability for secure satellite broadcasting},
  journal      = {Int. J. Satell. Commun. Netw.},
  volume       = {26},
  number       = {4},
  pages        = {269--289},
  year         = {2008},
  url          = {https://doi.org/10.1002/sat.912},
  doi          = {10.1002/SAT.912},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijscn/PietroI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PietroMMPR08,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei and
                  Alessandro Panconesi and
                  Jaikumar Radhakrishnan},
  title        = {Redoubtable Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {13:1--13:22},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341734},
  doi          = {10.1145/1341731.1341734},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PietroMMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AlbanoCP08,
  author       = {Michele Albano and
                  Stefano Chessa and
                  Roberto Di Pietro},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Information Assurance in Critical Infrastructures via Wireless Sensor
                  Networks},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {305--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.54},
  doi          = {10.1109/IAS.2008.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AlbanoCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdai/SolanasP08,
  author       = {Agusti Solanas and
                  Roberto Di Pietro},
  editor       = {Vicen{\c{c}} Torra and
                  Yasuo Narukawa},
  title        = {A Linear-Time Multivariate Micro-aggregation for Privacy Protection
                  in Uniform Very Large Data Sets},
  booktitle    = {Modeling Decisions for Artificial Intelligence, 5th International
                  Conference, {MDAI} 2008, Sabadell, Spain, October 30-31, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5285},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88269-5\_19},
  doi          = {10.1007/978-3-540-88269-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/mdai/SolanasP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/PietroMSST08,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Catch Me (If You Can): Data Survival in Unattended Sensor Networks},
  booktitle    = {Sixth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications (PerCom 2008), 17-21 March 2008, Hong Kong},
  pages        = {185--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PERCOM.2008.31},
  doi          = {10.1109/PERCOM.2008.31},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/PietroMSST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PietroM08,
  author       = {Roberto Di Pietro and
                  Pietro Michiardi},
  editor       = {Rida A. Bazzi and
                  Boaz Patt{-}Shamir},
  title        = {Gossip-based aggregate computation: computing faster with non address-oblivious
                  schemes},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2008, Toronto, Canada, August 18-21,
                  2008},
  pages        = {442},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1400751.1400837},
  doi          = {10.1145/1400751.1400837},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/PietroM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ColantonioPO08,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello},
  editor       = {Roger L. Wainwright and
                  Hisham Haddad},
  title        = {A cost-driven approach to role engineering},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC),
                  Fortaleza, Ceara, Brazil, March 16-20, 2008},
  pages        = {2129--2136},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1363686.1364198},
  doi          = {10.1145/1363686.1364198},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ColantonioPO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ColantonioPO08,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Leveraging Lattices to Improve Role Mining},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {333--347},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_22},
  doi          = {10.1007/978-0-387-09699-5\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ColantonioPO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BattistoniBPFM08,
  author       = {Roberto Battistoni and
                  Alessandro Di Biagio and
                  Roberto Di Pietro and
                  Matteo Formica and
                  Luigi V. Mancini},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A Live Digital Forensic system for Windows networks},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {653--667},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_42},
  doi          = {10.1007/978-0-387-09699-5\_42},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BattistoniBPFM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AteniesePMT08,
  author       = {Giuseppe Ateniese and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Gene Tsudik},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Scalable and efficient provable data possession},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460889},
  doi          = {10.1145/1460877.1460889},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AteniesePMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CirulliP08,
  author       = {Andrea Cirulli and
                  Roberto Di Pietro},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {{PEAC:} a probabilistic, efficient, and resilient authentication protocol
                  for broadcast communications},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {29},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460915},
  doi          = {10.1145/1460877.1460915},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/CirulliP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/PietroMST08,
  author       = {Roberto Di Pietro and
                  Di Ma and
                  Claudio Soriente and
                  Gene Tsudik},
  title        = {{POSH:} Proactive co-Operative Self-Healing in Unattended Wireless
                  Sensor Networks},
  booktitle    = {27th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2008),
                  Napoli, Italy, October 6-8, 2008},
  pages        = {185--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SRDS.2008.23},
  doi          = {10.1109/SRDS.2008.23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/PietroMST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TsudikBJKMPR08,
  author       = {Gene Tsudik and
                  Mike Burmester and
                  Ari Juels and
                  Alfred Kobsa and
                  David Molnar and
                  Roberto Di Pietro and
                  Melanie R. Rieback},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {{RFID} security and privacy: long-term research or short-term tinkering?},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {160},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352560},
  doi          = {10.1145/1352533.1352560},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TsudikBJKMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ContiPMM08,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Emergent properties: detection of the node-capture attack in mobile
                  wireless sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {214--219},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352568},
  doi          = {10.1145/1352533.1352568},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ContiPMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0810-5351,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello},
  title        = {An Activity-Based Model for Separation of Duty},
  journal      = {CoRR},
  volume       = {abs/0810.5351},
  year         = {2008},
  url          = {http://arxiv.org/abs/0810.5351},
  eprinttype    = {arXiv},
  eprint       = {0810.5351},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0810-5351.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AteniesePMT08,
  author       = {Giuseppe Ateniese and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Gene Tsudik},
  title        = {Scalable and Efficient Provable Data Possession},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AteniesePMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietroMSST08,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Maximizing data survival in Unattended Wireless Sensor Networks against
                  a focused mobile adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PietroMSST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ContiPM07,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini},
  title        = {{ECCE:} Enhanced cooperative channel establishment for secure pair-wise
                  communication in wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {5},
  number       = {1},
  pages        = {49--62},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.adhoc.2006.05.013},
  doi          = {10.1016/J.ADHOC.2006.05.013},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ContiPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZaninPM07,
  author       = {Giorgio Zanin and
                  Roberto Di Pietro and
                  Luigi V. Mancini},
  title        = {Robust {RSA} distributed signatures for large-scale long-lived ad
                  hoc networks},
  journal      = {J. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {171--196},
  year         = {2007},
  url          = {https://doi.org/10.3233/jcs-2007-15107},
  doi          = {10.3233/JCS-2007-15107},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZaninPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PietroM07,
  author       = {Roberto Di Pietro and
                  Refik Molva},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Information Confinement, Privacy, and Security in {RFID} Systems},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_13},
  doi          = {10.1007/978-3-540-74835-9\_13},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PietroM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/PietroMM07,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Towards threat-adaptive dynamic fragment replication in large scale
                  distributed systems},
  booktitle    = {21th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IPDPS.2007.370649},
  doi          = {10.1109/IPDPS.2007.370649},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/PietroMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/CencioniP07,
  author       = {Paolo Cencioni and
                  Roberto Di Pietro},
  title        = {{VIPER:} {A} vehicle-to-infrastructure communication privacy enforcement
                  protocol},
  booktitle    = {{IEEE} 4th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2007, 8-11 October 2007, Pisa, Italy},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MOBHOC.2007.4428740},
  doi          = {10.1109/MOBHOC.2007.4428740},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/CencioniP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/LawYPP07,
  author       = {Yee Wei Law and
                  Li{-}Hsing Yen and
                  Roberto Di Pietro and
                  Marimuthu Palaniswami},
  title        = {Secure k-Connectivity Properties of Wireless Sensor Networks},
  booktitle    = {{IEEE} 4th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2007, 8-11 October 2007, Pisa, Italy},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MOBHOC.2007.4428764},
  doi          = {10.1109/MOBHOC.2007.4428764},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/LawYPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/ContiPMM07,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  editor       = {Evangelos Kranakis and
                  Elizabeth M. Belding and
                  Eytan H. Modiano},
  title        = {A randomized, efficient, and distributed protocol for the detection
                  of node replication attacks in wireless sensor networks},
  booktitle    = {Proceedings of the 8th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada,
                  September 9-14, 2007},
  pages        = {80--89},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288107.1288119},
  doi          = {10.1145/1288107.1288119},
  timestamp    = {Mon, 22 Feb 2021 15:13:40 +0100},
  biburl       = {https://dblp.org/rec/conf/mobihoc/ContiPMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ContiPMS07,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Angelo Spognardi},
  title        = {{RIPP-FS:} An {RFID} Identification, Privacy Preserving Protocol with
                  Forward Secrecy},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {229--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.100},
  doi          = {10.1109/PERCOMW.2007.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/ContiPMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/ChessaPFGO07,
  author       = {Stefano Chessa and
                  Roberto Di Pietro and
                  Erina Ferro and
                  Gaetano Giunta and
                  Gabriele Oligeri},
  title        = {Mobile Application Security for Video Streaming Authentication and
                  Data Integrity Combining Digital Signature and Watermarking Techniques},
  booktitle    = {Proceedings of the 65th {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2007, 22-25 April 2007, Dublin, Ireland},
  pages        = {634--638},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/VETECS.2007.141},
  doi          = {10.1109/VETECS.2007.141},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/ChessaPFGO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/PietroMM06,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Energy efficient node-to-node authentication and communication confidentiality
                  in wireless sensor networks},
  journal      = {Wirel. Networks},
  volume       = {12},
  number       = {6},
  pages        = {709--721},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11276-006-6530-5},
  doi          = {10.1007/S11276-006-6530-5},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/PietroMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PietroMDP06,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Antonio Durante and
                  Vishwas Patil},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Addressing the shortcomings of one-way chains},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {289--296},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128860},
  doi          = {10.1145/1128817.1128860},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PietroMDP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/SpognardiP06,
  author       = {Angelo Spognardi and
                  Roberto Di Pietro},
  title        = {A formal framework for the performance analysis of {P2P} networks
                  protocols},
  booktitle    = {20th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IPDPS.2006.1639714},
  doi          = {10.1109/IPDPS.2006.1639714},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/SpognardiP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ContiPM06,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini},
  title        = {Secure Cooperative Channel Establishment inWireless Sensor Networks},
  booktitle    = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy},
  pages        = {327--331},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/PERCOMW.2006.121},
  doi          = {10.1109/PERCOMW.2006.121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/ContiPM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/PietroMMPR06,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei and
                  Alessandro Panconesi and
                  Jaikumar Radhakrishnan},
  title        = {Sensor Networks that Are Provably Resilient},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359569},
  doi          = {10.1109/SECCOMW.2006.359569},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/PietroMMPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/ContiPMM06,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Requirements and Open Issues in Distributed Detection of Node Identity
                  Replicas in {WSN}},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Taipei, Taiwan, October 8-11, 2006},
  pages        = {1468--1473},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICSMC.2006.384924},
  doi          = {10.1109/ICSMC.2006.384924},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/ContiPMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/PietroMZ07,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Giorgio Zanin},
  editor       = {Giovanni Di Crescenzo and
                  Luigi V. Mancini},
  title        = {Efficient and Adaptive Threshold Signatures for Ad hoc networks},
  booktitle    = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2006, Venice, Italy, July 16, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {1},
  pages        = {93--105},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.012},
  doi          = {10.1016/J.ENTCS.2006.11.012},
  timestamp    = {Fri, 27 Jan 2023 10:49:50 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/PietroMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotp2p/SpognardiLP05,
  author       = {Angelo Spognardi and
                  Alessandro Lucarelli and
                  Roberto Di Pietro},
  title        = {A methodology for {P2P} file-sharing traffic detection},
  booktitle    = {Second International Workshop on Hot Topics in Peer-to-Peer Systems,
                  {HOT-P2P} 2005, San Diego, California, USA, July 21, 2005},
  pages        = {52--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HOT-P2P.2005.2},
  doi          = {10.1109/HOT-P2P.2005.2},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotp2p/SpognardiLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmb/PietroMS05,
  author       = {Roberto Di Pietro and
                  Gianluigi Me and
                  Maurizio Adriano Strangio},
  title        = {A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions},
  booktitle    = {2005 International Conference on Mobile Business {(ICMB} 2005), 11-13
                  July 2005, Sydney, Australia},
  pages        = {28--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICMB.2005.12},
  doi          = {10.1109/ICMB.2005.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmb/PietroMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/PietroCM05,
  author       = {Roberto Di Pietro and
                  Stefano Chessa and
                  Piero Maestrini},
  title        = {Computation, Memory and Bandwidth Efficient Distillation Codes to
                  Mitigate DoS in Multicast},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {13--22},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.15},
  doi          = {10.1109/SECURECOMM.2005.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/PietroCM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/PietroDMP05,
  author       = {Roberto Di Pietro and
                  Antonio Durante and
                  Luigi V. Mancini and
                  Vishwas Patil},
  title        = {Short Paper: Practically Unbounded One-Way Chains for Authentication
                  with Backward Secrecy},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {400--402},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.46},
  doi          = {10.1109/SECURECOMM.2005.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/PietroDMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/it/DiPietro04,
  author       = {Roberto Di Pietro},
  title        = {Security issues for wireless sensor networks},
  school       = {Sapienza University of Rome, Italy},
  year         = {2004},
  url          = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0005909},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/it/DiPietro04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PietroMM04,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Key management for high bandwidth secure multicast},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {693--709},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12502},
  doi          = {10.3233/JCS-2004-12502},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PietroMM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotp2p/SpognardiPM04,
  author       = {Angelo Spognardi and
                  Roberto Di Pietro and
                  Luigi V. Mancini},
  title        = {BaRT, balanced randomized tree: a scalable and distributed protocol
                  for lookup in peer-to-peer networks},
  booktitle    = {International Workshop on Hot Topics in Peer-to-Peer Systems, {HOT-P2P}
                  2004, Volendam, The Netherlands, October 8, 2004},
  pages        = {22--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PTPSYS.2004.4},
  doi          = {10.1109/PTPSYS.2004.4},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotp2p/SpognardiPM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6/ChessaPM04,
  author       = {Stefano Chessa and
                  Roberto Di Pietro and
                  Piero Maestrini},
  editor       = {Roberto Battiti and
                  Marco Conti and
                  Renato Lo Cigno},
  title        = {Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An
                  Assessment of {DS} 2},
  booktitle    = {Wireless On-Demand Network Systems, First {IFIP} {TC6} Working Conference,
                  {WONS} 2004, Madonna di Campiglio, Italy, January 21-23, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2928},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24614-5\_14},
  doi          = {10.1007/978-3-540-24614-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6/ChessaPM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/PietroMM04,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment},
  booktitle    = {18th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2004), {CD-ROM} / Abstracts Proceedings, 26-30 April 2004, Santa Fe,
                  New Mexico, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IPDPS.2004.1303251},
  doi          = {10.1109/IPDPS.2004.1303251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/PietroMM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/PietroMMPR04,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei and
                  Alessandro Panconesi and
                  Jaikumar Radhakrishnan},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Connectivity properties of secure wireless sensor networks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2004, Washington, DC, USA, October 25, 2004},
  pages        = {53--58},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029102.1029112},
  doi          = {10.1145/1029102.1029112},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/PietroMMPR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/PietroMJ03,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  title        = {Providing secrecy in key management protocols for large wireless sensors
                  networks},
  journal      = {Ad Hoc Networks},
  volume       = {1},
  number       = {4},
  pages        = {455--468},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1570-8705(03)00046-5},
  doi          = {10.1016/S1570-8705(03)00046-5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/PietroMJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PietroM03,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini},
  title        = {Security and privacy issues of handheld and wearable wireless devices},
  journal      = {Commun. {ACM}},
  volume       = {46},
  number       = {9},
  pages        = {74--79},
  year         = {2003},
  url          = {https://doi.org/10.1145/903893.903897},
  doi          = {10.1145/903893.903897},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/PietroM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/PietroMLEH03,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Yee Wei Law and
                  Sandro Etalle and
                  Paul J. M. Havinga},
  title        = {{LKHW:} {A} Directed Diffusion-Based Secure Multicast Scheme for Wireless
                  Sensor Networks},
  booktitle    = {32nd International Conference on Parallel Processing Workshops {(ICPP}
                  2003 Workshops), 6-9 October 2003, Kaohsiung, Taiwan},
  pages        = {397},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICPPW.2003.1240395},
  doi          = {10.1109/ICPPW.2003.1240395},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/PietroMLEH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/PietroMM03,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Random key-assignment for secure Wireless Sensor Networks},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003},
  pages        = {62--71},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986858.986868},
  doi          = {10.1145/986858.986868},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sasn/PietroMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PietroMM03,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {A Time Driven Methodology for Key Dimensioning in Multicast Communications},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {121--132},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Thu, 22 May 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PietroMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/PietroDM03,
  author       = {Roberto Di Pietro and
                  Antonio Durante and
                  Luigi V. Mancini},
  title        = {A Reliable Key Authentication Schema for Secure Multicast Communications},
  booktitle    = {22nd Symposium on Reliable Distributed Systems {(SRDS} 2003), 6-8
                  October 2003, Florence, Italy},
  pages        = {231--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/RELDIS.2003.1238073},
  doi          = {10.1109/RELDIS.2003.1238073},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/PietroDM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fasec/DurantePM02,
  author       = {Antonio Durante and
                  Roberto Di Pietro and
                  Luigi V. Mancini},
  editor       = {Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Formal Specification for Fast Automatic {IDS} Training},
  booktitle    = {Formal Aspects of Security, First International Conference, FASec
                  2002, London, UK, December 16-18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2629},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-40981-6\_16},
  doi          = {10.1007/978-3-540-40981-6\_16},
  timestamp    = {Wed, 15 Sep 2021 13:43:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fasec/DurantePM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pomc/PietroMJ02,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  title        = {Efficient and secure keys management for wireless mobile communications},
  booktitle    = {Proceedings of the 2002 Workshop on Principles of Mobile Computing,
                  {POMC} 2002, October 30-31, 2002, Toulouse, France},
  pages        = {66--73},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/584490.584504},
  doi          = {10.1145/584490.584504},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pomc/PietroMJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PietroMJ02,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Secure Selective Exclusion in Ad Hoc Wireless Network},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {423--434},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 11 Feb 2005 12:53:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/PietroMJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}