default search action
Alessandra Rizzardi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Jesús Fernando Cevallos Moreno, Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini:
ASAP: Automatic Synthesis of Attack Prototypes, an online-learning, end-to-end approach. Comput. Networks 254: 110828 (2024) - [j27]Jesús Fernando Cevallos Moreno, Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini:
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach. Comput. Secur. 142: 103898 (2024) - [j26]Alessandra Rizzardi, Sabrina Sicari, Jesús Fernando Cevallos Moreno, Alberto Coen-Porisini:
IoT-driven blockchain to manage the healthcare supply chain and protect medical records. Future Gener. Comput. Syst. 161: 415-431 (2024) - [j25]Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini:
Towards rapid modeling and prototyping of indoor and outdoor monitoring applications. Sustain. Comput. Informatics Syst. 41: 100951 (2024) - 2023
- [j24]Jesús Fernando Cevallos Moreno, Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini:
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges. Comput. Networks 236: 110016 (2023) - 2022
- [j23]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
Security&privacy issues and challenges in NoSQL databases. Comput. Networks 206: 108828 (2022) - [j22]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
Insights into security and privacy towards fog computing evolution. Comput. Secur. 120: 102822 (2022) - [j21]Alessandra Rizzardi, Sabrina Sicari, Daniele Miorandi, Alberto Coen-Porisini:
Securing the access control policies to the Internet of Things resources through permissioned blockchain. Concurr. Comput. Pract. Exp. 34(15) (2022) - [j20]Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini:
Analysis on functionalities and security features of Internet of Things related protocols. Wirel. Networks 28(7): 2857-2887 (2022) - 2021
- [j19]Sabrina Sicari, Alessandra Rizzardi, Gianluca Dini, Pericle Perazzo, Michele La Manna, Alberto Coen-Porisini:
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware. Int. J. Inf. Sec. 20(5): 695-713 (2021) - 2020
- [j18]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
5G In the internet of things era: An overview on security and privacy challenges. Comput. Networks 179: 107345 (2020) - [j17]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
Smart certification: protecting the originality of the product in the eyewear sector. Internet Technol. Lett. 3(3) (2020) - [j16]Daniele Miorandi, Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini:
Sticky Policies: A Survey. IEEE Trans. Knowl. Data Eng. 32(12): 2481-2499 (2020) - [c11]Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, Alberto Coen-Porisini:
Testing and Evaluating a Security-Aware Pub and Sub Protocol in a Fog-Driven IoT Environment. ADHOC-NOW 2020: 183-197 - [c10]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security. SmartIoT 2020: 64-71
2010 – 2019
- 2019
- [j15]Sabrina Sicari, Alessandra Rizzardi, Giuseppe Piro, Alberto Coen-Porisini, Luigi Alfredo Grieco:
Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the Internet of Nano-Things. Comput. Networks 162 (2019) - [j14]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
Smart transport and logistics: A Node-RED implementation. Internet Technol. Lett. 2(2) (2019) - [j13]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
How to evaluate an Internet of Things system: Models, case studies, and real developments. Softw. Pract. Exp. 49(11): 1663-1685 (2019) - 2018
- [j12]Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini:
REATO: REActing TO Denial of Service attacks in the Internet of Things. Comput. Networks 137: 37-48 (2018) - [j11]Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini:
A risk assessment methodology for the Internet of Things. Comput. Commun. 129: 67-79 (2018) - [j10]Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini:
Securing the smart home: A real case study. Internet Technol. Lett. 1(3) (2018) - [j9]Michele Tortelli, Alessandra Rizzardi, Sabrina Sicari, Luigi Alfredo Grieco, Gennaro Boggia, Alberto Coen-Porisini:
S2 DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks. Wirel. Networks 24(1): 309-328 (2018) - [c9]Domenica Costantino, G. Malagnini, F. Carrera, Alessandra Rizzardi, Pietro Boccadoro, Sabrina Sicari, Luigi Alfredo Grieco:
Solving Interoperability within the Smart Building: A Real Test-Bed. ICC Workshops 2018: 1-6 - 2017
- [j8]Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini:
Dynamic Policies in Internet of Things: Enforcement and Synchronization. IEEE Internet Things J. 4(6): 2228-2238 (2017) - [j7]Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini:
Security towards the edge: Sticky policy enforcement for networked smart objects. Inf. Syst. 71: 78-89 (2017) - [j6]Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, Alberto Coen-Porisini:
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2017 (2017) - [c8]Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, Alberto Coen-Porisini:
A secure ICN-IoT architecture. ICC Workshops 2017: 259-264 - 2016
- [b1]Alessandra Rizzardi:
Security in Internet of Things: networked smart objects. University of Insubria, Italy, 2016 - [j5]Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Cinzia Cappiello, Alberto Coen-Porisini:
Security policy enforcement for networked smart objects. Comput. Networks 108: 133-147 (2016) - [j4]Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Cinzia Cappiello, Alberto Coen-Porisini:
A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58: 43-55 (2016) - [j3]Alessandra Rizzardi, Sabrina Sicari, Daniele Miorandi, Alberto Coen-Porisini:
AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things. Inf. Syst. 62: 29-41 (2016) - [j2]Ivan Minakov, Roberto Passerone, Alessandra Rizzardi, Sabrina Sicari:
A Comparative Study of Recent Wireless Sensor Network Simulators. ACM Trans. Sens. Networks 12(3): 20:1-20:39 (2016) - [c7]Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini:
Internet of Things: Security in the Keys. Q2SWinet@MSWiM 2016: 129-133 - [c6]Ivan Minakov, Roberto Passerone, Alessandra Rizzardi, Sabrina Sicari:
Routing behavior across WSN simulators: The AODV case study. WFCS 2016: 1-8 - 2015
- [j1]Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, Alberto Coen-Porisini:
Security, privacy and trust in Internet of Things: The road ahead. Comput. Networks 76: 146-164 (2015) - [c5]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini, Luigi Alfredo Grieco, Thierry Monteil:
Secure OM2M Service Platform. ICAC 2015: 313-318 - [c4]Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, Alberto Coen-Porisini:
GoNe: Dealing with node behavior. ICCE-Berlin 2015: 358-362 - [c3]Alessandra Rizzardi, Daniele Miorandi, Sabrina Sicari, Cinzia Cappiello, Alberto Coen-Porisini:
Networked Smart Objects: Moving Data Processing Closer to the Source. IoT 360 (2) 2015: 28-35 - 2014
- [c2]Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini, Cinzia Cappiello:
A NFP Model for Internet of Things applications. WiMob 2014: 265-272 - 2013
- [c1]Sabrina Sicari, Luigi Alfredo Grieco, Alessandra Rizzardi, Gennaro Boggia, Alberto Coen-Porisini:
SETA: A secure sharing of tasks in clustered wireless sensor networks. WiMob 2013: 239-246
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint