default search action
Anna Maria Mandalari
Person information
- affiliation: Imperial College London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David R. Choffnes, Hamed Haddadi:
SunBlock: Cloudless Protection for IoT Systems. PAM (2) 2024: 322-338 - [c15]Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri:
REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. PerCom Workshops 2024: 7-8 - [c14]Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri:
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. PerCom 2024: 114-124 - [i16]Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri:
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. CoRR abs/2401.12184 (2024) - [i15]Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David R. Choffnes, Hamed Haddadi:
SunBlock: Cloudless Protection for IoT Systems. CoRR abs/2401.14332 (2024) - [i14]Niousha Nazemi, Omid Tavallaie, Anna Maria Mandalari, Hamed Haddadi, Ralph Holz, Albert Y. Zomaya:
Analysis of DNS Dependencies and their Security Implications in Australia: A Comparative Study of General and Indigenous Populations. CoRR abs/2408.12958 (2024) - [i13]Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Anna Maria Mandalari, Kanchana Thilakarathna, Ralph Holz, Hamed Haddadi, Albert Y. Zomaya:
ACCESS-FL: Agile Communication and Computation for Efficient Secure Aggregation in Stable Federated Learning Networks. CoRR abs/2409.01722 (2024) - [i12]Gianluca Anselmi, Yash Vekaria, Alexander D'Souza, Patricia Callejo, Anna Maria Mandalari, Zubair Shafiq:
Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs. CoRR abs/2409.06203 (2024) - [i11]Mila Dalla Preda, Serge Egelman, Anna Maria Mandalari, Volker Stocker, Juan Tapiador, Narseo Vallina-Rodriguez:
EU Cyber Resilience Act: Socio-Technical and Research Challenges (Dagstuhl Seminar 24112). Dagstuhl Reports 14(3): 52-74 (2024) - 2023
- [j6]Marcelo Bagnulo, Alberto García-Martínez, Anna Maria Mandalari, Praveen Balasubramanian, Daniel Havey, Gabriel Montenegro:
Design, implementation and validation of a receiver-driven less-than-best-effort transport. Comput. Networks 233: 109841 (2023) - [c13]Yang Li, Anna Maria Mandalari, Isabel Straw:
Recovering Headerless Frames in LR-FHSS. EWSN 2023: 415-420 - [c12]Savvas Hadjixenophontos, Anna Maria Mandalari, Yuchen Zhao, Hamed Haddadi:
PRISM: Privacy Preserving Healthcare Internet of Things Security Management. ISCC 2023: 1-5 - [c11]Gianluca Anselmi, Anna Maria Mandalari, Sara Lazzaro, Vincenzo De Angelis:
COPSEC: Compliance-Oriented IoT Security and Privacy Evaluation Framework. S3@MobiCom 2023: 6-7 - [c10]Gianluca Anselmi, Anna Maria Mandalari, Sara Lazzaro, Vincenzo De Angelis:
COPSEC: Compliance-Oriented IoT Security and Privacy Evaluation Framework. MobiCom 2023: 140:1-140:3 - [c9]Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes:
Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards. SP 2023: 3061-3078 - [i10]Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes:
Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards. CoRR abs/2304.03045 (2023) - [i9]Yang Li, Anna Maria Mandalari, Isabel Straw:
Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices. CoRR abs/2306.09017 (2023) - 2022
- [j5]Anna Maria Mandalari, Andra Lutu, Ana Custura, Ali Safari Khatouni, Özgü Alay, Marcelo Bagnulo, Vaibhav Bajpai, Anna Brunström, Jörg Ott, Martino Trevisan, Marco Mellia, Gorry Fairhurst:
Measuring Roaming in Europe: Infrastructure and Implications on Users' QoE. IEEE Trans. Mob. Comput. 21(10): 3687-3699 (2022) - [i8]Savvas Hadjixenophontos, Anna Maria Mandalari, Yuchen Zhao, Hamed Haddadi:
PRISM: Privacy Preserving Internet of Things Security Management. CoRR abs/2212.14736 (2022) - 2021
- [j4]Anna Maria Mandalari, Daniel J. Dubois, Roman Kolcun, Muhammad Talha Paracha, Hamed Haddadi, David R. Choffnes:
Blocking Without Breaking: Identification and Mitigation of Non-Essential IoT Traffic. Proc. Priv. Enhancing Technol. 2021(4): 369-388 (2021) - [c8]Said Jawad Saidi, Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes, Georgios Smaragdakis, Anja Feldmann:
Detecting consumer IoT devices through the lens of an ISP. ANRW 2021: 36-38 - [c7]Oliver Thompson, Anna Maria Mandalari, Hamed Haddadi:
Rapid IoT device identification at the edge. DistributedML@CoNEXT 2021: 22-28 - [c6]Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi:
Revisiting IoT Device Identification. TMA 2021 - [i7]Anna Maria Mandalari, Daniel J. Dubois, Roman Kolcun, Muhammad Talha Paracha, Hamed Haddadi, David R. Choffnes:
Blocking without Breaking: Identification and Mitigation of Non-Essential IoT Traffic. CoRR abs/2105.05162 (2021) - [i6]Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi:
Revisiting IoT Device Identification. CoRR abs/2107.07818 (2021) - [i5]Oliver Thompson, Anna Maria Mandalari, Hamed Haddadi:
Rapid IoT Device Identification at the Edge. CoRR abs/2110.13941 (2021) - 2020
- [j3]Daniel J. Dubois, Roman Kolcun, Anna Maria Mandalari, Muhammad Talha Paracha, David R. Choffnes, Hamed Haddadi:
When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. Proc. Priv. Enhancing Technol. 2020(4): 255-276 (2020) - [c5]Said Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes, Georgios Smaragdakis, Anja Feldmann:
A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild. Internet Measurement Conference 2020: 87-100 - [i4]Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes:
Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations. CoRR abs/2003.07133 (2020) - [i3]Said Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes, Georgios Smaragdakis, Anja Feldmann:
A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild. CoRR abs/2009.01880 (2020) - [i2]Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Yiming Xie, Richard Mortier, Hamed Haddadi:
The Case for Retraining of ML Models for IoT Device Identification at the Edge. CoRR abs/2011.08605 (2020)
2010 – 2019
- 2019
- [c4]Jingjing Ren, Daniel J. Dubois, David R. Choffnes, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi:
Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach. Internet Measurement Conference 2019: 267-279 - [c3]Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Roman Kolcun, Anna Maria Mandalari, Hamed Haddadi, Derek McAuley, Richard Mortier:
"Sensing" the IoT network: Ethical capture of domestic IoT network traffic: poster abstract. SenSys 2019: 406-407 - 2018
- [j2]Anna Maria Mandalari, Andra Lutu, Bob Briscoe, Marcelo Bagnulo, Ozgu Alay:
Measuring ECN++: Good News for ++, Bad News for ECN over Mobile. IEEE Commun. Mag. 56(3): 180-186 (2018) - [c2]Anna Maria Mandalari, Andra Lutu, Ana Custura, Ali Safari Khatouni, Özgü Alay, Marcelo Bagnulo, Vaibhav Bajpai, Anna Brunström, Jörg Ott, Marco Mellia, Gorry Fairhurst:
Experience: Implications of Roaming in Europe. MobiCom 2018: 179-189 - 2017
- [j1]Anna Maria Mandalari, Miguel Angel Diaz Bautista, Francisco Valera, Marcelo Bagnulo:
NATwatcher: Profiling NATs in the Wild. IEEE Commun. Mag. 55(3): 178-185 (2017) - [i1]Anna Maria Mandalari, Andra Lutu, Amogh Dhamdhere, Marcelo Bagnulo, Kimberly C. Claffy:
Tracking the Big NAT across Europe and the U.S. CoRR abs/1704.01296 (2017) - 2015
- [c1]Anna Maria Mandalari, Marcelo Bagnulo, Andra Lutu:
Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption. C2B(I)D@SIGCOMM 2015: 3-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint