Mauro Conti
Person information
- affiliation: University of Padua, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j80]Armir Bujari, Mauro Conti, Carla De Francesco, Claudio E. Palazzi:
Fast multi-hop broadcast of alert messages in VANETs: An analytical model. Ad Hoc Networks 82: 126-133 (2019) - [j79]Attaullah Buriro, Bruno Crispo, Mauro Conti:
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones. J. Inf. Sec. Appl. 44: 89-103 (2019) - [p4]Ema Kusen, Mark Strembeck, Mauro Conti:
Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube. Influence and Behavior Analysis in Social Networks and Social Media 2019: 63-83 - [i48]Mauro Conti, Ankit Gangwal, Michele Todero:
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages. CoRR abs/1901.10019 (2019) - 2018
- [j78]Chuan Zhao, Shengnan Zhao, Bo Zhang, Zhongtian Jia, Zhenxiang Chen, Mauro Conti:
Secure Comparison Under Ideal/Real Simulation Paradigm. IEEE Access 6: 31236-31248 (2018) - [j77]Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac:
Advertising in the IoT Era: Vision and Challenges. IEEE Communications Magazine 56(11): 138-144 (2018) - [j76]Wafa Ben Jaballah, Mauro Conti, Gilberto Filè, Mohamed Mosbah, Akka Zemmari:
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks. Computer Communications 119: 66-82 (2018) - [j75]Mauro Conti, Ralph E. Droms, Muhammad Hassan, Chhagan Lal:
Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN. Computer Communications 129: 209-225 (2018) - [j74]Mauro Conti, Ankit Gangwal, Sushmita Ruj:
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective. Computers & Security 79: 162-189 (2018) - [j73]Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik:
Security and Privacy Analysis of National Science Foundation Future Internet Architectures. IEEE Communications Surveys and Tutorials 20(2): 1418-1442 (2018) - [j72]Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor:
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis. IEEE Communications Surveys and Tutorials 20(4): 2658-2713 (2018) - [j71]Mauro Conti, Sandeep Kumar E, Chhagan Lal, Sushmita Ruj:
A Survey on Security and Privacy Issues of Bitcoin. IEEE Communications Surveys and Tutorials 20(4): 3416-3452 (2018) - [j70]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. ACM Comput. Surv. 51(4): 79:1-79:35 (2018) - [j69]Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson:
Internet of Things security and forensics: Challenges and opportunities. Future Generation Comp. Syst. 78: 544-546 (2018) - [j68]Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Marimuthu Karuppiah, Mauro Conti:
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Generation Comp. Syst. 84: 200-215 (2018) - [j67]Seyed Hossein Hosseini Nazhad, Mohammad Shojafar, Shahaboddin Shamshirband, Mauro Conti:
An efficient routing protocol for the QoS support of large-scale MANETs. Int. J. Communication Systems 31(1) (2018) - [j66]Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo:
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet of Things Journal 5(1): 269-282 (2018) - [j65]Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Kim-Kwang Raymond Choo:
Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intelligence and Humanized Computing 9(4): 1141-1152 (2018) - [j64]Giuseppe Cascavilla, Filipe Beato, Andrea Burattin, Mauro Conti, Luigi Vincenzo Mancini:
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles. Online Social Networks and Media 6: 58-68 (2018) - [j63]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Trans. Dependable Sec. Comput. 15(6): 959-973 (2018) - [j62]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. IEEE Trans. Information Forensics and Security 13(1): 63-78 (2018) - [j61]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Information Forensics and Security 13(5): 1096-1109 (2018) - [j60]Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi:
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. IEEE Trans. Information Forensics and Security 13(8): 2031-2046 (2018) - [j59]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, Athanasios V. Vasilakos:
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment. IEEE J. Biomedical and Health Informatics 22(4): 1299-1309 (2018) - [j58]Riccardo Spolaor, Elia Dal Santo, Mauro Conti:
DELTA: Data Extraction and Logging Tool for Android. IEEE Trans. Mob. Comput. 17(6): 1289-1302 (2018) - [j57]Prashant Kumar, Meenakshi Tripathi, Ajay Nehra, Mauro Conti, Chhagan Lal:
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN. IEEE Trans. Network and Service Management 15(4): 1545-1559 (2018) - [j56]Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, Mauro Conti:
Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 9(3): 1900-1910 (2018) - [j55]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
Enhancing QoE for video streaming in MANETs via multi-constraint routing. Wireless Networks 24(1): 235-256 (2018) - [c138]Mauro Conti, Edlira Dushku, Luigi V. Mancini:
Distributed Services Attestation in IoT. From Database to Cyber Security 2018: 261-273 - [c137]Wafa Ben Jaballah, Mauro Conti, Claudio E. Palazzi:
The position cheating attack on inter-vehicular online gaming. CCNC 2018: 1-6 - [c136]Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan:
All You Need is: Evading Hate Speech Detection. AISec@CCS 2018: 2-12 - [c135]Mauro Conti:
Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around). CPSS@AsiaCCS 2018: 23-24 - [c134]Sana Belguith, Sarada Prasad Gochhayat, Mauro Conti, Giovanni Russello:
Emergency Access Control Management Via Attribute Based Encrypted QR Codes. CNS 2018: 1-8 - [c133]Mauro Conti, Ankit Gangwal, Sarada Prasad Gochhayat, Gabriele Tolomei:
Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly. CNS 2018: 1-7 - [c132]Kiran S. Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
SILK-TV: Secret Information Leakage from Keystroke Timing Videos. ESORICS (1) 2018: 263-280 - [c131]Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices. ESORICS (1) 2018: 595-617 - [c130]Zahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti:
RARE: Defeating side channels based on data-deduplication in cloud storage. INFOCOM Workshops 2018: 444-449 - [c129]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lin Wang, Bo Yang, Mauro Conti:
Deep and Broad Learning Based Detection of Android Malware via Network Traffic. IWQoS 2018: 1-6 - [c128]Giovanna Carofiglio, Alberto Compagno, Mauro Conti, Fabio De Gaspari, Luca Muscariello:
IaaS-Aided Access Control for Information-Centric IoT. LCN 2018: 208-216 - [c127]Alberto Compagno, Mauro Conti, Stefano Munari, Riccardo Lazzeretti:
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking. LCN 2018: 580-588 - [c126]Sankardas Roy, Daniele Tomasi, Mauro Conti, Shiva Bhusal, Arkajyoti Roy, Jiang Li:
Optimizing Message Ferry Scheduling in a DTN. MobiWac 2018: 113-117 - [c125]Andrea Biondo, Mauro Conti, Daniele Lain:
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets. NDSS 2018 - [c124]Giuseppe Bernieri, Mauro Conti, Federica Pascucci:
A Novel Architecture for Cyber-Physical Security in Industrial Control Networks. RTSI 2018: 1-6 - [c123]Angelo Capossele, Andrea Gaglione, Michele Nati, Mauro Conti, Riccardo Lazzeretti, Paolo Missier:
Leveraging Blockchain to Enable Smart-Health Applications. RTSI 2018: 1-6 - [c122]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - [c121]Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi:
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. USENIX Security Symposium 2018: 1213-1227 - [c120]Mauro Conti, Pallavi Kaliyar, Md Masoom Rabbani, Silvio Ranise:
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things. WiMob 2018: 1-8 - [c119]Mauro Conti, Ralph E. Droms, Muhammad Hassan, Sebastiano Valle:
QoE Degradation Attack in Dynamic Adaptive Streaming Over ICN. WOWMOM 2018: 1-9 - [i47]Federico Tavella, Alberto Giaretta, Triona Marie Dooley-Cullinane, Mauro Conti, Lee Coffey, Sasitharan Balasubramaniam:
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. CoRR abs/1801.04774 (2018) - [i46]Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac:
Advertising in the IoT Era: Vision and Challenges. CoRR abs/1802.04102 (2018) - [i45]Mauro Conti, Ankit Gangwal, Sushmita Ruj:
On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective. CoRR abs/1804.01341 (2018) - [i44]Amrita Ghosal, Mauro Conti:
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey. CoRR abs/1806.00121 (2018) - [i43]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise:
PADS: Practical Attestation for Highly Dynamic Swarm Topologies. CoRR abs/1806.05766 (2018) - [i42]Mohammad Mahdi Tajiki, Mohammad Shojafar, Behzad Akbari, Stefano Salsano, Mauro Conti, Mukesh Singhal:
Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource Management for Real-time SFC in Fog-supported SDN. CoRR abs/1807.00324 (2018) - [i41]Flavio Toffalini, Andrea Biondo, Eleonora Losiuouk, Jianying Zhou, Mauro Conti:
SCARR: A Novel Scalable Runtime Remote Attestation. CoRR abs/1807.08003 (2018) - [i40]Mauro Conti, Edlira Dushku, Luigi V. Mancini:
RADIS: Remote Attestation of Distributed IoT Services. CoRR abs/1807.10234 (2018) - [i39]Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson:
Internet of Things Security and Forensics: Challenges and Opportunities. CoRR abs/1807.10438 (2018) - [i38]Mauro Conti, Ali Dehghantanha, Tooska Dargahi:
Cyber Threat Intelligence : Challenges and Opportunities. CoRR abs/1808.01162 (2018) - [i37]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs/1808.02741 (2018) - [i36]Mauro Conti, Chhagan Lal:
A Survey on Context-based Co-presence Detection Techniques. CoRR abs/1808.03320 (2018) - [i35]Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan:
All You Need is "Love": Evading Hate-speech Detection. CoRR abs/1808.09115 (2018) - [i34]Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar, Mauro Conti:
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware. CoRR abs/1809.09035 (2018) - 2017
- [j54]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya:
Service resizing for quick DDoS mitigation in cloud computing environment. Annales des Télécommunications 72(5-6): 237-252 (2017) - [j53]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers & Electrical Engineering 59: 165-179 (2017) - [j52]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya:
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. IEEE Cloud Computing 4(1): 22-32 (2017) - [j51]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya:
DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications 107: 30-48 (2017) - [j50]Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Thomas M. Chen, Yogachandran Rahulamathavan:
PIndroid: A novel Android malware detection system using ensemble learning methods. Computers & Security 68: 36-46 (2017) - [j49]Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti:
Android inter-app communication threats and detection techniques. Computers & Security 70: 392-421 (2017) - [j48]Tooska Dargahi, Alberto Caponi, Moreno Ambrosin, Giuseppe Bianchi, Mauro Conti:
A Survey on the Security of Stateful SDN Data Planes. IEEE Communications Surveys and Tutorials 19(3): 1701-1725 (2017) - [j47]Claudio Agostino Ardagna, Kanishka Ariyapala, Mauro Conti, Cristina M. Pinotti, Julinda Stefa:
Anonymous end-to-end communications in adversarial mobile clouds. Pervasive and Mobile Computing 36: 57-67 (2017) - [j46]QianQian Li, Sarada Prasad Gochhayat, Mauro Conti, FangAi Liu:
EnergIoT: A solution to improve network lifetime of IoT devices. Pervasive and Mobile Computing 42: 124-133 (2017) - [j45]Pericle Perazzo, Francesco Betti Sorbelli, Mauro Conti, Gianluca Dini, Cristina M. Pinotti:
Drone Path Planning for Secure Positioning and Secure Position Verification. IEEE Trans. Mob. Comput. 16(9): 2478-2493 (2017) - [j44]Reza Mohammadi, Reza Javidan, Mauro Conti:
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks. IEEE Trans. Network and Service Management 14(2): 487-497 (2017) - [j43]Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzeretti:
ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks. ACM Trans. Internet Techn. 18(1): 6:1-6:22 (2017) - [j42]Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran:
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking. IEEE/ACM Trans. Netw. 25(2): 1206-1219 (2017) - [c118]Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori:
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics. ARES 2017: 60:1-60:6 - [c117]Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks. ARES 2017: 84:1-84:8 - [c116]Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices. ACNS 2017: 83-102 - [c115]Ema Kusen, Mark Strembeck, Giuseppe Cascavilla, Mauro Conti:
On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks. ASONAM 2017: 321-324 - [c114]Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. CCNC 2017: 854-860 - [c113]Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP. AsiaCCS 2017: 703-715 - [c112]Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti:
Detection of Information Leaks via Reflection in Android Apps. AsiaCCS 2017: 911-913 - [c111]Mauro Conti, Giorgio Di Natale, Annelie Heuser, Thomas Pöppelmann, Nele Mentens:
Do we need a holistic approach for the design of secure IoT systems? Conf. Computing Frontiers 2017: 425-430 - [c110]Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, Mauro Conti:
Fitness Trackers: Fit for Health but Unfit for Security and Privacy. CHASE 2017: 19-24 - [c109]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Unraveling Reflection Induced Sensitive Leaks in Android Apps. CRiSIS 2017: 49-65 - [c108]Lorenzo Bordoni, Mauro Conti, Riccardo Spolaor:
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android. ESORICS (1) 2017: 278-296 - [c107]Ema Kusen, Giuseppe Cascavilla, Kathrin Figl, Mauro Conti, Mark Strembeck:
Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons. FiCloud Workshops 2017: 132-137 - [c106]Mauro Conti, Fabio De Gaspari, Luigi V. Mancini:
Know Your Enemy: Stealth Configuration-Information Gathering in SDN. GPC 2017: 386-401 - [c105]Maddalena Favaretto, Riccardo Spolaor, Mauro Conti, Marco Ferrante:
You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC. GPC 2017: 426-440 - [c104]QianQian Li, Reza Mohammadi, Mauro Conti, ChuanHuang Li, XiaoLin Li:
GolfEngine: Network management system for software defined networking. ICCP 2017: 239-246 - [c103]Matteo Di Pirro, Mauro Conti, Riccardo Lazzeretti:
Ensuring information security by using Haskell's advanced type system. ICCST 2017: 1-6 - [c102]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication Over the Wireless Channel. ICDCS 2017: 2294-2301 - [c101]Vittoria Cozza, Zisis Tsiatsikas, Mauro Conti, Georgios Kambourakis:
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services. ICISSP 2017: 431-438 - [c100]Ankit Gangwal, Mauro Conti, Manoj Singh Gaur:
Panorama: Real-time bird's eye view of an OpenFlow network. ICNSC 2017: 204-209 - [c99]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
TextDroid: Semantics-based detection of mobile malware using network flows. INFOCOM Workshops 2017: 18-23 - [c98]Zahra Pooranian, Mohammad Shojafar, Paola Gabriela Vinueza Naranjo, Luca Chiaraviglio, Mauro Conti:
A Novel Distributed Fog-Based Networked Architecture to Preserve Energy in Fog Data Centers. MASS 2017: 604-609 - [c97]Mauro Conti, Ankit Gangwal:
Blocking intrusions at border using software defined-internet exchange point (SD-IXP). NFV-SDN 2017: 1-6 - [c96]Reza Mohammadi, Reza Javidan, Manijeh Keshtgari, Mauro Conti, Chhagan Lal:
Practical extensions to countermeasure DoS attacks in software defined networking. NFV-SDN 2017: 1-6 - [c95]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. RAID 2017: 48-69 - [c94]Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi:
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features. WIFS 2017: 1-6 - [c93]Matteo Brunati, Mauro Conti, Alessandro Tezza:
SNIFFO: Security of networks and intelligence for field operations. WiMob 2017: 1-8 - [c92]Mauro Conti, Ankit Gangwal, Manoj Singh Gaur:
A comprehensive and effective mechanism for DDoS detection in SDN. WiMob 2017: 1-8 - [c91]Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise:
Toward secure and efficient attestation for highly dynamic swarms: poster. WISEC 2017: 281-282 - [c90]Moreno Ambrosin, Stefano Cecconello, Mauro Conti, Daniele Lain:
A roaming-based denial of service attack on LTE networks: poster. WISEC 2017: 283-284 - [e5]Guevara Noubir, Mauro Conti, Sneha Kumar Kasera:
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017. ACM 2017, ISBN 978-1-4503-5084-6 [contents] - [i33]Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi:
It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features. CoRR abs/1701.04221 (2017) - [i32]Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti:
A Survey on Homomorphic Encryption Schemes: Theory and Implementation. CoRR abs/1704.03578 (2017) - [i31]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis. CoRR abs/1704.06099 (2017) - [i30]Mauro Conti, Sandeep Kumar E, Chhagan Lal, Sushmita Ruj:
A Survey on Security and Privacy Issues of Bitcoin. CoRR abs/1706.00916 (2017) - [i29]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit. CoRR abs/1706.09165 (2017) - [i28]Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor:
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis. CoRR abs/1708.03766 (2017) - [i27]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study. CoRR abs/1709.04417 (2017) - [i26]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Forensics Analysis of Android Mobile VoIP Apps. CoRR abs/1709.05296 (2017) - [i25]Paola Gabriela Vinueza Naranjo, Zahra Pooranian, Mohammad Shojafar, Mauro Conti, Rajkumar Buyya:
FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments. CoRR abs/1710.01801 (2017) - 2016
- [j41]Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi:
The impact of malicious nodes positioning on vehicular alert messaging system. Ad Hoc Networks 52: 3-16 (2016) - [j40]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti:
DDoS attacks in cloud computing: Collateral damage to non-targets. Computer Networks 109: 157-171 (2016) - [j39]Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan:
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs. Computer Communications 85: 1-13 (2016) - [j38]Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
Colluding browser extension attack on user privacy and its implication for web browsers. Computers & Security 63: 14-28 (2016) - [j37]Mauro Conti, Nicola Dragoni, Viktor Lesyk:
A Survey of Man In The Middle Attacks. IEEE Communications Surveys and Tutorials 18(3): 2027-2051 (2016) - [j36]Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir-Mohammad Rahmani, Pasi Liljeberg:
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices. IEEE Micro 36(6): 25-35 (2016) - [j35]