default search action
Mauro Conti
Person information
- affiliation: University of Padua, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j276]Ankit Gangwal, Aashish Paliwal, Mauro Conti:
De-Authentication Using Ambient Light Sensor. IEEE Access 12: 28225-28234 (2024) - [j275]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim:
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. IEEE Access 12: 48301-48320 (2024) - [j274]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Clust. Comput. 27(3): 2691-2713 (2024) - [j273]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti:
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. Clust. Comput. 27(4): 4823-4839 (2024) - [j272]Vaishali A. Shirsath, Madhav Chandane, Chhagan Lal, Mauro Conti:
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy. Comput. Networks 244: 110327 (2024) - [j271]Mohd Shariq, Mauro Conti, Karan Singh, Chhagan Lal, Ashok Kumar Das, Shehzad Ashraf Chaudhry, Mehedi Masud:
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing. Comput. Networks 252: 110678 (2024) - [j270]Vaishali A. Shirsath, Madhav Chandane, Chhagan Lal, Mauro Conti:
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches. Comput. Commun. 216: 283-294 (2024) - [j269]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti:
PETRAK: A solution against DDoS attacks in vehicular networks. Comput. Commun. 221: 142-154 (2024) - [j268]K. M. Sameera, Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P., Mauro Conti:
Privacy-preserving in Blockchain-based Federated Learning systems. Comput. Commun. 222: 38-67 (2024) - [j267]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Georgiana Timpau, Mauro Conti:
OSTIS: A novel Organization-Specific Threat Intelligence System. Comput. Secur. 145: 103990 (2024) - [j266]Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Nicolò Dal Fabbro, Riccardo Lazzeretti:
Anonymous Federated Learning via Named-Data Networking. Future Gener. Comput. Syst. 152: 288-303 (2024) - [j265]Andrea De Salve, Alessandro Brighente, Mauro Conti:
EDIT: A data inspection tool for smart contracts temporal behavior modeling and prediction. Future Gener. Comput. Syst. 154: 413-425 (2024) - [j264]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. IEEE Secur. Priv. 22(1): 10-23 (2024) - [j263]Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Reji Thomas:
GREPHRO: Nature-inspired optimization duo for Internet-of-Things. Internet Things 25: 101067 (2024) - [j262]Alessandro Brighente, Mauro Conti, Gabriele Di Renzone, Giacomo Peruzzi, Alessandro Pozzebon:
Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective. IEEE Internet Things J. 11(5): 7309-7324 (2024) - [j261]Jin Han, Ran Cao, Alessandro Brighente, Mauro Conti:
Light-YOLOv5: A Lightweight Drone Detector for Resource-Constrained Cameras. IEEE Internet Things J. 11(6): 11046-11057 (2024) - [j260]Khalid Mahmood, Mohammad S. Obaidat, Salman Shamshad, Mohammed J. F. Alenazi, Gulshan Kumar, Mohammad Hossein Anisi, Mauro Conti:
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT). IEEE Internet Things J. 11(13): 23977-23984 (2024) - [j259]Rahul Saha, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Joel J. P. C. Rodrigues:
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks. IEEE Internet Things J. 11(15): 26104-26117 (2024) - [j258]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Rabeeba Abdul Rasheed, Mauro Conti:
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis. J. Netw. Syst. Manag. 32(4): 88 (2024) - [j257]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
SPRITZ-PS: validation of synthetic face images using a large dataset of printed documents. Multim. Tools Appl. 83(26): 67795-67823 (2024) - [j256]Saverio Cavasin, Daniele Mari, Simone Milani, Mauro Conti:
Fingerprint membership and identity inference against generative adversarial networks. Pattern Recognit. Lett. 185: 184-189 (2024) - [j255]Yassine Mekdad, Ahmet Aris, Abbas Acar, Mauro Conti, Riccardo Lazzeretti, Abdeslam El Fergougui, A. Selcuk Uluagac:
A comprehensive security and performance assessment of UAV authentication schemes. Secur. Priv. 7(1) (2024) - [j254]Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
EVScout2.0: Electric Vehicle Profiling through Charging Profile. ACM Trans. Cyber Phys. Syst. 8(2): 11 (2024) - [j253]Jin Han, Yun-Feng Ren, Alessandro Brighente, Mauro Conti:
RANGO: A Novel Deep Learning Approach to Detect Drones Disguising from Video Surveillance Systems. ACM Trans. Intell. Syst. Technol. 15(2): 31:1-31:21 (2024) - [j252]Mohamed A. El-Zawawy, Chhagan Lal, Mauro Conti:
A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 25(2): 2017-2033 (2024) - [j251]Yanan Zhao, Haiyang Yu, Yuhao Liang, Mauro Conti, Wael Bazzi, Yilong Ren:
A Sanitizable Access Control With Policy-Protection for Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 25(3): 2956-2965 (2024) - [j250]Yanan Zhao, Haiyang Yu, Yuhao Liang, Alessandro Brighente, Mauro Conti, Jianfei Sun, Yilong Ren:
Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon. IEEE Trans. Intell. Transp. Syst. 25(5): 3671-3684 (2024) - [j249]Meng Li, Yanzhe Shen, Guixin Ye, Jialing He, Xin Zheng, Zijian Zhang, Liehuang Zhu, Mauro Conti:
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics. IEEE Trans. Knowl. Data Eng. 36(5): 1874-1888 (2024) - [j248]Amit Kumar Singh, Deepa Kundur, Mauro Conti:
Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of Things. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 151:1-151:4 (2024) - [j247]Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, A. Selcuk Uluagac:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. IEEE Trans. Serv. Comput. 17(1): 18-29 (2024) - [j246]Meng Li, Jianbo Gao, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti:
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud. IEEE Trans. Serv. Comput. 17(3): 1239-1251 (2024) - [j245]Miao He, Jianbing Ni, Meng Li, Alessandro Brighente, Mauro Conti:
Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach. IEEE Trans. Wirel. Commun. 23(1): 276-289 (2024) - [j244]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Joel J. P. C. Rodrigues:
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments. Veh. Commun. 48: 100787 (2024) - [c303]Matteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman K. A., Mauro Conti:
SoK: Visualization-based Malware Detection Techniques. ARES 2024: 45:1-45:13 - [c302]Meng Li, Hanni Ding, Qing Wang, Zijian Zhang, Mauro Conti:
Threshold Signatures with Private Accountability via Secretly Designated Witnesses. ACISP (1) 2024: 389-407 - [c301]Alessandro Brighente, Mauro Conti, Sitora Salaeva, Federico Turrin:
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection. ACNS Workshops (2) 2024: 55-74 - [c300]Edoardo Liberati, Alessandro Visintin, Riccardo Lazzeretti, Mauro Conti, A. Selcuk Uluagac:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. ACNS (1) 2024: 183-210 - [c299]Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik:
Acoustic Side-Channel Attacks on a Computer Mouse. DIMVA 2024: 44-63 - [c298]Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. DIMVA 2024: 503-524 - [c297]Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. ESORICS (1) 2024: 374-393 - [c296]Mirco Beltrame, Mauro Conti, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. ESORICS (2) 2024: 451-470 - [c295]Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. EuroS&P Workshops 2024: 352-360 - [c294]Francesco Marchiori, Alessandro Brighente, Mauro Conti:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? EuroS&P Workshops 2024: 367-372 - [c293]Filippo Giambartolomei, Marc Barcelo, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. ICC 2024: 702-707 - [c292]Meng Li, Jianbo Gao, Zijian Zhang, Mauro Conti, Mamoun Alazab:
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets. ICC 2024: 1376-1381 - [c291]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. ICC 2024: 1939-1944 - [c290]Alessandro Brighente, Saiqin Xu, Simone Soderi, Mauro Conti:
Physical Layer Authentication for Distributed RIS (DRIS) Enabled VLC Systems. ICC 2024: 3340-3345 - [c289]Harsha Vasudev, Mohd Shariq, Sanjeev Kumar Dwivedi, Mauro Conti:
LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles. ICDCN 2024: 209-216 - [c288]Mauro Conti:
Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies. ICISSP 2024: 7 - [c287]Pier Paolo Tricomi, Saurabh Kumar, Mauro Conti, V. S. Subrahmanian:
Climbing the Influence Tiers on TikTok: A Multimodal Study. ICWSM 2024: 1503-1516 - [c286]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. NetSoft 2024: 185-189 - [c285]Kavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran:
CANLP: NLP-Based Intrusion Detection System for CAN. SAC 2024: 212-214 - [c284]Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang:
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors. USENIX Security Symposium 2024 - [c283]Marco Palazzo, Florine W. Dekker, Alessandro Brighente, Mauro Conti, Zekeriya Erkin:
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries. USENIX Security Symposium 2024 - [c282]Christina Kreza, Stefanos Koffas, Behrad Tajalli, Mauro Conti, Stjepan Picek:
Backdoors on Manifold Learning. WiseML@WiSec 2024: 1-7 - [c281]Francesco Marchiori, Mauro Conti:
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. WiseML@WiSec 2024: 8-13 - [c280]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models. WiseML@WiSec 2024: 14-19 - [c279]Tommaso Bianchi, Alessandro Brighente, Mauro Conti:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. WISEC 2024: 174-184 - [c278]Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti:
"All of Me": Mining Users' Attributes from their Public Spotify Playlists. WWW (Companion Volume) 2024: 963-966 - [c277]Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. WWW 2024: 1712-1723 - [e16]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14344, Springer 2024, ISBN 978-3-031-50593-5 [contents] - [e15]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14345, Springer 2024, ISBN 978-3-031-51475-3 [contents] - [e14]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14346, Springer 2024, ISBN 978-3-031-51478-4 [contents] - [e13]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14347, Springer 2024, ISBN 978-3-031-51481-4 [contents] - [i168]K. M. Sameera, Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P, Mauro Conti:
Privacy-Preserving in Blockchain-based Federated Learning Systems. CoRR abs/2401.03552 (2024) - [i167]Alessandro Lotto, Francesco Marchiori, Alessandro Brighente, Mauro Conti:
A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols. CoRR abs/2401.10736 (2024) - [i166]Pier Paolo Tricomi, Luca Pajola, Luca Pasa, Mauro Conti:
"All of Me": Mining Users' Attributes from their Public Spotify Playlists. CoRR abs/2401.14296 (2024) - [i165]Carlo Mazzocca, Abbas Acar, A. Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, Mauro Conti:
A Survey on Decentralized Identifiers and Verifiable Credentials. CoRR abs/2402.02455 (2024) - [i164]Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. CoRR abs/2402.03114 (2024) - [i163]Filippo Giambartolomei, Marc Barceló Lladó, Alessandro Brighente, Aitor Urbieta, Mauro Conti:
Penetration Testing of 5G Core Network Web Technologies. CoRR abs/2403.01871 (2024) - [i162]Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti:
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks. CoRR abs/2403.02983 (2024) - [i161]Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. CoRR abs/2403.03858 (2024) - [i160]Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti:
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. CoRR abs/2403.17494 (2024) - [i159]Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. CoRR abs/2404.02832 (2024) - [i158]Francesco Marchiori, Mauro Conti:
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems. CoRR abs/2404.04648 (2024) - [i157]Denis Donadel, Francesco Marchiori, Luca Pajola, Mauro Conti:
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator. CoRR abs/2404.12689 (2024) - [i156]Mirco Beltrame, Mauro Conti, Pierpaolo Guglielmin, Francesco Marchiori, Gabriele Orazi:
RedactBuster: Entity Type Recognition from Redacted Documents. CoRR abs/2404.12991 (2024) - [i155]Alberto Castagnaro, Mauro Conti, Luca Pajola:
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models. CoRR abs/2404.14138 (2024) - [i154]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. CoRR abs/2405.01888 (2024) - [i153]Francesco Marchiori, Alessandro Brighente, Mauro Conti:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? CoRR abs/2405.08466 (2024) - [i152]Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. CoRR abs/2405.12076 (2024) - [i151]Jahez Abraham Johny, Vinod P., K. A. Asmitha, Radhamani G, Rafidha Rehiman K. A., Mauro Conti:
Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features. CoRR abs/2405.14311 (2024) - [i150]Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Vinod P:
SeCTIS: A Framework to Secure CTI Sharing. CoRR abs/2406.14102 (2024) - [i149]Saverio Cavasin, Daniele Mari, Simone Milani, Mauro Conti:
Fingerprint Membership and Identity Inference Against Generative Adversarial Networks. CoRR abs/2406.15253 (2024) - [i148]Tommaso Bianchi, Alessandro Brighente, Mauro Conti, Andrea Valori:
Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data. CoRR abs/2407.00585 (2024) - [i147]Alessandro Brighente, Mauro Conti, Matthijs Schotsman, Savio Sciancalepore:
Obfuscated Location Disclosure for Remote ID Enabled Drones. CoRR abs/2407.14256 (2024) - [i146]Marco Simoni, Andrea Saracino, Vinod P., Mauro Conti:
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation. CoRR abs/2407.15748 (2024) - [i145]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. CoRR abs/2408.01178 (2024) - [i144]Jelle Vos, Mauro Conti, Zekeriya Erkin:
Depth-Aware Arithmetization of Common Primitives in Prime Fields. IACR Cryptol. ePrint Arch. 2024: 1200 (2024) - 2023
- [j243]Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini:
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality. IEEE Access 11: 9859-9875 (2023) - [j242]Hossein Ahmadvand, Chhagan Lal, Hadi Hemmati, Mehdi Sookhak, Mauro Conti:
Privacy-Preserving and Security in SDN-Based IoT: A Survey. IEEE Access 11: 44772-44786 (2023) - [j241]Alireza Dehlaghi-Ghadim, Ali Balador, Mahshid Helali Moghadam, Hans Hansson, Mauro Conti:
ICSSIM - A framework for building industrial control systems security testbeds. Comput. Ind. 148: 103906 (2023) - [j240]Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023) - [j239]Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti, Ruhul Amin, Shehzad Ashraf Chaudhry:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023) - [j238]Tayyab Ali Khan, Karan Singh, Mohd Shariq, Khaleel Ahmad, K. S. Savita, Ali Ahmadian, Soheil Salahshour, Mauro Conti:
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. Comput. Commun. 209: 217-229 (2023) - [j237]Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues:
COUNT: Blockchain framework for resource accountability in e-healthcare. Comput. Commun. 209: 249-259 (2023) - [j236]Mohamed A. El-Zawawy, Pallavi Kaliyar, Mauro Conti, Sokratis K. Katsikas:
Honey-list based authentication protocol for industrial IoT swarms. Comput. Commun. 211: 239-253 (2023) - [j235]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng:
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things. Comput. Secur. 132: 103315 (2023) - [j234]Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(4): 2427-2455 (2023) - [j233]Ankur O. Bang, Udai Pratap Rao, Pallavi Kaliyar, Mauro Conti:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 55(2): 44:1-44:36 (2023) - [j232]Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap:
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 160-185 (2023) - [j231]Reza Mohammadi, Chhagan Lal, Mauro Conti:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. Int. J. Inf. Sec. 22(2): 367-379 (2023) - [j230]Zhihao Wang, Ding Ding, Min Ren, Mauro Conti:
TANGO: A temporal spatial dynamic graph model for event prediction. Neurocomputing 542: 126249 (2023) - [j229]Amina Zahoor, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Muhammad Faizan Ayub, Mauro Conti, Ashok Kumar Das:
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF. Internet Things 22: 100708 (2023) - [j228]Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas:
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT. IEEE Internet Things J. 10(18): 16480-16493 (2023) - [j227]Jennifer Bellizzi, Eleonora Losiouk, Mauro Conti, Christian Colombo, Mark Vella:
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. J. Cybersecur. Priv. 3(3): 364-395 (2023) - [j226]Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Turning captchas against humanity: Captcha-based attacks in online social media. Online Soc. Networks Media 36: 100252 (2023) - [j225]