default search action
BibTeX records: Roberto Di Pietro
@book{DBLP:series/ais/FernandezOP24, author = {Javier Hernandez Fernandez and Aymen Omri and Roberto Di Pietro}, title = {Physical Layer Security in Power Line Communications - Fundamentals, Models and Applications}, series = {Advances in Information Security}, volume = {108}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57349-1}, doi = {10.1007/978-3-031-57349-1}, isbn = {978-3-031-57348-4}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FernandezOP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/RabhiP24, author = {Mouna Rabhi and Roberto Di Pietro}, title = {An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure}, journal = {Comput. Commun.}, volume = {218}, pages = {1--13}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2024.02.007}, doi = {10.1016/J.COMCOM.2024.02.007}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/RabhiP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/IbrahimSP24, author = {Omar Adel Ibrahim and Savio Sciancalepore and Roberto Di Pietro}, title = {MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning}, journal = {Comput. Secur.}, volume = {143}, pages = {103905}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103905}, doi = {10.1016/J.COSE.2024.103905}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/IbrahimSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/YangAFJPE24, author = {Zebo Yang and Haneen Alfauri and Behrooz Farkiani and Raj Jain and Roberto Di Pietro and Aiman Erbad}, title = {A Survey and Comparison of Post-Quantum and Quantum Blockchains}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {26}, number = {2}, pages = {967--1002}, year = {2024}, url = {https://doi.org/10.1109/COMST.2023.3325761}, doi = {10.1109/COMST.2023.3325761}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/YangAFJPE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/RabhiBP24, author = {Mouna Rabhi and Spiridon Bakiras and Roberto Di Pietro}, title = {Audio-deepfake detection: Adversarial attacks and countermeasures}, journal = {Expert Syst. Appl.}, volume = {250}, pages = {123941}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2024.123941}, doi = {10.1016/J.ESWA.2024.123941}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/RabhiBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SalmanGPBAJC24, author = {Tara Salman and Ali Ghubaish and Roberto Di Pietro and Mohamed Baza and Hani Alshahrani and Raj Jain and Kim{-}Kwang Raymond Choo}, title = {CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {3030--3047}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3322038}, doi = {10.1109/TDSC.2023.3322038}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SalmanGPBAJC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/IbrahimP24, author = {Omar Adel Ibrahim and Roberto Di Pietro}, editor = {Joaquin Garc{\'{\i}}a{-}Alfaro and Rafal Kozik and Michal Choras and Sokratis K. Katsikas}, title = {{MAG-JAM:} Jamming Detection via Magnetic Emissions}, booktitle = {Computer Security - {ESORICS} 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14982}, pages = {167--186}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-70879-4\_9}, doi = {10.1007/978-3-031-70879-4\_9}, timestamp = {Fri, 13 Sep 2024 21:29:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/IbrahimP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-10543, author = {Maurantonio Caprolu and Roberto Di Pietro and Flavio Lombardi and Elia Onofri}, title = {Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights}, journal = {CoRR}, volume = {abs/2404.10543}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.10543}, doi = {10.48550/ARXIV.2404.10543}, eprinttype = {arXiv}, eprint = {2404.10543}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-10543.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/EliyanP23, author = {Lubna Fayez Eliyan and Roberto Di Pietro}, title = {DeMi: {A} Solution to Detect and Mitigate DoS Attacks in {SDN}}, journal = {{IEEE} Access}, volume = {11}, pages = {82477--82495}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3301994}, doi = {10.1109/ACCESS.2023.3301994}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/EliyanP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlyP23, author = {Hussein A. Aly and Roberto Di Pietro}, title = {PulseOblivion: An Effective Session-Based Continuous Authentication Scheme Using {PPG} Signals}, journal = {{IEEE} Access}, volume = {11}, pages = {124213--124227}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3329993}, doi = {10.1109/ACCESS.2023.3329993}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlyP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OmriFP23, author = {Aymen Omri and Javier Hernandez Fernandez and Roberto Di Pietro}, title = {Extending device noise measurement capacity for OFDM-based {PLC} systems: Design, implementation, and on-field validation}, journal = {Comput. Networks}, volume = {237}, pages = {110038}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.110038}, doi = {10.1016/J.COMNET.2023.110038}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/OmriFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SalveMRP23, author = {Andrea De Salve and Paolo Mori and Laura Ricci and Roberto Di Pietro}, title = {Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions}, journal = {Comput. Commun.}, volume = {203}, pages = {199--225}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.02.023}, doi = {10.1016/J.COMCOM.2023.02.023}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/SalveMRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Al-SadiPLS23, author = {Mohammed Al{-}Sadi and Roberto Di Pietro and Flavio Lombardi and Matteo Signorini}, title = {{LENTO:} Unpredictable Latency-based continuous authEntication for Network inTensive IoT envirOnments}, journal = {Future Gener. Comput. Syst.}, volume = {139}, pages = {151--166}, year = {2023}, url = {https://doi.org/10.1016/j.future.2022.09.023}, doi = {10.1016/J.FUTURE.2022.09.023}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/Al-SadiPLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WisseTSP23, author = {Eva Wisse and Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {A\({}^{\mbox{2}}\)RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {12}, pages = {10587--10604}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3240477}, doi = {10.1109/JIOT.2023.3240477}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WisseTSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TedeschiSP23, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {{PPCA} - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1541--1558}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3159837}, doi = {10.1109/TDSC.2022.3159837}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TedeschiSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TedeschiBP23, author = {Pietro Tedeschi and Spiridon Bakiras and Roberto Di Pietro}, title = {SpreadMeNot: {A} Provably Secure and Privacy-Preserving Contact Tracing Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2500--2515}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3186153}, doi = {10.1109/TDSC.2022.3186153}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TedeschiBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OligeriSRP23, author = {Gabriele Oligeri and Savio Sciancalepore and Simone Raponi and Roberto Di Pietro}, title = {{PAST-AI:} Physical-Layer Authentication of Satellite Transmitters via Deep Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {274--289}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3219287}, doi = {10.1109/TIFS.2022.3219287}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OligeriSRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TedeschiSP23, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {178--189}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627174}, doi = {10.1145/3627106.3627174}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TedeschiSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dappcon/CaproluBBP23, author = {Maurantonio Caprolu and Elmahdi Bentafat and Spiridon Bakiras and Roberto Di Pietro}, title = {{UBIC-A} Blockchain-Less Cryptocurrency}, booktitle = {{IEEE} International Conference on Decentralized Applications and Infrastructures, {DAPPS} 2023, Athens, Greece, July 17-20, 2023}, pages = {23--30}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DAPPS57946.2023.00013}, doi = {10.1109/DAPPS57946.2023.00013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dappcon/CaproluBBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AbbasCP23, author = {Hanaa Abbas and Maurantonio Caprolu and Roberto Di Pietro}, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights}, booktitle = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13951}, pages = {259--275}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47751-5\_15}, doi = {10.1007/978-3-031-47751-5\_15}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AbbasCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/BelloSP23, author = {Ahmad Sani Bello and Jens Schneider and Roberto Di Pietro}, title = {{LLD:} {A} Low Latency Detection Solution to Thwart Cryptocurrency Pump {\&} Dumps}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBC56567.2023.10174922}, doi = {10.1109/ICBC56567.2023.10174922}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/BelloSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/CaproluP23, author = {Maurantonio Caprolu and Roberto Di Pietro}, title = {Account Clustering in the Polkadot Network: Heuristic, Experiments, and Insights}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBC56567.2023.10174938}, doi = {10.1109/ICBC56567.2023.10174938}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/CaproluP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/CaproluSP23, author = {Maurantonio Caprolu and Alireza Sadighian and Roberto Di Pietro}, title = {Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key Findings}, booktitle = {32nd International Conference on Computer Communications and Networks, {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCN58024.2023.10230192}, doi = {10.1109/ICCCN58024.2023.10230192}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/CaproluSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idsta/MahrousSP23, author = {Ahmed Mahrous and Jens Schneider and Roberto Di Pietro}, editor = {Mohammad A. Alsmirat and Yaser Jararweh and Moayad Aloqaily and Jaime Lloret}, title = {The Role of Emojis in Sentiment Analysis of Financial Microblogs}, booktitle = {Fourth International Conference on Intelligent Data Science Technologies and Applications, {IDSTA} 2023, Kuwai, Kuwait, October 24-26, 2023}, pages = {76--84}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IDSTA58916.2023.10317863}, doi = {10.1109/IDSTA58916.2023.10317863}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idsta/MahrousSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/OmriFP23, author = {Aymen Omri and Javier Hernandez Fernandez and Roberto Di Pietro}, title = {Subcarrier-Index Modulation for OFDM-based {PLC} Systems}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth, Tunisia, July 9-12, 2023}, pages = {649--655}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISCC58397.2023.10217844}, doi = {10.1109/ISCC58397.2023.10217844}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscc/OmriFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/FernandezOP23, author = {Javier Hernandez Fernandez and Aymen Omri and Roberto Di Pietro}, title = {Performance Analysis of Physical Layer Security in Power Line Communication Networks}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth, Tunisia, July 9-12, 2023}, pages = {777--782}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISCC58397.2023.10217916}, doi = {10.1109/ISCC58397.2023.10217916}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscc/FernandezOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/OmriFP23, author = {Aymen Omri and Javier Hernandez Fernandez and Roberto Di Pietro}, title = {Secure and Successful Transmission Probability Analysis for {PLC} Networks}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2023, Doha, Qatar, October 23-26, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISNCC58260.2023.10323769}, doi = {10.1109/ISNCC58260.2023.10323769}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isncc/OmriFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/IbrahimP23, author = {Omar Adel Ibrahim and Roberto Di Pietro}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {305--316}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590198}, doi = {10.1145/3558482.3590198}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/IbrahimP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-17251, author = {Stefano Cresci and Roberto Di Pietro and Angelo Spognardi and Maurizio Tesconi and Marinella Petrocchi}, title = {Demystifying Misconceptions in Social Bots Research}, journal = {CoRR}, volume = {abs/2303.17251}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.17251}, doi = {10.48550/ARXIV.2303.17251}, eprinttype = {arXiv}, eprint = {2303.17251}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-17251.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-12161, author = {Mouna Rabhi and Roberto Di Pietro}, title = {Adversarial Attacks Neutralization via Data Set Randomization}, journal = {CoRR}, volume = {abs/2306.12161}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.12161}, doi = {10.48550/ARXIV.2306.12161}, eprinttype = {arXiv}, eprint = {2306.12161}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-12161.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-12643, author = {Waqas Aman and Flavio Giorgi and Giulio Attenni and Saif Al{-}Kuwari and Elmehdi Illi and Marwa K. Qaraqe and Gaia Maselli and Roberto Di Pietro}, title = {Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication}, journal = {CoRR}, volume = {abs/2307.12643}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.12643}, doi = {10.48550/ARXIV.2307.12643}, eprinttype = {arXiv}, eprint = {2307.12643}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-12643.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10598, author = {Abdulah Jarouf and Javier Hernandez Fernandez and Aymen Omri and Roberto Di Pietro}, title = {Inferring Power Grid Information with Power Line Communications: Review and Insights}, journal = {CoRR}, volume = {abs/2308.10598}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10598}, doi = {10.48550/ARXIV.2308.10598}, eprinttype = {arXiv}, eprint = {2308.10598}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FernandezOP22, author = {Javier Hernandez Fernandez and Aymen Omri and Roberto Di Pietro}, title = {Channel Impulse Response Multilevel Quantization for Power Line Communications}, journal = {{IEEE} Access}, volume = {10}, pages = {66113--66126}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3184038}, doi = {10.1109/ACCESS.2022.3184038}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FernandezOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OligeriSIP22, author = {Gabriele Oligeri and Savio Sciancalepore and Omar Adel Ibrahim and Roberto Di Pietro}, title = {{GPS} spoofing detection via crowd-sourced information for connected vehicles}, journal = {Comput. Networks}, volume = {216}, pages = {109230}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109230}, doi = {10.1016/J.COMNET.2022.109230}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/OligeriSIP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TedeschiSP22, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {Satellite-based communications security: {A} survey of threats, solutions, and research challenges}, journal = {Comput. Networks}, volume = {216}, pages = {109246}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109246}, doi = {10.1016/J.COMNET.2022.109246}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/TedeschiSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/IbrahimSP22, author = {Omar Adel Ibrahim and Savio Sciancalepore and Roberto Di Pietro}, title = {Noise2Weight: On detecting payload weight from drones acoustic emissions}, journal = {Future Gener. Comput. Syst.}, volume = {134}, pages = {319--333}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.03.041}, doi = {10.1016/J.FUTURE.2022.03.041}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/IbrahimSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RaponiSOP22, author = {Simone Raponi and Savio Sciancalepore and Gabriele Oligeri and Roberto Di Pietro}, title = {Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {3}, pages = {71--79}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3110307}, doi = {10.1109/MSEC.2021.3110307}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RaponiSOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TedeschiJSWBP22, author = {Pietro Tedeschi and Kang Eun Jeon and James She and Simon Wong and Spiridon Bakiras and Roberto Di Pietro}, title = {Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {3}, pages = {91--100}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3115497}, doi = {10.1109/MSEC.2021.3115497}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TedeschiJSWBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/PietroTI22, author = {Roberto Di Pietro and Ni Trieu and Vincenzo Iovino}, title = {{COVID-19} and cybersecurity}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {5}, pages = {321--323}, year = {2022}, url = {https://doi.org/10.1049/ise2.12084}, doi = {10.1049/ISE2.12084}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/PietroTI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/MarinPP22, author = {Eduard Marin and Diego Perino and Roberto Di Pietro}, title = {Serverless computing: a security perspective}, journal = {J. Cloud Comput.}, volume = {11}, pages = {69}, year = {2022}, url = {https://doi.org/10.1186/s13677-022-00347-w}, doi = {10.1186/S13677-022-00347-W}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/MarinPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TedeschiOP22, author = {Pietro Tedeschi and Gabriele Oligeri and Roberto Di Pietro}, title = {Localization of a Power-Modulated Jammer}, journal = {Sensors}, volume = {22}, number = {2}, pages = {646}, year = {2022}, url = {https://doi.org/10.3390/s22020646}, doi = {10.3390/S22020646}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/TedeschiOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SciancaleporeTA22, author = {Savio Sciancalepore and Pietro Tedeschi and Ahmed Aziz and Roberto Di Pietro}, title = {Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels {AIS} Broadcasts}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2709--2726}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3069428}, doi = {10.1109/TDSC.2021.3069428}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SciancaleporeTA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/RaponiKOP22, author = {Simone Raponi and Zeinab Khalifa and Gabriele Oligeri and Roberto Di Pietro}, title = {Fake News Propagation: {A} Review of Epidemic Models, Datasets, and Insights}, journal = {{ACM} Trans. Web}, volume = {16}, number = {3}, pages = {12:1--12:34}, year = {2022}, url = {https://doi.org/10.1145/3522756}, doi = {10.1145/3522756}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/RaponiKOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/AbbasCP22, author = {Hanaa Abbas and Maurantonio Caprolu and Roberto Di Pietro}, title = {Analysis of Polkadot: Architecture, Internals, and Contradictions}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2022, Espoo, Finland, August 22-25, 2022}, pages = {61--70}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/Blockchain55522.2022.00019}, doi = {10.1109/BLOCKCHAIN55522.2022.00019}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/AbbasCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IbrahimOP22, author = {Omar Adel Ibrahim and Gabriele Oligeri and Roberto Di Pietro}, title = {Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {109--117}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.9947258}, doi = {10.1109/CNS56114.2022.9947258}, timestamp = {Fri, 25 Nov 2022 09:04:32 +0100}, biburl = {https://dblp.org/rec/conf/cns/IbrahimOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SciancaleporeRC22, author = {Savio Sciancalepore and Simone Raponi and Daniele Caldarola and Roberto Di Pietro}, editor = {Cristina Alcaraz and Liqun Chen and Shujun Li and Pierangela Samarati}, title = {{FRACTAL:} Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal}, booktitle = {Information and Communications Security - 24th International Conference, {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13407}, pages = {201--217}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15777-6\_12}, doi = {10.1007/978-3-031-15777-6\_12}, timestamp = {Fri, 02 Sep 2022 10:50:10 +0200}, biburl = {https://dblp.org/rec/conf/icics/SciancaleporeRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/RabhiBP22, author = {Mouna Rabhi and Spiridon Bakiras and Roberto Di Pietro}, editor = {Cristina Alcaraz and Liqun Chen and Shujun Li and Pierangela Samarati}, title = {{FN2:} Fake News DetectioN Based on Textual and Contextual Features}, booktitle = {Information and Communications Security - 24th International Conference, {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13407}, pages = {472--491}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15777-6\_26}, doi = {10.1007/978-3-031-15777-6\_26}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/RabhiBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Pietro22, author = {Roberto Di Pietro}, editor = {Sven Dietrich and Omar Chowdhury and Daniel Takabi}, title = {Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead}, booktitle = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022}, pages = {1--2}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3532105.3535041}, doi = {10.1145/3532105.3535041}, timestamp = {Mon, 13 Jun 2022 16:29:51 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Pietro22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/IbrahimSP22, author = {Omar Adel Ibrahim and Savio Sciancalepore and Roberto Di Pietro}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {{MAG-PUF:} Magnetic Physical Unclonable Functions for Device Authentication in the IoT}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {130--149}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_8}, doi = {10.1007/978-3-031-25538-0\_8}, timestamp = {Thu, 06 Jul 2023 17:45:42 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/IbrahimSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/IbrahimSP22, author = {Omar Adel Ibrahim and Savio Sciancalepore and Roberto Di Pietro}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {{MAG-PUF} - Authenticating IoT Devices via Magnetic Physical Unclonable Functions}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {290--291}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529656}, doi = {10.1145/3507657.3529656}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/IbrahimSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eicc/2022, editor = {David Meg{\'{\i}}as and Roberto Di Pietro and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {{EICC} 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3528580}, doi = {10.1145/3528580}, isbn = {978-1-4503-9603-5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eicc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022-1, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6}, doi = {10.1007/978-3-031-17140-6}, isbn = {978-3-031-17139-0}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022-2, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8}, doi = {10.1007/978-3-031-17146-8}, isbn = {978-3-031-17145-1}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022-3, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7}, doi = {10.1007/978-3-031-17143-7}, isbn = {978-3-031-17142-0}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-07590, author = {Roberto Di Pietro and Stefano Cresci}, title = {Metaverse: Security and Privacy Issues}, journal = {CoRR}, volume = {abs/2205.07590}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.07590}, doi = {10.48550/ARXIV.2205.07590}, eprinttype = {arXiv}, eprint = {2205.07590}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-07590.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-03084, author = {Andrea De Salve and Paolo Mori and Laura Ricci and Roberto Di Pietro}, title = {Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions}, journal = {CoRR}, volume = {abs/2206.03084}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.03084}, doi = {10.48550/ARXIV.2206.03084}, eprinttype = {arXiv}, eprint = {2206.03084}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-03084.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-02051, author = {Hanaa Abbas and Roberto Di Pietro}, title = {Sanitization of Visual Multimedia Content: {A} Survey of Techniques, Attacks, and Future Directions}, journal = {CoRR}, volume = {abs/2207.02051}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.02051}, doi = {10.48550/ARXIV.2207.02051}, eprinttype = {arXiv}, eprint = {2207.02051}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-02051.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-14128, author = {Hanaa Abbas and Maurantonio Caprolu and Roberto Di Pietro}, title = {Analysis of Polkadot: Architecture, Internals, and Contradictions}, journal = {CoRR}, volume = {abs/2207.14128}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.14128}, doi = {10.48550/ARXIV.2207.14128}, eprinttype = {arXiv}, eprint = {2207.14128}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-14128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-04903, author = {Maurantonio Caprolu and Alireza Sadighian and Roberto Di Pietro}, title = {Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings}, journal = {CoRR}, volume = {abs/2208.04903}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.04903}, doi = {10.48550/ARXIV.2208.04903}, eprinttype = {arXiv}, eprint = {2208.04903}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-04903.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-11743, author = {Eva Wisse and Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {A\({}^{\mbox{2}}\)RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones}, journal = {CoRR}, volume = {abs/2210.11743}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.11743}, doi = {10.48550/ARXIV.2210.11743}, eprinttype = {arXiv}, eprint = {2210.11743}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-11743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/PietroRCC21, author = {Roberto Di Pietro and Simone Raponi and Maurantonio Caprolu and Stefano Cresci}, title = {New Dimensions of Information Warfare}, series = {Advances in Information Security}, volume = {84}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-60618-3}, doi = {10.1007/978-3-030-60618-3}, isbn = {978-3-030-60617-6}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/PietroRCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PopperMP21, author = {Christina P{\"{o}}pper and Michail Maniatakos and Roberto Di Pietro}, title = {Cyber security research in the Arab region: a blooming ecosystem with global ambitions}, journal = {Commun. {ACM}}, volume = {64}, number = {4}, pages = {96--101}, year = {2021}, url = {https://doi.org/10.1145/3447741}, doi = {10.1145/3447741}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/PopperMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/TedeschiBP21, author = {Pietro Tedeschi and Spiridon Bakiras and Roberto Di Pietro}, title = {IoTrace: {A} Flexible, Efficient, and Privacy-Preserving IoT-Enabled Architecture for Contact Tracing}, journal = {{IEEE} Commun. Mag.}, volume = {59}, number = {6}, pages = {82--88}, year = {2021}, url = {https://doi.org/10.1109/MCOM.001.2000729}, doi = {10.1109/MCOM.001.2000729}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/TedeschiBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/CaproluROP21, author = {Maurantonio Caprolu and Simone Raponi and Gabriele Oligeri and Roberto Di Pietro}, title = {Cryptomining makes noise: Detecting cryptojacking via Machine Learning}, journal = {Comput. Commun.}, volume = {171}, pages = {126--139}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2021.02.016}, doi = {10.1016/J.COMCOM.2021.02.016}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/CaproluROP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/CaproluSP21, author = {Maurantonio Caprolu and Savio Sciancalepore and Roberto Di Pietro}, title = {Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {23}, number = {1}, pages = {311--340}, year = {2021}, url = {https://doi.org/10.1109/COMST.2020.2969030}, doi = {10.1109/COMST.2020.2969030}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/CaproluSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AliCP20, author = {Isra Mohamed Ali and Maurantonio Caprolu and Roberto Di Pietro}, title = {Foundations, Properties, and Security Applications of Puzzles: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {53}, number = {4}, pages = {72:1--72:38}, year = {2021}, url = {https://doi.org/10.1145/3396374}, doi = {10.1145/3396374}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AliCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/EliyanP21, author = {Lubna Fayez Eliyan and Roberto Di Pietro}, title = {DoS and DDoS attacks in Software Defined Networks: {A} survey of existing solutions and research challenges}, journal = {Future Gener. Comput. Syst.}, volume = {122}, pages = {149--171}, year = {2021}, url = {https://doi.org/10.1016/j.future.2021.03.011}, doi = {10.1016/J.FUTURE.2021.03.011}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/EliyanP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SciancaleporeP21, author = {Savio Sciancalepore and Roberto Di Pietro}, title = {{PPRQ:} Privacy-Preserving {MAX/MIN} Range Queries in IoT Networks}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {6}, pages = {5075--5092}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3037115}, doi = {10.1109/JIOT.2020.3037115}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/SciancaleporeP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SciancaleporeAP21, author = {Savio Sciancalepore and Saeif Alhazbi and Roberto Di Pietro}, title = {Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures}, journal = {J. Netw. Comput. Appl.}, volume = {174}, pages = {102892}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2020.102892}, doi = {10.1016/J.JNCA.2020.102892}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SciancaleporeAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SciancaleporeP21, author = {Savio Sciancalepore and Roberto Di Pietro}, title = {{SOS:} Standard-Compliant and Packet Loss Tolerant Security Framework for {ADS-B} Communications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1681--1698}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2934446}, doi = {10.1109/TDSC.2019.2934446}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SciancaleporeP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/IbrahimSOP21, author = {Omar Adel Ibrahim and Savio Sciancalepore and Gabriele Oligeri and Roberto Di Pietro}, title = {{MAGNETO:} Fingerprinting {USB} Flash Drives via Unintentional Magnetic Emissions}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {20}, number = {1}, pages = {8:1--8:26}, year = {2021}, url = {https://doi.org/10.1145/3422308}, doi = {10.1145/3422308}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tecs/IbrahimSOP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkdd/SalveMGRP21, author = {Andrea De Salve and Paolo Mori and Barbara Guidi and Laura Ricci and Roberto Di Pietro}, title = {Predicting Influential Users in Online Social Network Groups}, journal = {{ACM} Trans. Knowl. Discov. Data}, volume = {15}, number = {3}, pages = {35:1--35:50}, year = {2021}, url = {https://doi.org/10.1145/3441447}, doi = {10.1145/3441447}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkdd/SalveMGRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TedeschiSP21, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {{ARID:} Anonymous Remote IDentification of Unmanned Aerial Vehicles}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {207--218}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485834}, doi = {10.1145/3485832.3485834}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TedeschiSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/CaproluPSSP21, author = {Maurantonio Caprolu and Matteo Pontecorvi and Matteo Signorini and Carlos Segarra and Roberto Di Pietro}, editor = {Yang Xiang and Ziyuan Wang and Honggang Wang and Valtteri Niemi}, title = {Analysis and Patterns of Unknown Transactions in Bitcoin}, booktitle = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021}, pages = {170--179}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/Blockchain53845.2021.00031}, doi = {10.1109/BLOCKCHAIN53845.2021.00031}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/CaproluPSSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SciancaleporeTR21, author = {Savio Sciancalepore and Pietro Tedeschi and Usman Riasat and Roberto Di Pietro}, title = {Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {10--18}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705038}, doi = {10.1109/CNS53000.2021.9705038}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SciancaleporeTR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/TedeschiSP21, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {Modelling a Communication Channel under Jamming: Experimental Model and Applications}, booktitle = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021}, pages = {1562--1573}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00210}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00210}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/TedeschiSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/RaponiCP21, author = {Simone Raponi and Maurantonio Caprolu and Roberto Di Pietro}, editor = {Alessandro Armando and Michele Colajanni}, title = {Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {394--405}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper33.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/RaponiCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/PietroC21, author = {Roberto Di Pietro and Stefano Cresci}, title = {Metaverse: Security and Privacy Issues}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {281--288}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00032}, doi = {10.1109/TPSISA52974.2021.00032}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/PietroC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2021, editor = {Jorge Lobo and Roberto Di Pietro and Omar Chowdhury and Hongxin Hu}, title = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450569}, doi = {10.1145/3450569}, isbn = {978-1-4503-8365-3}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spaccs/2020, editor = {Guojun Wang and Bing Chen and Wei Li and Roberto Di Pietro and Xuefeng Yan and Hao Han}, title = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12382}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68851-6}, doi = {10.1007/978-3-030-68851-6}, isbn = {978-3-030-68850-9}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spaccs/2020w, editor = {Guojun Wang and Bing Chen and Wei Li and Roberto Di Pietro and Xuefeng Yan and Hao Han}, title = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12383}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68884-4}, doi = {10.1007/978-3-030-68884-4}, isbn = {978-3-030-68883-7}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/2020w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-06221, author = {Pietro Tedeschi and Kang Eun Jeon and James She and Simon Wong and Spiridon Bakiras and Roberto Di Pietro}, title = {Privacy-Preserving and Sustainable Contact Tracing Using Batteryless {BLE} Beacons}, journal = {CoRR}, volume = {abs/2103.06221}, year = {2021}, url = {https://arxiv.org/abs/2103.06221}, eprinttype = {arXiv}, eprint = {2103.06221}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-06221.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-09459, author = {Maurantonio Caprolu and Matteo Pontecorvi and Matteo Signorini and Carlos Segarra and Roberto Di Pietro}, title = {A Novel Framework for the Analysis of Unknown Transactions in Bitcoin: Theory, Model, and Experimental Results}, journal = {CoRR}, volume = {abs/2103.09459}, year = {2021}, url = {https://arxiv.org/abs/2103.09459}, eprinttype = {arXiv}, eprint = {2103.09459}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-09459.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-03832, author = {Eduard Marin and Diego Perino and Roberto Di Pietro}, title = {Serverless Computing: {A} Security Perspective}, journal = {CoRR}, volume = {abs/2107.03832}, year = {2021}, url = {https://arxiv.org/abs/2107.03832}, eprinttype = {arXiv}, eprint = {2107.03832}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-03832.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-11324, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {Satellite-Based Communications Security: {A} Survey of Threats, Solutions, and Research Challenges}, journal = {CoRR}, volume = {abs/2112.11324}, year = {2021}, url = {https://arxiv.org/abs/2112.11324}, eprinttype = {arXiv}, eprint = {2112.11324}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-11324.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TedeschiOP20, author = {Pietro Tedeschi and Gabriele Oligeri and Roberto Di Pietro}, title = {Leveraging Jamming to Help Drones Complete Their Mission}, journal = {{IEEE} Access}, volume = {8}, pages = {5049--5064}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2963105}, doi = {10.1109/ACCESS.2019.2963105}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/TedeschiOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RaponiP20, author = {Simone Raponi and Roberto Di Pietro}, title = {A Longitudinal Study on Web-Sites Password Management (in)Security: Evidence and Remedies}, journal = {{IEEE} Access}, volume = {8}, pages = {52075--52090}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2981207}, doi = {10.1109/ACCESS.2020.2981207}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RaponiP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SignoriniPKP20, author = {Matteo Signorini and Matteo Pontecorvi and Wa{\"{e}}l Kanoun and Roberto Di Pietro}, title = {{BAD:} {A} Blockchain Anomaly Detection Solution}, journal = {{IEEE} Access}, volume = {8}, pages = {173481--173490}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3025622}, doi = {10.1109/ACCESS.2020.3025622}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SignoriniPKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/CaproluPRST20, author = {Maurantonio Caprolu and Roberto Di Pietro and Simone Raponi and Savio Sciancalepore and Pietro Tedeschi}, title = {Vessels Cybersecurity: Issues, Challenges, and the Road Ahead}, journal = {{IEEE} Commun. Mag.}, volume = {58}, number = {6}, pages = {90--96}, year = {2020}, url = {https://doi.org/10.1109/MCOM.001.1900632}, doi = {10.1109/MCOM.001.1900632}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/CaproluPRST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SciancaleporeIO20, author = {Savio Sciancalepore and Omar Adel Ibrahim and Gabriele Oligeri and Roberto Di Pietro}, title = {PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis}, journal = {Comput. Networks}, volume = {168}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2019.107044}, doi = {10.1016/J.COMNET.2019.107044}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SciancaleporeIO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/CresciPPST20, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {Emergent properties, models, and laws of behavioral similarities within groups of twitter users}, journal = {Comput. Commun.}, volume = {150}, pages = {47--61}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2019.10.019}, doi = {10.1016/J.COMCOM.2019.10.019}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/CresciPPST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/TedeschiSP20, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {Security in Energy Harvesting Networks: {A} Survey of Current Solutions and Research Challenges}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {4}, pages = {2658--2693}, year = {2020}, url = {https://doi.org/10.1109/COMST.2020.3017665}, doi = {10.1109/COMST.2020.3017665}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/TedeschiSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TedeschiSEP20, author = {Pietro Tedeschi and Savio Sciancalepore and Areej Eliyan and Roberto Di Pietro}, title = {LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {1}, pages = {621--638}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2953549}, doi = {10.1109/JIOT.2019.2953549}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TedeschiSEP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SalvePMR20, author = {Andrea De Salve and Roberto Di Pietro and Paolo Mori and Laura Ricci}, title = {A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {2--21}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729553}, doi = {10.1109/TDSC.2017.2729553}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SalvePMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AzizTSP20, author = {Ahmed Aziz and Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {SecureAIS - Securing Pairwise Vessels Communications}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162320}, doi = {10.1109/CNS48642.2020.9162320}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AzizTSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/CaproluCRP20, author = {Maurantonio Caprolu and Stefano Cresci and Simone Raponi and Roberto Di Pietro}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies}, booktitle = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, pages = {3--27}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68887-5\_1}, doi = {10.1007/978-3-030-68887-5\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/CaproluCRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/MartinoCBYPN20, author = {Giovanni Da San Martino and Stefano Cresci and Alberto Barr{\'{o}}n{-}Cede{\~{n}}o and Seunghak Yu and Roberto Di Pietro and Preslav Nakov}, editor = {Christian Bessiere}, title = {A Survey on Computational Propaganda Detection}, booktitle = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, pages = {4826--4832}, publisher = {ijcai.org}, year = {2020}, url = {https://doi.org/10.24963/ijcai.2020/672}, doi = {10.24963/IJCAI.2020/672}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/MartinoCBYPN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OligeriSP20, author = {Gabriele Oligeri and Savio Sciancalepore and Roberto Di Pietro}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {{GNSS} spoofing detection via opportunistic {IRIDIUM} signals}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {42--52}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399350}, doi = {10.1145/3395351.3399350}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OligeriSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OligeriSRP20, author = {Gabriele Oligeri and Savio Sciancalepore and Simone Raponi and Roberto Di Pietro}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {BrokenStrokes: on the (in)security of wireless keyboards}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {231--241}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399351}, doi = {10.1145/3395351.3399351}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OligeriSRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-02877, author = {Maurantonio Caprolu and Savio Sciancalepore and Roberto Di Pietro}, title = {Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges}, journal = {CoRR}, volume = {abs/2001.02877}, year = {2020}, url = {http://arxiv.org/abs/2001.02877}, eprinttype = {arXiv}, eprint = {2001.02877}, timestamp = {Mon, 13 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-02877.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-05051, author = {Simone Raponi and Savio Sciancalepore and Gabriele Oligeri and Roberto Di Pietro}, title = {Fridges on the Highway: Road Traffic Poisoning of Navigation Apps}, journal = {CoRR}, volume = {abs/2002.05051}, year = {2020}, url = {https://arxiv.org/abs/2002.05051}, eprinttype = {arXiv}, eprint = {2002.05051}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-05051.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-05905, author = {Omar Adel Ibrahim and Savio Sciancalepore and Gabriele Oligeri and Roberto Di Pietro}, title = {{MAGNETO:} Fingerprinting {USB} Flash Drives via Unintentional Magnetic Emissions}, journal = {CoRR}, volume = {abs/2002.05905}, year = {2020}, url = {https://arxiv.org/abs/2002.05905}, eprinttype = {arXiv}, eprint = {2002.05905}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-05905.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-01991, author = {Maurantonio Caprolu and Roberto Di Pietro and Simone Raponi and Savio Sciancalepore and Pietro Tedeschi}, title = {Vessels Cybersecurity: Issues, Challenges, and the Road Ahead}, journal = {CoRR}, volume = {abs/2003.01991}, year = {2020}, url = {https://arxiv.org/abs/2003.01991}, eprinttype = {arXiv}, eprint = {2003.01991}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-01991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-10394, author = {Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro}, title = {Security in Energy Harvesting Networks: {A} Survey of Current Solutions and Research Challenges}, journal = {CoRR}, volume = {abs/2004.10394}, year = {2020}, url = {https://arxiv.org/abs/2004.10394}, eprinttype = {arXiv}, eprint = {2004.10394}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-10394.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-01347, author = {Omar Adel Ibrahim and Savio Sciancalepore and Roberto Di Pietro}, title = {Noise2Weight: On Detecting Payload Weight from Drones Acoustic Emissions}, journal = {CoRR}, volume = {abs/2005.01347}, year = {2020}, url = {https://arxiv.org/abs/2005.01347}, eprinttype = {arXiv}, eprint = {2005.01347}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-01347.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-10284, author = {Gabriele Oligeri and Savio Sciancalepore and Roberto Di Pietro}, title = {{GNSS} Spoofing Detection via Opportunistic {IRIDIUM} Signals}, journal = {CoRR}, volume = {abs/2006.10284}, year = {2020}, url = {https://arxiv.org/abs/2006.10284}, eprinttype = {arXiv}, eprint = {2006.10284}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-10284.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08024, author = {Giovanni Da San Martino and Stefano Cresci and Alberto Barr{\'{o}}n{-}Cede{\~{n}}o and Seunghak Yu and Roberto Di Pietro and Preslav Nakov}, title = {A Survey on Computational Propaganda Detection}, journal = {CoRR}, volume = {abs/2007.08024}, year = {2020}, url = {https://arxiv.org/abs/2007.08024}, eprinttype = {arXiv}, eprint = {2007.08024}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-11928, author = {Pietro Tedeschi and Spiridon Bakiras and Roberto Di Pietro}, title = {IoTrace: {A} Flexible, Efficient, and Privacy-Preserving IoT-enabled Architecture for Contact Tracing}, journal = {CoRR}, volume = {abs/2007.11928}, year = {2020}, url = {https://arxiv.org/abs/2007.11928}, eprinttype = {arXiv}, eprint = {2007.11928}, timestamp = {Wed, 29 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-11928.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-05470, author = {Gabriele Oligeri and Simone Raponi and Savio Sciancalepore and Roberto Di Pietro}, title = {{PAST-AI:} Physical-layer Authentication of Satellite Transmitters via Deep Learning}, journal = {CoRR}, volume = {abs/2010.05470}, year = {2020}, url = {https://arxiv.org/abs/2010.05470}, eprinttype = {arXiv}, eprint = {2010.05470}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-05470.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-07306, author = {Pietro Tedeschi and Spiridon Bakiras and Roberto Di Pietro}, title = {SpreadMeNot: {A} Provably Secure and Privacy-Preserving Contact Tracing Protocol}, journal = {CoRR}, volume = {abs/2011.07306}, year = {2020}, url = {https://arxiv.org/abs/2011.07306}, eprinttype = {arXiv}, eprint = {2011.07306}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-07306.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SciancaleporeP19, author = {Savio Sciancalepore and Roberto Di Pietro}, title = {Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios}, journal = {{IEEE} Access}, volume = {7}, pages = {156175--156190}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2949716}, doi = {10.1109/ACCESS.2019.2949716}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SciancaleporeP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SciancaleporeOP19, author = {Savio Sciancalepore and Gabriele Oligeri and Giuseppe Piro and Gennaro Boggia and Roberto Di Pietro}, title = {EXCHANge: Securing IoT via channel anonymity}, journal = {Comput. Commun.}, volume = {134}, pages = {14--29}, year = {2019}, url = {https://doi.org/10.1016/j.comcom.2018.11.003}, doi = {10.1016/J.COMCOM.2018.11.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SciancaleporeOP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaproluRP19, author = {Maurantonio Caprolu and Simone Raponi and Roberto Di Pietro}, title = {{FORTRESS:} An Efficient and Distributed Firewall for Stateful Data Plane {SDN}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6874592:1--6874592:16}, year = {2019}, url = {https://doi.org/10.1155/2019/6874592}, doi = {10.1155/2019/6874592}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaproluRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PietroJLS19, author = {Roberto Di Pietro and Leonardo Jero and Flavio Lombardi and Agusti Solanas}, title = {{GPU} Algorithms for K-Anonymity in Microdata}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802735}, doi = {10.1109/CNS.2019.8802735}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PietroJLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PietroOT19, author = {Roberto Di Pietro and Gabriele Oligeri and Pietro Tedeschi}, title = {{JAM-ME:} Exploiting Jamming to Accomplish Drone Mission}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802717}, doi = {10.1109/CNS.2019.8802717}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/PietroOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SciancaleporeP19, author = {Savio Sciancalepore and Roberto Di Pietro}, title = {{DRAKE:} Distributed Relay-Assisted Key Establishment}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {100--108}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802764}, doi = {10.1109/CNS.2019.8802764}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SciancaleporeP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsaa/CresciPT19, author = {Stefano Cresci and Roberto Di Pietro and Maurizio Tesconi}, editor = {Lisa Singh and Richard D. De Veaux and George Karypis and Francesco Bonchi and Jennifer Hill}, title = {Semantically-Aware Statistical Metrics via Weighting Kernels}, booktitle = {2019 {IEEE} International Conference on Data Science and Advanced Analytics, {DSAA} 2019, Washington, DC, USA, October 5-8, 2019}, pages = {51--60}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSAA.2019.00019}, doi = {10.1109/DSAA.2019.00019}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsaa/CresciPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/CaproluPLR19, author = {Maurantonio Caprolu and Roberto Di Pietro and Flavio Lombardi and Simone Raponi}, editor = {Elisa Bertino and Carl K. Chang and Peter Chen and Ernesto Damiani and Michael Goul and Katsunori Oyama}, title = {Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues}, booktitle = {3rd {IEEE} International Conference on Edge Computing, {EDGE} 2019, Milan, Italy, July 8-13, 2019}, pages = {116--123}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EDGE.2019.00035}, doi = {10.1109/EDGE.2019.00035}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edge/CaproluPLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge2/RaponiCP19, author = {Simone Raponi and Maurantonio Caprolu and Roberto Di Pietro}, editor = {Tao Zhang and Jinpeng Wei and Liang{-}Jie Zhang}, title = {Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions}, booktitle = {Edge Computing - {EDGE} 2019 - Third International Conference, Held as Part of the Services Conference Federation, {SCF} 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11520}, pages = {59--75}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23374-7\_5}, doi = {10.1007/978-3-030-23374-7\_5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edge2/RaponiCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pietro19, author = {Roberto Di Pietro}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Next Generation Information Warfare: Challenges and Research Directions}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {7--8}, publisher = {SciTePress}, year = {2019}, timestamp = {Wed, 05 Jun 2019 13:01:15 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Pietro19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PietroCR19, author = {Roberto Di Pietro and Maurantonio Caprolu and Simone Raponi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {24--47}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_2}, doi = {10.1007/978-3-030-49443-8\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/PietroCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SciancaleporeAP19, author = {Savio Sciancalepore and Saeif Alhazbi and Roberto Di Pietro}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Reliability of {ADS-B} communications: novel insights based on an experimental assessment}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {2414--2421}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297518}, doi = {10.1145/3297280.3297518}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/SciancaleporeAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SciancaleporeAP19, author = {Savio Sciancalepore and Saeif Alhazbi and Roberto Di Pietro}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Location Privacy Issues in the OpenSky Network Crowdsourcing Platform}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {304}, pages = {549--568}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37228-6\_27}, doi = {10.1007/978-3-030-37228-6\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/SciancaleporeAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OligeriSIP19, author = {Gabriele Oligeri and Savio Sciancalepore and Omar Adel Ibrahim and Roberto Di Pietro}, title = {Drive me not: {GPS} spoofing detection via cellular network: (architectures, models, and experiments)}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {12--22}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319719}, doi = {10.1145/3317549.3319719}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OligeriSIP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SciancaleporeIO19, author = {Savio Sciancalepore and Omar Adel Ibrahim and Gabriele Oligeri and Roberto Di Pietro}, title = {Detecting Drones Status via Encrypted Traffic Analysis}, booktitle = {Proceedings of the {ACM} Workshop on Wireless Security and Machine Learning, WiseML@WiSec 2019, Miami, Florida, USA, May 14, 2019}, pages = {67--72}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3324921.3328791}, doi = {10.1145/3324921.3328791}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SciancaleporeIO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-03535, author = {Savio Sciancalepore and Omar Adel Ibrahim and Gabriele Oligeri and Roberto Di Pietro}, title = {Picking a Needle in a Haystack: Detecting Drones via Network Traffic Analysis}, journal = {CoRR}, volume = {abs/1901.03535}, year = {2019}, url = {http://arxiv.org/abs/1901.03535}, eprinttype = {arXiv}, eprint = {1901.03535}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-03535.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-10164, author = {Isra Mohamed Ali and Maurantonio Caprolu and Roberto Di Pietro}, title = {Foundations, Properties, and Security Applications of Puzzles: {A} Survey}, journal = {CoRR}, volume = {abs/1904.10164}, year = {2019}, url = {http://arxiv.org/abs/1904.10164}, eprinttype = {arXiv}, eprint = {1904.10164}, timestamp = {Fri, 26 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-10164.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-03895, author = {Gabriele Oligeri and Savio Sciancalepore and Simone Raponi and Roberto Di Pietro}, title = {BrokenStrokes: On the (in)Security of Wireless Keyboards}, journal = {CoRR}, volume = {abs/1910.03895}, year = {2019}, url = {http://arxiv.org/abs/1910.03895}, eprinttype = {arXiv}, eprint = {1910.03895}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-03895.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-09272, author = {Maurantonio Caprolu and Simone Raponi and Gabriele Oligeri and Roberto Di Pietro}, title = {Crypto Mining Makes Noise}, journal = {CoRR}, volume = {abs/1910.09272}, year = {2019}, url = {http://arxiv.org/abs/1910.09272}, eprinttype = {arXiv}, eprint = {1910.09272}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-09272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-08565, author = {Simone Raponi and Roberto Di Pietro}, title = {Web-sites password management (in)security: Evidence and remedies}, journal = {CoRR}, volume = {abs/1911.08565}, year = {2019}, url = {http://arxiv.org/abs/1911.08565}, eprinttype = {arXiv}, eprint = {1911.08565}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-08565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/MartinRCP18, author = {Antony Martin and Simone Raponi and Th{\'{e}}o Combe and Roberto Di Pietro}, title = {Docker ecosystem - Vulnerability Analysis}, journal = {Comput. Commun.}, volume = {122}, pages = {30--43}, year = {2018}, url = {https://doi.org/10.1016/j.comcom.2018.03.011}, doi = {10.1016/J.COMCOM.2018.03.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/MartinRCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PietroO18, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {GopJam: Key-less jamming mitigation via gossiping}, journal = {J. Netw. Comput. Appl.}, volume = {123}, pages = {57--68}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.08.001}, doi = {10.1016/J.JNCA.2018.08.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PietroO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SciancaleporeOP18, author = {Savio Sciancalepore and Gabriele Oligeri and Roberto Di Pietro}, title = {Strength of Crowd {(SOC)} - Defeating a Reactive Jammer in IoT with Decoy Messages}, journal = {Sensors}, volume = {18}, number = {10}, pages = {3492}, year = {2018}, url = {https://doi.org/10.3390/s18103492}, doi = {10.3390/S18103492}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/SciancaleporeOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CresciPPST18, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {561--576}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2681672}, doi = {10.1109/TDSC.2017.2681672}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CresciPPST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/PietroL18, author = {Roberto Di Pietro and Flavio Lombardi}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {166--185}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_9}, doi = {10.1007/978-3-030-04834-1\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/PietroL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PietroOSS18, author = {Roberto Di Pietro and Gabriele Oligeri and Xavier Salleras and Matteo Signorini}, title = {N-Guard: a Solution to Secure Access to {NFC} tags}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433182}, doi = {10.1109/CNS.2018.8433182}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/PietroOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SciancaleporeOP18, author = {Savio Sciancalepore and Gabriele Oligeri and Roberto Di Pietro}, title = {Shooting to the Stars: Secure Location Verification via Meteor Burst Communications}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433171}, doi = {10.1109/CNS.2018.8433171}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/SciancaleporeOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/IbrahimHOP18, author = {Omar Adel Ibrahim and Ahmed Mohamed Hussain and Gabriele Oligeri and Roberto Di Pietro}, editor = {Brahim Hamid and Barbara Gallina and Asaf Shabtai and Yuval Elovici and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Key is in the Air: Hacking Remote Keyless Entry Systems}, booktitle = {Security and Safety Interplay of Intelligent Software Systems - {ESORICS} 2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11552}, pages = {125--132}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-16874-2\_9}, doi = {10.1007/978-3-030-16874-2\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/IbrahimHOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PietroSSW18, author = {Roberto Di Pietro and Xavier Salleras and Matteo Signorini and Erez Waisbard}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {A blockchain-based Trust System for the Internet of Things}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {77--83}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205993}, doi = {10.1145/3205977.3205993}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/PietroSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/SignoriniKP18, author = {Matteo Signorini and Wael Kanoun and Roberto Di Pietro}, title = {ADvISE: Anomaly Detection tool for blockchaIn SystEms}, booktitle = {2018 {IEEE} World Congress on Services, {SERVICES} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {65--66}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SERVICES.2018.00046}, doi = {10.1109/SERVICES.2018.00046}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/SignoriniKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/SciancaleporeP18, author = {Savio Sciancalepore and Roberto Di Pietro}, editor = {Guojun Wang and Jinjun Chen and Laurence T. Yang}, title = {{SOS} - Securing Open Skies}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11342}, pages = {15--32}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05345-1\_2}, doi = {10.1007/978-3-030-05345-1\_2}, timestamp = {Tue, 03 Mar 2020 16:31:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/SciancaleporeP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RaponiP18, author = {Simone Raponi and Roberto Di Pietro}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {A Spark Is Enough in a Straw World: {A} Study of Websites Password Management in the Wild}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {37--53}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_3}, doi = {10.1007/978-3-030-01141-3\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RaponiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-07016, author = {Simone Raponi and Roberto Di Pietro}, title = {A Spark is Enough in a Straw World: a Study of Websites Password Management in the Wild}, journal = {CoRR}, volume = {abs/1804.07016}, year = {2018}, url = {http://arxiv.org/abs/1804.07016}, eprinttype = {arXiv}, eprint = {1804.07016}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-07016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-03833, author = {Matteo Signorini and Matteo Pontecorvi and Wael Kanoun and Roberto Di Pietro}, title = {{BAD:} Blockchain Anomaly Detection}, journal = {CoRR}, volume = {abs/1807.03833}, year = {2018}, url = {http://arxiv.org/abs/1807.03833}, eprinttype = {arXiv}, eprint = {1807.03833}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-03833.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-11016, author = {Roberto Di Pietro and Flavio Lombardi}, title = {Virtualization Technologies and Cloud Security: advantages, issues, and perspectives}, journal = {CoRR}, volume = {abs/1807.11016}, year = {2018}, url = {http://arxiv.org/abs/1807.11016}, eprinttype = {arXiv}, eprint = {1807.11016}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-11016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-09026, author = {Savio Sciancalepore and Roberto Di Pietro}, title = {{SOS} - Securing Open Skies}, journal = {CoRR}, volume = {abs/1809.09026}, year = {2018}, url = {http://arxiv.org/abs/1809.09026}, eprinttype = {arXiv}, eprint = {1809.09026}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-09026.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PietroO17, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {Enabling broadcast communications in presence of jamming via probabilistic pairing}, journal = {Comput. Networks}, volume = {116}, pages = {33--46}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2017.02.010}, doi = {10.1016/J.COMNET.2017.02.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PietroO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlibertiPG17, author = {Giulio Aliberti and Roberto Di Pietro and Stefano Guarino}, title = {Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results}, journal = {J. Netw. Comput. Appl.}, volume = {99}, pages = {146--165}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.09.008}, doi = {10.1016/J.JNCA.2017.09.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AlibertiPG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsaa/CresciPPST17, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {Exploiting Digital {DNA} for the Analysis of Similarities in Twitter Behaviours}, booktitle = {2017 {IEEE} International Conference on Data Science and Advanced Analytics, {DSAA} 2017, Tokyo, Japan, October 19-21, 2017}, pages = {686--695}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DSAA.2017.57}, doi = {10.1109/DSAA.2017.57}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsaa/CresciPPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euspn/DazaPLS17, author = {Vanesa Daza and Roberto Di Pietro and Flavio Lombardi and Matteo Signorini}, editor = {Elhadi M. Shakshuki}, title = {CoLLIDE: CLoud Latency-based IDEntification}, booktitle = {The 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks {(EUSPN} 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare {(ICTH-2017)} / Affiliated Workshops, September 18-20, 2017, Lund, Sweden}, series = {Procedia Computer Science}, volume = {113}, pages = {81--88}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/j.procs.2017.08.295}, doi = {10.1016/J.PROCS.2017.08.295}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euspn/DazaPLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/DazaPKS17, author = {Vanesa Daza and Roberto Di Pietro and Ivan Klimek and Matteo Signorini}, title = {{CONNECT:} CONtextual NamE disCovery for blockchain-based services in the IoT}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996641}, doi = {10.1109/ICC.2017.7996641}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/DazaPKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PietroFL17, author = {Roberto Di Pietro and Federico Franzoni and Flavio Lombardi}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {HyBIS: Advanced Introspection for Effective Windows Guest Protection}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {189--204}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_13}, doi = {10.1007/978-3-319-58469-0\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/PietroFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlibertiPG17, author = {Giulio Aliberti and Roberto Di Pietro and Stefano Guarino}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {{SLAP:} Secure Lightweight Authentication Protocol for Resource-constrained Devices}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {163--174}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006431101630174}, doi = {10.5220/0006431101630174}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlibertiPG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CresciPPST17, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race}, booktitle = {Proceedings of the 26th International Conference on World Wide Web Companion, Perth, Australia, April 3-7, 2017}, pages = {963--972}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041021.3055135}, doi = {10.1145/3041021.3055135}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/CresciPPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CresciPPST17, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race}, journal = {CoRR}, volume = {abs/1701.03017}, year = {2017}, url = {http://arxiv.org/abs/1701.03017}, eprinttype = {arXiv}, eprint = {1701.03017}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CresciPPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CresciPPST17a, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling}, journal = {CoRR}, volume = {abs/1703.04482}, year = {2017}, url = {http://arxiv.org/abs/1703.04482}, eprinttype = {arXiv}, eprint = {1703.04482}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CresciPPST17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/CombeMP16, author = {Th{\'{e}}o Combe and Antony Martin and Roberto Di Pietro}, title = {To Docker or Not to Docker: {A} Security Perspective}, journal = {{IEEE} Cloud Comput.}, volume = {3}, number = {5}, pages = {54--62}, year = {2016}, url = {https://doi.org/10.1109/MCC.2016.100}, doi = {10.1109/MCC.2016.100}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cloudcomp/CombeMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AlibertiPG16, author = {Giulio Aliberti and Roberto Di Pietro and Stefano Guarino}, title = {Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel}, journal = {Comput. Networks}, volume = {109}, pages = {21--30}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.034}, doi = {10.1016/J.COMNET.2016.06.034}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AlibertiPG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PietroS16, author = {Roberto Di Pietro and Alessandro Sorniotti}, title = {Proof of ownership for deduplication systems: {A} secure, scalable, and efficient solution}, journal = {Comput. Commun.}, volume = {82}, pages = {71--82}, year = {2016}, url = {https://doi.org/10.1016/j.comcom.2016.01.011}, doi = {10.1016/J.COMCOM.2016.01.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/PietroS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BattistoniPL16, author = {Roberto Battistoni and Roberto Di Pietro and Flavio Lombardi}, title = {{CURE} - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments}, journal = {Comput. Commun.}, volume = {91-92}, pages = {29--43}, year = {2016}, url = {https://doi.org/10.1016/j.comcom.2016.03.024}, doi = {10.1016/J.COMCOM.2016.03.024}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/BattistoniPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/CresciPPST16, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection}, journal = {{IEEE} Intell. Syst.}, volume = {31}, number = {5}, pages = {58--64}, year = {2016}, url = {https://doi.org/10.1109/MIS.2016.29}, doi = {10.1109/MIS.2016.29}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/expert/CresciPPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DazaPLS16, author = {Vanesa Daza and Roberto Di Pietro and Flavio Lombardi and Matteo Signorini}, title = {FRoDO: Fraud Resilient Device for Off-Line Micro-Payments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {296--311}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2432813}, doi = {10.1109/TDSC.2015.2432813}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/DazaPLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/PietroLV16, author = {Roberto Di Pietro and Flavio Lombardi and Antonio Villani}, title = {{CUDA} Leaks: {A} Detailed Hack for {CUDA} and a (Partial) Fix}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {15}, number = {1}, pages = {15:1--15:25}, year = {2016}, url = {https://doi.org/10.1145/2801153}, doi = {10.1145/2801153}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tecs/PietroLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/Suarez-TangilTL16, author = {Guillermo Suarez{-}Tangil and Juan E. Tapiador and Flavio Lombardi and Roberto Di Pietro}, title = {Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {15}, number = {4}, pages = {789--802}, year = {2016}, url = {https://doi.org/10.1109/TMC.2015.2444847}, doi = {10.1109/TMC.2015.2444847}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/Suarez-TangilTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/SalvePMR16, author = {Andrea De Salve and Roberto Di Pietro and Paolo Mori and Laura Ricci}, title = {Logical key hierarchy for groups management in Distributed Online Social Network}, booktitle = {{IEEE} Symposium on Computers and Communication, {ISCC} 2016, Messina, Italy, June 27-30, 2016}, pages = {710--717}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ISCC.2016.7543820}, doi = {10.1109/ISCC.2016.7543820}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/SalvePMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PietroFL16, author = {Roberto Di Pietro and Federico Franzoni and Flavio Lombardi}, title = {HyBIS: Windows Guest Protection through Advanced Memory Introspection}, journal = {CoRR}, volume = {abs/1601.05851}, year = {2016}, url = {http://arxiv.org/abs/1601.05851}, eprinttype = {arXiv}, eprint = {1601.05851}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PietroFL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CresciPPST16, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {DNA-inspired online behavioral modeling and its application to spambot detection}, journal = {CoRR}, volume = {abs/1602.00110}, year = {2016}, url = {http://arxiv.org/abs/1602.00110}, eprinttype = {arXiv}, eprint = {1602.00110}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CresciPPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/CresciPTPS16, author = {Stefano Cresci and Marinella Petrocchi and Maurizio Tesconi and Roberto Di Pietro and Angelo Spognardi}, title = {Social Fingerprinting - or the Truth About You}, journal = {{ERCIM} News}, volume = {2016}, number = {106}, year = {2016}, url = {http://ercim-news.ercim.eu/en106/special/social-fingerprinting-or-the-truth-about-you}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/CresciPTPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PietroO15, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {{ESC:} An efficient, scalable, and crypto-less solution to secure wireless networks}, journal = {Comput. Networks}, volume = {84}, pages = {46--63}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2015.04.006}, doi = {10.1016/J.COMNET.2015.04.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PietroO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BalzarottiPV15, author = {Davide Balzarotti and Roberto Di Pietro and Antonio Villani}, title = {The impact of GPU-assisted malware on memory forensics: {A} case study}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S16--S24}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.010}, doi = {10.1016/J.DIIN.2015.05.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BalzarottiPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/CresciPPST15, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {Fame for sale: Efficient detection of fake Twitter followers}, journal = {Decis. Support Syst.}, volume = {80}, pages = {56--71}, year = {2015}, url = {https://doi.org/10.1016/j.dss.2015.09.003}, doi = {10.1016/J.DSS.2015.09.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/CresciPPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AlibertiCPM15, author = {Giulio Aliberti and Alessandro Colantonio and Roberto Di Pietro and Riccardo Mariani}, title = {{EXPEDITE:} EXPress closED ITemset Enumeration}, journal = {Expert Syst. Appl.}, volume = {42}, number = {8}, pages = {3933--3944}, year = {2015}, url = {https://doi.org/10.1016/j.eswa.2014.12.031}, doi = {10.1016/J.ESWA.2014.12.031}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/AlibertiCPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/PietroLMS15, author = {Roberto Di Pietro and Flavio Lombardi and Fabio Martinelli and Daniele Sgandurra}, title = {AntiCheetah: Trustworthy computing in an outsourced (cheating) environment}, journal = {Future Gener. Comput. Syst.}, volume = {48}, pages = {28--38}, year = {2015}, url = {https://doi.org/10.1016/j.future.2015.02.004}, doi = {10.1016/J.FUTURE.2015.02.004}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/PietroLMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PietroO15, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {Silence is Golden: Exploiting Jamming and Radio Silence to Communicate}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {3}, pages = {9:1--9:24}, year = {2015}, url = {https://doi.org/10.1145/2699906}, doi = {10.1145/2699906}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PietroO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/GuarinoCCPS15, author = {Stefano Guarino and Ey{\"{u}}p S. Canlar and Mauro Conti and Roberto Di Pietro and Agusti Solanas}, title = {Provable Storage Medium for Data Storage Outsourcing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {8}, number = {6}, pages = {985--997}, year = {2015}, url = {https://doi.org/10.1109/TSC.2014.2355229}, doi = {10.1109/TSC.2014.2355229}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/GuarinoCCPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ColantonioPPS15, author = {Alessandro Colantonio and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi}, editor = {Roger L. Wainwright and Juan Manuel Corchado and Alessio Bechini and Jiman Hong}, title = {Visual detection of singularities in review platforms}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015}, pages = {1294--1295}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2695664.2696044}, doi = {10.1145/2695664.2696044}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ColantonioPPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/ColantonioPPS15, author = {Alessandro Colantonio and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {{VISIO:} {A} Visual Approach for Singularity Detection in Recommendation Systems}, booktitle = {Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9264}, pages = {33--47}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22906-5\_3}, doi = {10.1007/978-3-319-22906-5\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/ColantonioPPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PietroO15, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {Freedom of speech: thwarting jammers via a probabilistic approach}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766515}, doi = {10.1145/2766498.2766515}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PietroO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/ContiPM15, author = {Mauro Conti and Roberto Di Pietro and Luciana Marconi}, editor = {Guillermo Navarro{-}Arribas and Vicen{\c{c}} Torra}, title = {Privacy for LBSs: On Using a Footprint Model to Face the Enemy}, booktitle = {Advanced Research in Data Privacy}, series = {Studies in Computational Intelligence}, volume = {567}, pages = {169--195}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-09885-2\_10}, doi = {10.1007/978-3-319-09885-2\_10}, timestamp = {Tue, 07 May 2024 20:28:19 +0200}, biburl = {https://dblp.org/rec/series/sci/ContiPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BattistoniPL15, author = {Roberto Battistoni and Roberto Di Pietro and Flavio Lombardi}, title = {CloRoFor: Cloud Robust Forensics}, journal = {CoRR}, volume = {abs/1506.01739}, year = {2015}, url = {http://arxiv.org/abs/1506.01739}, eprinttype = {arXiv}, eprint = {1506.01739}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BattistoniPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CresciPPST15, author = {Stefano Cresci and Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {Fame for sale: efficient detection of fake Twitter followers}, journal = {CoRR}, volume = {abs/1509.04098}, year = {2015}, url = {http://arxiv.org/abs/1509.04098}, eprinttype = {arXiv}, eprint = {1509.04098}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CresciPPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/SolanasPCVRFPPPPM14, author = {Agusti Solanas and Constantinos Patsakis and Mauro Conti and Ioannis S. Vlachos and Victoria Ramos and Francisco Falcone and Octavian Postolache and Pablo A. P{\'{e}}rez{-}Mart{\'{\i}}nez and Roberto Di Pietro and Despina N. Perrea and Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}}}, title = {Smart health: {A} context-aware health paradigm within smart cities}, journal = {{IEEE} Commun. Mag.}, volume = {52}, number = {8}, pages = {74--81}, year = {2014}, url = {https://doi.org/10.1109/MCOM.2014.6871673}, doi = {10.1109/MCOM.2014.6871673}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/SolanasPCVRFPPPPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PietroGVD14, author = {Roberto Di Pietro and Stefano Guarino and Nino Vincenzo Verde and Josep Domingo{-}Ferrer}, title = {Security in wireless ad-hoc networks - {A} survey}, journal = {Comput. Commun.}, volume = {51}, pages = {1--20}, year = {2014}, url = {https://doi.org/10.1016/j.comcom.2014.06.003}, doi = {10.1016/J.COMCOM.2014.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/PietroGVD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Suarez-TangilTLP14, author = {Guillermo Suarez{-}Tangil and Juan E. Tapiador and Flavio Lombardi and Roberto Di Pietro}, title = {Thwarting Obfuscated Malware via Differential Fault Analysis}, journal = {Computer}, volume = {47}, number = {6}, pages = {24--31}, year = {2014}, url = {https://doi.org/10.1109/MC.2014.169}, doi = {10.1109/MC.2014.169}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Suarez-TangilTLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/PietroLS14, author = {Roberto Di Pietro and Flavio Lombardi and Matteo Signorini}, title = {CloRExPa: Cloud resilience via execution path analysis}, journal = {Future Gener. Comput. Syst.}, volume = {32}, pages = {168--179}, year = {2014}, url = {https://doi.org/10.1016/j.future.2012.05.010}, doi = {10.1016/J.FUTURE.2012.05.010}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/PietroLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ContiPS14, author = {Mauro Conti and Roberto Di Pietro and Angelo Spognardi}, title = {Clone wars: Distributed detection of clone attacks in mobile WSNs}, journal = {J. Comput. Syst. Sci.}, volume = {80}, number = {3}, pages = {654--669}, year = {2014}, url = {https://doi.org/10.1016/j.jcss.2013.06.017}, doi = {10.1016/J.JCSS.2013.06.017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/ContiPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlisPOS14, author = {Jorge Blasco Al{\'{\i}}s and Roberto Di Pietro and Agust{\'{\i}}n Orfila and Alessandro Sorniotti}, title = {A tunable proof of ownership scheme for deduplication using Bloom filters}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {481--489}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997518}, doi = {10.1109/CNS.2014.6997518}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlisPOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/CresciPSTP14, author = {Stefano Cresci and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi and Roberto Di Pietro}, title = {A Criticism to Society (As Seen by Twitter Analytics)}, booktitle = {34th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}, pages = {194--200}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCSW.2014.31}, doi = {10.1109/ICDCSW.2014.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/CresciPSTP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/DazaPLS14, author = {Vanesa Daza and Roberto Di Pietro and Flavio Lombardi and Matteo Signorini}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Joaquim Filipe}, title = {{SOLDI:} Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments}, booktitle = {E-Business and Telecommunications - 11th International Joint Conference, {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {554}, pages = {340--362}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-25915-4\_18}, doi = {10.1007/978-3-319-25915-4\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/DazaPLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DazaPLS14, author = {Vanesa Daza and Roberto Di Pietro and Flavio Lombardi and Matteo Signorini}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{FORCE} - Fully Off-line secuRe CrEdits for Mobile Micro Payments}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {125--136}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005053201250136}, doi = {10.5220/0005053201250136}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DazaPLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/PietroPS14, author = {Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi}, editor = {Boualem Benatallah and Azer Bestavros and Yannis Manolopoulos and Athena Vakali and Yanchun Zhang}, title = {A Lot of Slots - Outliers Confinement in Review-Based Systems}, booktitle = {Web Information Systems Engineering - {WISE} 2014 - 15th International Conference, Thessaloniki, Greece, October 12-14, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8786}, pages = {15--30}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11749-2\_2}, doi = {10.1007/978-3-319-11749-2\_2}, timestamp = {Sun, 02 Jun 2019 21:10:50 +0200}, biburl = {https://dblp.org/rec/conf/wise/PietroPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/PietroPST14, author = {Roberto Di Pietro and Marinella Petrocchi and Angelo Spognardi and Maurizio Tesconi}, title = {Discriminating Between the Wheat and the Chaff in Online Recommendation Systems}, journal = {{ERCIM} News}, volume = {2014}, number = {96}, year = {2014}, url = {http://ercim-news.ercim.eu/en96/ri/discriminating-between-the-wheat-and-the-chaff-in-online-recommendation-systems}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/PietroPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RiccardiPPV13, author = {Marco Riccardi and Roberto Di Pietro and Marta Palanques and Jorge Aguila Vila}, title = {Titans' revenge: Detecting Zeus via its own flaws}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {422--435}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.06.023}, doi = {10.1016/J.COMNET.2012.06.023}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RiccardiPPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CanlarCCP13, author = {Ey{\"{u}}p S. Canlar and Mauro Conti and Bruno Crispo and Roberto Di Pietro}, title = {Windows Mobile LiveSD Forensics}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {677--684}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.024}, doi = {10.1016/J.JNCA.2012.12.024}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CanlarCCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/PietroO13, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {Jamming mitigation in cognitive radio networks}, journal = {{IEEE} Netw.}, volume = {27}, number = {3}, pages = {10--15}, year = {2013}, url = {https://doi.org/10.1109/MNET.2013.6523802}, doi = {10.1109/MNET.2013.6523802}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/PietroO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/PietroV13, author = {Roberto Di Pietro and Nino Vincenzo Verde}, title = {Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps}, journal = {Pervasive Mob. Comput.}, volume = {9}, number = {4}, pages = {588--597}, year = {2013}, url = {https://doi.org/10.1016/j.pmcj.2012.07.010}, doi = {10.1016/J.PMCJ.2012.07.010}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/PietroV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/CristofaroP13, author = {Emiliano De Cristofaro and Roberto Di Pietro}, title = {Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {2}, pages = {311--322}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2012.2221957}, doi = {10.1109/JSYST.2012.2221957}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/CristofaroP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/0004ZCPJM13, author = {Lei Zhang and Honggang Zhang and Mauro Conti and Roberto Di Pietro and Sushil Jajodia and Luigi Vincenzo Mancini}, title = {Preserving privacy against external and internal threats in {WSN} data aggregation}, journal = {Telecommun. Syst.}, volume = {52}, number = {4}, pages = {2163--2176}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9539-8}, doi = {10.1007/S11235-011-9539-8}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/0004ZCPJM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PietroO13, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {{COKE} Crypto-Less Over-the-Air Key Establishment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {1}, pages = {163--173}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2012.2226718}, doi = {10.1109/TIFS.2012.2226718}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PietroO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/PietroOST13, author = {Roberto Di Pietro and Gabriele Oligeri and Claudio Soriente and Gene Tsudik}, title = {United We Stand: Intrusion Resilience in Mobile Unattended WSNs}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {12}, number = {7}, pages = {1456--1468}, year = {2013}, url = {https://doi.org/10.1109/TMC.2012.126}, doi = {10.1109/TMC.2012.126}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/PietroOST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/CanlarCCP13, author = {Ey{\"{u}}p S. Canlar and Mauro Conti and Bruno Crispo and Roberto Di Pietro}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {{CREPUSCOLO:} {A} collusion resistant privacy preserving location verification system}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766357}, doi = {10.1109/CRISIS.2013.6766357}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/CanlarCCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/JaballahCPMV13, author = {Wafa Ben Jaballah and Mauro Conti and Roberto Di Pietro and Mohamed Mosbah and Nino Vincenzo Verde}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {{MASS:} An efficient and secure broadcast authentication scheme for resource constrained devices}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766350}, doi = {10.1109/CRISIS.2013.6766350}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/JaballahCPMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/PietroMVV13, author = {Roberto Di Pietro and Luigi V. Mancini and Antonio Villani and Domenico Vitali}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766355}, doi = {10.1109/CRISIS.2013.6766355}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/PietroMVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/PietroLMS13, author = {Roberto Di Pietro and Flavio Lombardi and Fabio Martinelli and Daniele Sgandurra}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {CheR: Cheating Resilience in the Cloud via Smart Resource Allocation}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {339--352}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_21}, doi = {10.1007/978-3-319-05302-8\_21}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/PietroLMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PietroG13, author = {Roberto Di Pietro and Stefano Guarino}, title = {Data confidentiality and availability via secret sharing and node mobility in {UWSN}}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {205--209}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6566764}, doi = {10.1109/INFCOM.2013.6566764}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PietroG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/PietroLMS13, author = {Roberto Di Pietro and Flavio Lombardi and Fabio Martinelli and Daniele Sgandurra}, title = {AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing}, booktitle = {2013 {IEEE} 10th International Conference on Ubiquitous Intelligence and Computing and 2013 {IEEE} 10th International Conference on Autonomic and Trusted Computing, {UIC/ATC} 2013, Vietri sul Mare, Sorrento Peninsula, Italy, December 18-21, 2013}, pages = {371--379}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/UIC-ATC.2013.77}, doi = {10.1109/UIC-ATC.2013.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/PietroLMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/PietroG13, author = {Roberto Di Pietro and Stefano Guarino}, title = {Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks}, booktitle = {{IEEE} 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4-7, 2013}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WoWMoM.2013.6583467}, doi = {10.1109/WOWMOM.2013.6583467}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/PietroG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/PietroMV13, author = {Roberto Di Pietro and Roberto Mandati and Nino Vincenzo Verde}, title = {Track me if you can: Transparent obfuscation for Location based Services}, booktitle = {{IEEE} 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4-7, 2013}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WoWMoM.2013.6583401}, doi = {10.1109/WOWMOM.2013.6583401}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/PietroMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/wi/13/PietroD13, author = {Roberto Di Pietro and Josep Domingo{-}Ferrer}, editor = {Stefano Basagni and Marco Conti and Silvia Giordano and Ivan Stojmenovic}, title = {Security in Wireless Ad Hoc Networks}, booktitle = {Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition}, pages = {106--153}, publisher = {Wiley / {IEEE}}, year = {2013}, url = {https://doi.org/10.1002/9781118511305.ch4}, doi = {10.1002/9781118511305.CH4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/wi/13/PietroD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2012-7731, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-35890-6}, doi = {10.1007/978-3-642-35890-6}, isbn = {978-3-642-35889-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2012-7731.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2012, editor = {Angelos D. Keromytis and Roberto Di Pietro}, title = {Security and Privacy in Communication Networks - 8th International {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {106}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36883-7}, doi = {10.1007/978-3-642-36883-7}, isbn = {978-3-642-36882-0}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PietroLV13, author = {Roberto Di Pietro and Flavio Lombardi and Antonio Villani}, title = {{CUDA} Leaks: Information Leakage in {GPU} Architectures}, journal = {CoRR}, volume = {abs/1305.7383}, year = {2013}, url = {http://arxiv.org/abs/1305.7383}, eprinttype = {arXiv}, eprint = {1305.7383}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PietroLV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PietroMVV13, author = {Roberto Di Pietro and Luigi V. Mancini and Antonio Villani and Domenico Vitali}, title = {Mapping the File Systems Genome: rationales, technique, results and applications}, journal = {CoRR}, volume = {abs/1306.2833}, year = {2013}, url = {http://arxiv.org/abs/1306.2833}, eprinttype = {arXiv}, eprint = {1306.2833}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PietroMVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PietroO13, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {Silence is Golden: exploiting jamming and radio silence to communicate}, journal = {CoRR}, volume = {abs/1307.5714}, year = {2013}, url = {http://arxiv.org/abs/1307.5714}, eprinttype = {arXiv}, eprint = {1307.5714}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PietroO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ColantonioPV12, author = {Alessandro Colantonio and Roberto Di Pietro and Nino Vincenzo Verde}, title = {A business-driven decomposition methodology for role mining}, journal = {Comput. Secur.}, volume = {31}, number = {7}, pages = {844--855}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.01.005}, doi = {10.1016/J.COSE.2012.01.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ColantonioPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ColantonioPOV12, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, title = {Visual Role Mining: {A} Picture Is Worth a Thousand Roles}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {24}, number = {6}, pages = {1120--1133}, year = {2012}, url = {https://doi.org/10.1109/TKDE.2011.37}, doi = {10.1109/TKDE.2011.37}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ColantonioPOV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/PietroMST12, author = {Roberto Di Pietro and Di Ma and Claudio Soriente and Gene Tsudik}, title = {Self-healing in unattended wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {9}, number = {1}, pages = {7:1--7:21}, year = {2012}, url = {https://doi.org/10.1145/2379799.2379806}, doi = {10.1145/2379799.2379806}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosn/PietroMST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PietroS12, author = {Roberto Di Pietro and Alessandro Sorniotti}, editor = {Heung Youl Youm and Yoojae Won}, title = {Boosting efficiency and security in proof of ownership for deduplication}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {81--82}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414504}, doi = {10.1145/2414456.2414504}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PietroS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/CristofaroP12, author = {Emiliano De Cristofaro and Roberto Di Pietro}, editor = {Luciano Bononi and Ajoy Kumar Datta and St{\'{e}}phane Devismes and Archan Misra}, title = {Preserving Query Privacy in Urban Sensing Systems}, booktitle = {Distributed Computing and Networking - 13th International Conference, {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7129}, pages = {218--233}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25959-3\_17}, doi = {10.1007/978-3-642-25959-3\_17}, timestamp = {Mon, 26 Jun 2023 20:44:19 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/CristofaroP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/ContiPS12, author = {Mauro Conti and Roberto Di Pietro and Angelo Spognardi}, editor = {Luciano Bononi and Ajoy Kumar Datta and St{\'{e}}phane Devismes and Archan Misra}, title = {Wireless Sensor Replica Detection in Mobile Environments}, booktitle = {Distributed Computing and Networking - 13th International Conference, {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7129}, pages = {249--264}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25959-3\_19}, doi = {10.1007/978-3-642-25959-3\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/ContiPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/BlassPMO12, author = {Erik{-}Oliver Blass and Roberto Di Pietro and Refik Molva and Melek {\"{O}}nen}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {{PRISM} - Privacy-Preserving Search in MapReduce}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {180--200}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_10}, doi = {10.1007/978-3-642-31680-7\_10}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/BlassPMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CanlarCCP12, author = {Ey{\"{u}}p S. Canlar and Mauro Conti and Bruno Crispo and Roberto Di Pietro}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Sense-And-Trace: {A} Privacy Preserving Distributed Geolocation Tracking System}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {199--213}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_22}, doi = {10.1007/978-3-642-35694-0\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CanlarCCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/PietroMV12, author = {Roberto Di Pietro and Fabio Martinelli and Nino Vincenzo Verde}, title = {Broadcast Authentication for Resource Constrained Devices: {A} Major Pitfall and Some Solutions}, booktitle = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012, Irvine, CA, USA, October 8-11, 2012}, pages = {213--218}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SRDS.2012.13}, doi = {10.1109/SRDS.2012.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/PietroMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/PalanquesDOMMF12, author = {Marta Palanques and Roberto Di Pietro and Carlos del Ojo and Marcel Malet and Miquel Marino and Toni Felguera}, title = {Secure Cloud Browser: Model and Architecture to Support Secure {WEB} Navigation}, booktitle = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012, Irvine, CA, USA, October 8-11, 2012}, pages = {402--403}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SRDS.2012.64}, doi = {10.1109/SRDS.2012.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/PalanquesDOMMF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2012, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2185448}, isbn = {978-1-4503-1265-3}, timestamp = {Thu, 19 Apr 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PietroV11, author = {Roberto Di Pietro and Alexandre Viejo}, title = {Location privacy and resilience in wireless sensor networks querying}, journal = {Comput. Commun.}, volume = {34}, number = {3}, pages = {515--523}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.05.014}, doi = {10.1016/J.COMCOM.2010.05.014}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/PietroV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AllegraPNRV11, author = {Elisabetta Allegra and Roberto Di Pietro and Mauro La Noce and Valerio Ruocco and Nino Vincenzo Verde}, title = {Cross-border co-operation and education in digital investigations: {A} European perspective}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {106--113}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.09.001}, doi = {10.1016/J.DIIN.2011.09.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AllegraPNRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/ColantonioPOV11, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, title = {A new role mining framework to elicit business roles and to mitigate enterprise risk}, journal = {Decis. Support Syst.}, volume = {50}, number = {4}, pages = {715--731}, year = {2011}, url = {https://doi.org/10.1016/j.dss.2010.08.022}, doi = {10.1016/J.DSS.2010.08.022}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/ColantonioPOV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ContiPS11, author = {Mauro Conti and Roberto Di Pietro and Angelo Spognardi}, title = {"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via {RFID} Tag Cooperation}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/575171}, doi = {10.1155/2011/575171}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ContiPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MarconiCP11, author = {Luciana Marconi and Mauro Conti and Roberto Di Pietro}, title = {{CASSANDRA:} a probabilistic, efficient, and privacy-preserving solution to compute set intersection}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {301--319}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0133-6}, doi = {10.1007/S10207-011-0133-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MarconiCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PietroM11, author = {Roberto Di Pietro and Refik Molva}, title = {An optimal probabilistic solution for information confinement, privacy, and security in {RFID} systems}, journal = {J. Netw. Comput. Appl.}, volume = {34}, number = {3}, pages = {853--863}, year = {2011}, url = {https://doi.org/10.1016/j.jnca.2010.04.015}, doi = {10.1016/J.JNCA.2010.04.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PietroM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LombardiP11, author = {Flavio Lombardi and Roberto Di Pietro}, title = {Secure virtualization for cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {34}, number = {4}, pages = {1113--1122}, year = {2011}, url = {https://doi.org/10.1016/j.jnca.2010.06.008}, doi = {10.1016/J.JNCA.2010.06.008}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LombardiP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/PietroSST11, author = {Roberto Di Pietro and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Intrusion-resilient integrity in data-centric unattended WSNs}, journal = {Pervasive Mob. Comput.}, volume = {7}, number = {4}, pages = {495--508}, year = {2011}, url = {https://doi.org/10.1016/j.pmcj.2010.12.003}, doi = {10.1016/J.PMCJ.2010.12.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/PietroSST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ContiPGM11, author = {Mauro Conti and Roberto Di Pietro and Andrea Gabrielli and Luigi V. Mancini}, title = {Secure topology maintenance and events collection in WSNs}, journal = {Secur. Commun. Networks}, volume = {4}, number = {7}, pages = {744--762}, year = {2011}, url = {https://doi.org/10.1002/sec.280}, doi = {10.1002/SEC.280}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ContiPGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ContiPMM11, author = {Mauro Conti and Roberto Di Pietro and Luigi Vincenzo Mancini and Alessandro Mei}, title = {Distributed Detection of Clone Attacks in Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {5}, pages = {685--698}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2010.25}, doi = {10.1109/TDSC.2010.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ContiPMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/OligeriCPG11, author = {Gabriele Oligeri and Stefano Chessa and Roberto Di Pietro and Gaetano Giunta}, title = {Robust and efficient authentication of video stream broadcasting}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {5:1--5:25}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952987}, doi = {10.1145/1952982.1952987}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/OligeriCPG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RiccardiPV11, author = {Marco Riccardi and Roberto Di Pietro and Jorge Aguila Vila}, title = {Taming Zeus by leveraging its own crypto internals}, booktitle = {2011 eCrime Researchers Summit, eCrime 2011, San Diego, CA, USA, November 7-9, 2011}, pages = {1--9}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/eCrime.2011.6151981}, doi = {10.1109/ECRIME.2011.6151981}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RiccardiPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PietroV11, author = {Roberto Di Pietro and Nino Vincenzo Verde}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Epidemic data survivability in unattended wireless sensor networks}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {11--22}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998417}, doi = {10.1145/1998412.1998417}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PietroV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/OrtolaniCCP11, author = {Stefano Ortolani and Mauro Conti and Bruno Crispo and Roberto Di Pietro}, title = {Events privacy in WSNs: {A} new model and its application}, booktitle = {12th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June, 2011}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WoWMoM.2011.5986491}, doi = {10.1109/WOWMOM.2011.5986491}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/OrtolaniCCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/PietroV11, author = {Roberto Di Pietro and Nino Vincenzo Verde}, title = {Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks}, booktitle = {12th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WoWMoM.2011.5986165}, doi = {10.1109/WOWMOM.2011.5986165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/PietroV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassPMO11, author = {Erik{-}Oliver Blass and Roberto Di Pietro and Refik Molva and Melek {\"{O}}nen}, title = {{PRISM} - Privacy-Preserving Search in MapReduce}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2011}, url = {http://eprint.iacr.org/2011/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassPMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ColantonioPOV10, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, title = {Taming role mining complexity in {RBAC}}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {548--564}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.01.001}, doi = {10.1016/J.COSE.2010.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ColantonioPOV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ColantonioP10, author = {Alessandro Colantonio and Roberto Di Pietro}, title = {Concise: Compressed 'n' Composable Integer Set}, journal = {Inf. Process. Lett.}, volume = {110}, number = {16}, pages = {644--650}, year = {2010}, url = {https://doi.org/10.1016/j.ipl.2010.05.018}, doi = {10.1016/J.IPL.2010.05.018}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ColantonioP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PietroMM10, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Hierarchies of keys in secure multicast communications}, journal = {J. Comput. Secur.}, volume = {18}, number = {5}, pages = {839--860}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0384}, doi = {10.3233/JCS-2009-0384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PietroMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ContiPMS10, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Angelo Spognardi}, title = {eRIPP-FS: Enforcing privacy and security in {RFID}}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {58--70}, year = {2010}, url = {https://doi.org/10.1002/sec.120}, doi = {10.1002/SEC.120}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ContiPMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ZhangZCPJM10, author = {Lei Zhang and Honggang Zhang and Mauro Conti and Roberto Di Pietro and Sushil Jajodia and Luigi Vincenzo Mancini}, title = {Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {910--915}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.169}, doi = {10.1109/CIT.2010.169}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ZhangZCPJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/LombardiP10, author = {Flavio Lombardi and Roberto Di Pietro}, title = {A Security Management Architecture for the Protection of Kernel Virtual Machines}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {948--953}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.175}, doi = {10.1109/CIT.2010.175}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/LombardiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/BragantiniCP10, author = {Roberto Bragantini and Mauro Conti and Roberto Di Pietro}, title = {Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {1096--1101}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.200}, doi = {10.1109/CIT.2010.200}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/BragantiniCP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ColantonioPOV10, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, editor = {Sara Foresti and Sushil Jajodia}, title = {Evaluating the Risk of Adopting {RBAC} Roles}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {303--310}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_21}, doi = {10.1007/978-3-642-13739-6\_21}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ColantonioPOV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LombardiP10, author = {Flavio Lombardi and Roberto Di Pietro}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {{CUDACS:} Securing the Cloud with CUDA-Enabled Secure Virtualization}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {92--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_8}, doi = {10.1007/978-3-642-17650-0\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LombardiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MarconiPCC10, author = {Luciana Marconi and Roberto Di Pietro and Bruno Crispo and Mauro Conti}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Time Warp: How Time Affects Privacy in LBSs}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {325--339}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_23}, doi = {10.1007/978-3-642-17650-0\_23}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MarconiPCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/OrtolaniCCP10, author = {Stefano Ortolani and Mauro Conti and Bruno Crispo and Roberto Di Pietro}, editor = {Jan Camenisch and Valentin S. Kisimov and Maria Dubovitskaya}, title = {Event Handoff Unobservability in {WSN}}, booktitle = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6555}, pages = {20--28}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19228-9\_3}, doi = {10.1007/978-3-642-19228-9\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/OrtolaniCCP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PietroOST10, author = {Roberto Di Pietro and Gabriele Oligeri and Claudio Soriente and Gene Tsudik}, title = {Intrusion-Resilience in Mobile Unattended WSNs}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {2303--2311}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462056}, doi = {10.1109/INFCOM.2010.5462056}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/PietroOST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiwac/ContiPGMM10, author = {Mauro Conti and Roberto Di Pietro and Andrea Gabrielli and Luigi V. Mancini and Alessandro Mei}, editor = {Albert Y. Zomaya and Bj{\"{o}}rn Landfeldt}, title = {The smallville effect: social ties make mobile networks more secure against node capture attack}, booktitle = {Proceedings of the 8th {ACM} International Workshop on Mobility Management {\&} Wireless Access, {MOBIWAC} 2010, Bodrum, Turkey October 17-18, 2010}, pages = {99--106}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1868497.1868514}, doi = {10.1145/1868497.1868514}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobiwac/ContiPGMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/LombardiP10, author = {Flavio Lombardi and Roberto Di Pietro}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Transparent security for cloud}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {414--415}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774176}, doi = {10.1145/1774088.1774176}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/LombardiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ColantonioPOV10, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {{ABBA:} adaptive bicluster-based approach to impute missing values in binary matrices}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1026--1033}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774304}, doi = {10.1145/1774088.1774304}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ColantonioPOV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ColantonioPOV10, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Mining Business-Relevant {RBAC} States through Decomposition}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {19--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_3}, doi = {10.1007/978-3-642-15257-3\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ColantonioPOV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MarconiCP10, author = {Luciana Marconi and Mauro Conti and Roberto Di Pietro}, editor = {Sushil Jajodia and Jianying Zhou}, title = {CED\({}^{\mbox{2}}\): Communication Efficient Disjointness Decision}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {290--306}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_17}, doi = {10.1007/978-3-642-16161-2\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MarconiCP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/PietroOST10, author = {Roberto Di Pietro and Gabriele Oligeri and Claudio Soriente and Gene Tsudik}, title = {Securing Mobile Unattended WSNs against a Mobile Adversary}, booktitle = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010), New Delhi, Punjab, India, October 31 - November 3, 2010}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SRDS.2010.10}, doi = {10.1109/SRDS.2010.10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/PietroOST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/LombardiPS10, author = {Flavio Lombardi and Roberto Di Pietro and Claudio Soriente}, title = {CReW: Cloud Resilience for Windows Guests through Monitored Virtualization}, booktitle = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010), New Delhi, Punjab, India, October 31 - November 3, 2010}, pages = {338--342}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SRDS.2010.48}, doi = {10.1109/SRDS.2010.48}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/LombardiPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-0403, author = {Alessandro Colantonio and Roberto Di Pietro}, title = {{CONCISE:} Compressed 'n' Composable Integer Set}, journal = {CoRR}, volume = {abs/1004.0403}, year = {2010}, url = {http://arxiv.org/abs/1004.0403}, eprinttype = {arXiv}, eprint = {1004.0403}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-0403.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/PietroMSST09, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {8}, pages = {1463--1475}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2009.04.002}, doi = {10.1016/J.ADHOC.2009.04.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/PietroMSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ContiPMM09, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Mobility and Cooperation to Thwart Node Capture Attacks in MANETs}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/945943}, doi = {10.1155/2009/945943}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ContiPMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/ContiPMM09, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Distributed data source verification in wireless sensor networks}, journal = {Inf. Fusion}, volume = {10}, number = {4}, pages = {342--353}, year = {2009}, url = {https://doi.org/10.1016/j.inffus.2009.01.002}, doi = {10.1016/J.INFFUS.2009.01.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/ContiPMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PietroMM09, author = {Roberto Di Pietro and Pietro Michiardi and Refik Molva}, title = {Confidentiality and integrity for data aggregation in {WSN} using peer monitoring}, journal = {Secur. Commun. Networks}, volume = {2}, number = {2}, pages = {181--194}, year = {2009}, url = {https://doi.org/10.1002/sec.93}, doi = {10.1002/SEC.93}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PietroMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ContiZRPJM09, author = {Mauro Conti and Lei Zhang and Sankardas Roy and Roberto Di Pietro and Sushil Jajodia and Luigi V. Mancini}, title = {Privacy-preserving robust data aggregation in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {2}, number = {2}, pages = {195--213}, year = {2009}, url = {https://doi.org/10.1002/sec.95}, doi = {10.1002/SEC.95}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ContiZRPJM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/PietroMSST09, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Data Security in Unattended Wireless Sensor Networks}, journal = {{IEEE} Trans. Computers}, volume = {58}, number = {11}, pages = {1500--1511}, year = {2009}, url = {https://doi.org/10.1109/TC.2009.109}, doi = {10.1109/TC.2009.109}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/PietroMSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/LombardiP09, author = {Flavio Lombardi and Roberto Di Pietro}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {KvmSec: a security extension for Linux kernel virtual machines}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {2029--2034}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529733}, doi = {10.1145/1529282.1529733}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/LombardiP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ColantonioPOV09, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, editor = {Barbara Carminati and James Joshi}, title = {A formal framework to elicit roles with business meaning in {RBAC} systems}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {85--94}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542223}, doi = {10.1145/1542207.1542223}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ColantonioPOV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ColantonioPOV09, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {Mining Stable Roles in {RBAC}}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {259--269}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_23}, doi = {10.1007/978-3-642-01244-0\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ColantonioPOV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ColantonioPOV09a, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {A Probabilistic Bound on the Basic Role Mining Problem and Its Applications}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {376--386}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_33}, doi = {10.1007/978-3-642-01244-0\_33}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ColantonioPOV09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GabrielliCPM09, author = {Andrea Gabrielli and Mauro Conti and Roberto Di Pietro and Luigi V. Mancini}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Sec-TMP: {A} Secure Topology Maintenance Protocol for Event Delivery Enforcement in {WSN}}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {265--284}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_15}, doi = {10.1007/978-3-642-05284-2\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/GabrielliCPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PietroSST09, author = {Roberto Di Pietro and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Collaborative authentication in unattended WSNs}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {237--244}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514307}, doi = {10.1145/1514274.1514307}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/PietroSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wwic/ContiPGMM09, author = {Mauro Conti and Roberto Di Pietro and Andrea Gabrielli and Luigi V. Mancini and Alessandro Mei}, editor = {Hans van den Berg and Geert J. Heijenk and Evgeny Osipov and Dirk Staehle}, title = {The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks}, booktitle = {Wired/Wireless Internet Communications, 7th International Conference, {WWIC} 2009, Enschede, The Netherlands, May 27-29, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5546}, pages = {85--96}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02118-3\_8}, doi = {10.1007/978-3-642-02118-3\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wwic/ContiPGMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-2199, author = {Mauro Conti and Roberto Di Pietro and Andrea Gabrielli and Luigi V. Mancini and Alessandro Mei}, title = {The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack}, journal = {CoRR}, volume = {abs/0912.2199}, year = {2009}, url = {http://arxiv.org/abs/0912.2199}, eprinttype = {arXiv}, eprint = {0912.2199}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-2199.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/CencioniP08, author = {Paolo Cencioni and Roberto Di Pietro}, title = {A mechanism to enforce privacy in vehicle-to-infrastructure communication}, journal = {Comput. Commun.}, volume = {31}, number = {12}, pages = {2790--2802}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.12.009}, doi = {10.1016/J.COMCOM.2007.12.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/CencioniP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijscn/PietroI08, author = {Roberto Di Pietro and Stefano Iannitti}, title = {Maximizing service availability for secure satellite broadcasting}, journal = {Int. J. Satell. Commun. Netw.}, volume = {26}, number = {4}, pages = {269--289}, year = {2008}, url = {https://doi.org/10.1002/sat.912}, doi = {10.1002/SAT.912}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijscn/PietroI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PietroMMPR08, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei and Alessandro Panconesi and Jaikumar Radhakrishnan}, title = {Redoubtable Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {13:1--13:22}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341734}, doi = {10.1145/1341731.1341734}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PietroMMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AlbanoCP08, author = {Michele Albano and Stefano Chessa and Roberto Di Pietro}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Information Assurance in Critical Infrastructures via Wireless Sensor Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {305--310}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.54}, doi = {10.1109/IAS.2008.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AlbanoCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdai/SolanasP08, author = {Agusti Solanas and Roberto Di Pietro}, editor = {Vicen{\c{c}} Torra and Yasuo Narukawa}, title = {A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets}, booktitle = {Modeling Decisions for Artificial Intelligence, 5th International Conference, {MDAI} 2008, Sabadell, Spain, October 30-31, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5285}, pages = {203--214}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88269-5\_19}, doi = {10.1007/978-3-540-88269-5\_19}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/mdai/SolanasP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/PietroMSST08, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Catch Me (If You Can): Data Survival in Unattended Sensor Networks}, booktitle = {Sixth Annual {IEEE} International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong}, pages = {185--194}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PERCOM.2008.31}, doi = {10.1109/PERCOM.2008.31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/PietroMSST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PietroM08, author = {Roberto Di Pietro and Pietro Michiardi}, editor = {Rida A. Bazzi and Boaz Patt{-}Shamir}, title = {Gossip-based aggregate computation: computing faster with non address-oblivious schemes}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2008, Toronto, Canada, August 18-21, 2008}, pages = {442}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1400751.1400837}, doi = {10.1145/1400751.1400837}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/PietroM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ColantonioPO08, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello}, editor = {Roger L. Wainwright and Hisham Haddad}, title = {A cost-driven approach to role engineering}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008}, pages = {2129--2136}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1363686.1364198}, doi = {10.1145/1363686.1364198}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ColantonioPO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ColantonioPO08, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Leveraging Lattices to Improve Role Mining}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {333--347}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_22}, doi = {10.1007/978-0-387-09699-5\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ColantonioPO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BattistoniBPFM08, author = {Roberto Battistoni and Alessandro Di Biagio and Roberto Di Pietro and Matteo Formica and Luigi V. Mancini}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A Live Digital Forensic system for Windows networks}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {653--667}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_42}, doi = {10.1007/978-0-387-09699-5\_42}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BattistoniBPFM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AteniesePMT08, author = {Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Scalable and efficient provable data possession}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {9}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460889}, doi = {10.1145/1460877.1460889}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AteniesePMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/CirulliP08, author = {Andrea Cirulli and Roberto Di Pietro}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {{PEAC:} a probabilistic, efficient, and resilient authentication protocol for broadcast communications}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {29}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460915}, doi = {10.1145/1460877.1460915}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/CirulliP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/PietroMST08, author = {Roberto Di Pietro and Di Ma and Claudio Soriente and Gene Tsudik}, title = {{POSH:} Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks}, booktitle = {27th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2008), Napoli, Italy, October 6-8, 2008}, pages = {185--194}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SRDS.2008.23}, doi = {10.1109/SRDS.2008.23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/PietroMST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TsudikBJKMPR08, author = {Gene Tsudik and Mike Burmester and Ari Juels and Alfred Kobsa and David Molnar and Roberto Di Pietro and Melanie R. Rieback}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {{RFID} security and privacy: long-term research or short-term tinkering?}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {160}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352560}, doi = {10.1145/1352533.1352560}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TsudikBJKMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ContiPMM08, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Emergent properties: detection of the node-capture attack in mobile wireless sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {214--219}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352568}, doi = {10.1145/1352533.1352568}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ContiPMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0810-5351, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello}, title = {An Activity-Based Model for Separation of Duty}, journal = {CoRR}, volume = {abs/0810.5351}, year = {2008}, url = {http://arxiv.org/abs/0810.5351}, eprinttype = {arXiv}, eprint = {0810.5351}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0810-5351.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AteniesePMT08, author = {Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik}, title = {Scalable and Efficient Provable Data Possession}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2008}, url = {http://eprint.iacr.org/2008/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AteniesePMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PietroMSST08, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2008}, url = {http://eprint.iacr.org/2008/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PietroMSST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ContiPM07, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini}, title = {{ECCE:} Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {5}, number = {1}, pages = {49--62}, year = {2007}, url = {https://doi.org/10.1016/j.adhoc.2006.05.013}, doi = {10.1016/J.ADHOC.2006.05.013}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ContiPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZaninPM07, author = {Giorgio Zanin and Roberto Di Pietro and Luigi V. Mancini}, title = {Robust {RSA} distributed signatures for large-scale long-lived ad hoc networks}, journal = {J. Comput. Secur.}, volume = {15}, number = {1}, pages = {171--196}, year = {2007}, url = {https://doi.org/10.3233/jcs-2007-15107}, doi = {10.3233/JCS-2007-15107}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZaninPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PietroM07, author = {Roberto Di Pietro and Refik Molva}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Information Confinement, Privacy, and Security in {RFID} Systems}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {187--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_13}, doi = {10.1007/978-3-540-74835-9\_13}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PietroM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/PietroMM07, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Towards threat-adaptive dynamic fragment replication in large scale distributed systems}, booktitle = {21th International Parallel and Distributed Processing Symposium {(IPDPS} 2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}}, pages = {1}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IPDPS.2007.370649}, doi = {10.1109/IPDPS.2007.370649}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/PietroMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/CencioniP07, author = {Paolo Cencioni and Roberto Di Pietro}, title = {{VIPER:} {A} vehicle-to-infrastructure communication privacy enforcement protocol}, booktitle = {{IEEE} 4th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2007, 8-11 October 2007, Pisa, Italy}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MOBHOC.2007.4428740}, doi = {10.1109/MOBHOC.2007.4428740}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/CencioniP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/LawYPP07, author = {Yee Wei Law and Li{-}Hsing Yen and Roberto Di Pietro and Marimuthu Palaniswami}, title = {Secure k-Connectivity Properties of Wireless Sensor Networks}, booktitle = {{IEEE} 4th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2007, 8-11 October 2007, Pisa, Italy}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MOBHOC.2007.4428764}, doi = {10.1109/MOBHOC.2007.4428764}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/LawYPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/ContiPMM07, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, editor = {Evangelos Kranakis and Elizabeth M. Belding and Eytan H. Modiano}, title = {A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks}, booktitle = {Proceedings of the 8th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada, September 9-14, 2007}, pages = {80--89}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288107.1288119}, doi = {10.1145/1288107.1288119}, timestamp = {Mon, 22 Feb 2021 15:13:40 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/ContiPMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ContiPMS07, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Angelo Spognardi}, title = {{RIPP-FS:} An {RFID} Identification, Privacy Preserving Protocol with Forward Secrecy}, booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, {USA}}, pages = {229--234}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERCOMW.2007.100}, doi = {10.1109/PERCOMW.2007.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/ContiPMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/ChessaPFGO07, author = {Stefano Chessa and Roberto Di Pietro and Erina Ferro and Gaetano Giunta and Gabriele Oligeri}, title = {Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques}, booktitle = {Proceedings of the 65th {IEEE} Vehicular Technology Conference, {VTC} Spring 2007, 22-25 April 2007, Dublin, Ireland}, pages = {634--638}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/VETECS.2007.141}, doi = {10.1109/VETECS.2007.141}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/ChessaPFGO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/PietroMM06, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks}, journal = {Wirel. Networks}, volume = {12}, number = {6}, pages = {709--721}, year = {2006}, url = {https://doi.org/10.1007/s11276-006-6530-5}, doi = {10.1007/S11276-006-6530-5}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/PietroMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PietroMDP06, author = {Roberto Di Pietro and Luigi V. Mancini and Antonio Durante and Vishwas Patil}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Addressing the shortcomings of one-way chains}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {289--296}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128860}, doi = {10.1145/1128817.1128860}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PietroMDP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/SpognardiP06, author = {Angelo Spognardi and Roberto Di Pietro}, title = {A formal framework for the performance analysis of {P2P} networks protocols}, booktitle = {20th International Parallel and Distributed Processing Symposium {(IPDPS} 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IPDPS.2006.1639714}, doi = {10.1109/IPDPS.2006.1639714}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/SpognardiP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ContiPM06, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini}, title = {Secure Cooperative Channel Establishment inWireless Sensor Networks}, booktitle = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy}, pages = {327--331}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/PERCOMW.2006.121}, doi = {10.1109/PERCOMW.2006.121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/ContiPM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PietroMMPR06, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei and Alessandro Panconesi and Jaikumar Radhakrishnan}, title = {Sensor Networks that Are Provably Resilient}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359569}, doi = {10.1109/SECCOMW.2006.359569}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/PietroMMPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/ContiPMM06, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Requirements and Open Issues in Distributed Detection of Node Identity Replicas in {WSN}}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Taipei, Taiwan, October 8-11, 2006}, pages = {1468--1473}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICSMC.2006.384924}, doi = {10.1109/ICSMC.2006.384924}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/ContiPMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/PietroMZ07, author = {Roberto Di Pietro and Luigi V. Mancini and Giorgio Zanin}, editor = {Giovanni Di Crescenzo and Luigi V. Mancini}, title = {Efficient and Adaptive Threshold Signatures for Ad hoc networks}, booktitle = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {1}, pages = {93--105}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.012}, doi = {10.1016/J.ENTCS.2006.11.012}, timestamp = {Fri, 27 Jan 2023 10:49:50 +0100}, biburl = {https://dblp.org/rec/journals/entcs/PietroMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotp2p/SpognardiLP05, author = {Angelo Spognardi and Alessandro Lucarelli and Roberto Di Pietro}, title = {A methodology for {P2P} file-sharing traffic detection}, booktitle = {Second International Workshop on Hot Topics in Peer-to-Peer Systems, {HOT-P2P} 2005, San Diego, California, USA, July 21, 2005}, pages = {52--61}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HOT-P2P.2005.2}, doi = {10.1109/HOT-P2P.2005.2}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotp2p/SpognardiLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmb/PietroMS05, author = {Roberto Di Pietro and Gianluigi Me and Maurizio Adriano Strangio}, title = {A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions}, booktitle = {2005 International Conference on Mobile Business {(ICMB} 2005), 11-13 July 2005, Sydney, Australia}, pages = {28--34}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICMB.2005.12}, doi = {10.1109/ICMB.2005.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmb/PietroMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PietroCM05, author = {Roberto Di Pietro and Stefano Chessa and Piero Maestrini}, title = {Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {13--22}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.15}, doi = {10.1109/SECURECOMM.2005.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/PietroCM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PietroDMP05, author = {Roberto Di Pietro and Antonio Durante and Luigi V. Mancini and Vishwas Patil}, title = {Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {400--402}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.46}, doi = {10.1109/SECURECOMM.2005.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/PietroDMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/it/DiPietro04, author = {Roberto Di Pietro}, title = {Security issues for wireless sensor networks}, school = {Sapienza University of Rome, Italy}, year = {2004}, url = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0005909}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/it/DiPietro04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PietroMM04, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Key management for high bandwidth secure multicast}, journal = {J. Comput. Secur.}, volume = {12}, number = {5}, pages = {693--709}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12502}, doi = {10.3233/JCS-2004-12502}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PietroMM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotp2p/SpognardiPM04, author = {Angelo Spognardi and Roberto Di Pietro and Luigi V. Mancini}, title = {BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks}, booktitle = {International Workshop on Hot Topics in Peer-to-Peer Systems, {HOT-P2P} 2004, Volendam, The Netherlands, October 8, 2004}, pages = {22--29}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PTPSYS.2004.4}, doi = {10.1109/PTPSYS.2004.4}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotp2p/SpognardiPM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6/ChessaPM04, author = {Stefano Chessa and Roberto Di Pietro and Piero Maestrini}, editor = {Roberto Battiti and Marco Conti and Renato Lo Cigno}, title = {Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of {DS} 2}, booktitle = {Wireless On-Demand Network Systems, First {IFIP} {TC6} Working Conference, {WONS} 2004, Madonna di Campiglio, Italy, January 21-23, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2928}, pages = {184--198}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24614-5\_14}, doi = {10.1007/978-3-540-24614-5\_14}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ifip6/ChessaPM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/PietroMM04, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, title = {Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment}, booktitle = {18th International Parallel and Distributed Processing Symposium {(IPDPS} 2004), {CD-ROM} / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IPDPS.2004.1303251}, doi = {10.1109/IPDPS.2004.1303251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/PietroMM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/PietroMMPR04, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei and Alessandro Panconesi and Jaikumar Radhakrishnan}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Connectivity properties of secure wireless sensor networks}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2004, Washington, DC, USA, October 25, 2004}, pages = {53--58}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029102.1029112}, doi = {10.1145/1029102.1029112}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/PietroMMPR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/PietroMJ03, author = {Roberto Di Pietro and Luigi V. Mancini and Sushil Jajodia}, title = {Providing secrecy in key management protocols for large wireless sensors networks}, journal = {Ad Hoc Networks}, volume = {1}, number = {4}, pages = {455--468}, year = {2003}, url = {https://doi.org/10.1016/S1570-8705(03)00046-5}, doi = {10.1016/S1570-8705(03)00046-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/PietroMJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PietroM03, author = {Roberto Di Pietro and Luigi V. Mancini}, title = {Security and privacy issues of handheld and wearable wireless devices}, journal = {Commun. {ACM}}, volume = {46}, number = {9}, pages = {74--79}, year = {2003}, url = {https://doi.org/10.1145/903893.903897}, doi = {10.1145/903893.903897}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/PietroM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/PietroMLEH03, author = {Roberto Di Pietro and Luigi V. Mancini and Yee Wei Law and Sandro Etalle and Paul J. M. Havinga}, title = {{LKHW:} {A} Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks}, booktitle = {32nd International Conference on Parallel Processing Workshops {(ICPP} 2003 Workshops), 6-9 October 2003, Kaohsiung, Taiwan}, pages = {397}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICPPW.2003.1240395}, doi = {10.1109/ICPPW.2003.1240395}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/PietroMLEH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/PietroMM03, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Random key-assignment for secure Wireless Sensor Networks}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003}, pages = {62--71}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986858.986868}, doi = {10.1145/986858.986868}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sasn/PietroMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PietroMM03, author = {Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {A Time Driven Methodology for Key Dimensioning in Multicast Communications}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {121--132}, publisher = {Kluwer}, year = {2003}, timestamp = {Thu, 22 May 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PietroMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/PietroDM03, author = {Roberto Di Pietro and Antonio Durante and Luigi V. Mancini}, title = {A Reliable Key Authentication Schema for Secure Multicast Communications}, booktitle = {22nd Symposium on Reliable Distributed Systems {(SRDS} 2003), 6-8 October 2003, Florence, Italy}, pages = {231--240}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/RELDIS.2003.1238073}, doi = {10.1109/RELDIS.2003.1238073}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/PietroDM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fasec/DurantePM02, author = {Antonio Durante and Roberto Di Pietro and Luigi V. Mancini}, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Specification for Fast Automatic {IDS} Training}, booktitle = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, pages = {191--204}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-40981-6\_16}, doi = {10.1007/978-3-540-40981-6\_16}, timestamp = {Wed, 15 Sep 2021 13:43:48 +0200}, biburl = {https://dblp.org/rec/conf/fasec/DurantePM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pomc/PietroMJ02, author = {Roberto Di Pietro and Luigi V. Mancini and Sushil Jajodia}, title = {Efficient and secure keys management for wireless mobile communications}, booktitle = {Proceedings of the 2002 Workshop on Principles of Mobile Computing, {POMC} 2002, October 30-31, 2002, Toulouse, France}, pages = {66--73}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/584490.584504}, doi = {10.1145/584490.584504}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pomc/PietroMJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PietroMJ02, author = {Roberto Di Pietro and Luigi V. Mancini and Sushil Jajodia}, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {Secure Selective Exclusion in Ad Hoc Wireless Network}, booktitle = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, pages = {423--434}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 11 Feb 2005 12:53:42 +0100}, biburl = {https://dblp.org/rec/conf/sec/PietroMJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.