


Остановите войну!
for scientists:


default search action
Mauro Conti
Person information

- affiliation: University of Padua, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j240]Pier Paolo Tricomi
, Federica Nenna
, Luca Pajola
, Mauro Conti
, Luciano Gamberi:
You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality. IEEE Access 11: 9859-9875 (2023) - [j239]Hossein Ahmadvand
, Chhagan Lal
, Hadi Hemmati, Mehdi Sookhak
, Mauro Conti
:
Privacy-Preserving and Security in SDN-Based IoT: A Survey. IEEE Access 11: 44772-44786 (2023) - [j238]Alireza Dehlaghi-Ghadim
, Ali Balador
, Mahshid Helali Moghadam
, Hans Hansson
, Mauro Conti
:
ICSSIM - A framework for building industrial control systems security testbeds. Comput. Ind. 148: 103906 (2023) - [j237]Yassine Mekdad
, Ahmet Aris
, Leonardo Babun
, Abdeslam El Fergougui
, Mauro Conti
, Riccardo Lazzeretti
, A. Selcuk Uluagac
:
A survey on security and privacy issues of UAVs. Comput. Networks 224: 109626 (2023) - [j236]Anand Kumar, Karan Singh, Mohd Shariq, Chhagan Lal, Mauro Conti
, Ruhul Amin, Shehzad Ashraf Chaudhry
:
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput. Commun. 205: 147-157 (2023) - [j235]Tayyab Ali Khan, Karan Singh, Mohd Shariq, Khaleel Ahmad, K. S. Savita, Ali Ahmadian, Soheil Salahshour, Mauro Conti
:
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. Comput. Commun. 209: 217-229 (2023) - [j234]Gulshan Kumar
, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues
:
COUNT: Blockchain framework for resource accountability in e-healthcare. Comput. Commun. 209: 249-259 (2023) - [j233]Mohamed A. El-Zawawy
, Pallavi Kaliyar, Mauro Conti
, Sokratis K. Katsikas
:
Honey-list based authentication protocol for industrial IoT swarms. Comput. Commun. 211: 239-253 (2023) - [j232]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti
, Xiaochun Cheng
:
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things. Comput. Secur. 132: 103315 (2023) - [j231]Ankur O. Bang
, Udai Pratap Rao
, Pallavi Kaliyar
, Mauro Conti
:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 55(2): 44:1-44:36 (2023) - [j230]Yazeed Alrowaili
, Neetesh Saxena
, Anurag Srivastava, Mauro Conti
, Pete Burnap:
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 160-185 (2023) - [j229]Reza Mohammadi, Chhagan Lal, Mauro Conti
:
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN. Int. J. Inf. Sec. 22(2): 367-379 (2023) - [j228]Zhihao Wang, Ding Ding, Min Ren, Mauro Conti
:
TANGO: A temporal spatial dynamic graph model for event prediction. Neurocomputing 542: 126249 (2023) - [j227]Amina Zahoor, Khalid Mahmood
, Salman Shamshad, Muhammad Asad Saleem, Muhammad Faizan Ayub, Mauro Conti
, Ashok Kumar Das
:
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF. Internet Things 22: 100708 (2023) - [j226]Rekha Goyat
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Rahul Saha
, Reji Thomas:
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT. IEEE Internet Things J. 10(18): 16480-16493 (2023) - [j225]Mauro Conti
, Luca Pajola, Pier Paolo Tricomi
:
Turning captchas against humanity: Captcha-based attacks in online social media. Online Soc. Networks Media 36: 100252 (2023) - [j224]Matteo Cardaioli, Mauro Conti
, Gabriele Orazi, Pier Paolo Tricomi
, Gene Tsudik:
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication. Pervasive Mob. Comput. 92: 101801 (2023) - [j223]Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti:
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning. Proc. Priv. Enhancing Technol. 2023(1): 140-157 (2023) - [j222]Anas Alsoliman
, Giulio Rigoni
, Davide Callegaro
, Marco Levorato
, Cristina M. Pinotti
, Mauro Conti
:
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. ACM Trans. Cyber Phys. Syst. 7(2): 12:1-12:29 (2023) - [j221]Gabriele Etta
, Matteo Cinelli
, Alessandro Galeazzi
, Carlo Michele Valensise
, Walter Quattrociocchi
, Mauro Conti
:
Comparing the Impact of Social Media Regulations on News Consumption. IEEE Trans. Comput. Soc. Syst. 10(3): 1252-1262 (2023) - [j220]Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
, Donghui Hu
:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 20(1): 225-241 (2023) - [j219]Simone Soderi
, Riccardo Colelli
, Federico Turrin
, Federica Pascucci
, Mauro Conti
:
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming. IEEE Trans. Dependable Secur. Comput. 20(3): 2274-2288 (2023) - [j218]Meng Li
, Yifei Chen
, Chhagan Lal
, Mauro Conti
, Fabio Martinelli, Mamoun Alazab
:
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts. IEEE Trans. Dependable Secur. Comput. 20(4): 2849-2866 (2023) - [j217]Meng Li
, Yifei Chen, Liehuang Zhu
, Zijian Zhang
, Jianbing Ni
, Chhagan Lal
, Mauro Conti
:
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems. IEEE Trans. Dependable Secur. Comput. 20(4): 3002-3018 (2023) - [j216]Alessandro Brighente
, Mauro Conti
, Radha Poovendran, Jianying Zhou:
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems. IEEE Trans. Ind. Informatics 19(6): 7801 (2023) - [j215]Ehsan Nowroozi
, Abhishek
, Mohammadreza Mohammadi
, Mauro Conti
:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. IEEE Trans. Netw. Serv. Manag. 20(2): 1332-1344 (2023) - [j214]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. IEEE Trans. Netw. Serv. Manag. 20(2): 1775-1789 (2023) - [j213]Ehsan Nowroozi
, Mohammadreza Mohammadi
, Erkay Savas, Yassine Mekdad, Mauro Conti
:
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. IEEE Trans. Netw. Serv. Manag. 20(2): 2096-2105 (2023) - [j212]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Reji Thomas
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. IEEE Trans. Serv. Comput. 16(2): 900-912 (2023) - [j211]Saiqin Xu
, Alessandro Brighente
, Baixiao Chen
, Mauro Conti
, Xiancheng Cheng, Dongchen Zhu:
Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios. IEEE Trans. Veh. Technol. 72(4): 4683-4696 (2023) - [j210]Meng Li
, Jianbo Gao
, Zijian Zhang
, Liehuang Zhu
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion. IEEE Trans. Veh. Technol. 72(4): 5139-5151 (2023) - [j209]Subir Halder
, Amrita Ghosal
, Mauro Conti
:
Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks. IEEE Trans. Wirel. Commun. 22(2): 1014-1028 (2023) - [j208]Sanaz Soltani
, Mohammad Shojafar
, Alessandro Brighente
, Mauro Conti
, Rahim Tafazolli
:
Poisoning Bearer Context Migration in O-RAN 5G Network. IEEE Wirel. Commun. Lett. 12(3): 401-405 (2023) - [j207]Saurabh Rana, Dheerendra Mishra, Chhagan Lal, Mauro Conti
:
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing. Wirel. Pers. Commun. 131(2): 1295-1312 (2023) - [c271]Francesco Marchiori
, Mauro Conti
, Nino Vincenzo Verde
:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. ARES 2023: 3:1-3:11 - [c270]Riccardo Cestaro
, Mauro Conti
, Elonora Mancini
, Federico Turrin
:
OpenScope-sec: An ADS-B Simulator to Support the Security Research. ARES 2023: 116:1-116:6 - [c269]Sara Bardi, Mauro Conti
, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages. ACNS (1) 2023: 309-336 - [c268]Federico Carboni
, Mauro Conti
, Denis Donadel
, Mariano Sciacco
:
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. ACNS Workshops 2023: 553-570 - [c267]Francesco Marchiori
, Mauro Conti
:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. CCS 2023: 105-119 - [c266]Marco Arazzi
, Mauro Conti
, Antonino Nocera
, Stjepan Picek
:
Turning Privacy-preserving Mechanisms against Federated Learning. CCS 2023: 1482-1495 - [c265]Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti
:
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2. CODASPY 2023: 27-38 - [c264]Ko Zheng Teng
, Trupil Limbasiya
, Federico Turrin
, Yan Lin Aung
, Sudipta Chattopadhyay
, Jianying Zhou
, Mauro Conti
:
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems. CPSS@AsiaCCS 2023: 3-13 - [c263]Andrea Agiollo, Enkeleda Bardhi
, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini:
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. EuroS&P 2023: 615-630 - [c262]Samaneh Mohammadi, Mohammadreza Mohammadi
, Sima Sinaei, Ali Balador, Ehsan Nowroozi, Francesco Flammini, Mauro Conti:
Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition. FedCSIS 2023: 191-199 - [c261]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti
:
Going in Style: Audio Backdoors Through Stylistic Transformations. ICASSP 2023: 1-5 - [c260]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [c259]Emilie Bout, Valentin Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì:
Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks. ICC 2023: 5210-5215 - [c258]Pier Paolo Tricomi, Sousan Tarahomi, Christian Cattai, Francesco Martini, Mauro Conti:
Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training. ICCCN 2023: 1-10 - [c257]Riccardo Spolaor, Hao Liu, Federico Turrin, Mauro Conti
, Xiuzhen Cheng:
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. INFOCOM 2023: 1-10 - [c256]Marco Alecci
, Luca Attanasio
, Alessandro Brighente
, Mauro Conti
, Eleonora Losiouk
, Hideki Ochiai
, Federico Turrin
:
Beware of Pickpockets: A Practical Attack against Blocking Cards. RAID 2023: 195-206 - [c255]Marco Alecci
, Mauro Conti
, Francesco Marchiori
, Luca Martinelli
, Luca Pajola
:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. RAID 2023: 315-329 - [c254]Nicholas Boucher
, Luca Pajola
, Ilia Shumailov
, Ross J. Anderson
, Mauro Conti
:
Boosting Big Brother: Attacking Search Engines with Encodings. RAID 2023: 700-713 - [c253]Alessandro Brighente, Mauro Conti, Giacomo Peruzzi
, Alessandro Pozzebon:
ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning. SAS 2023: 1-6 - [c252]Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, D. Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. SECRYPT 2023: 324-334 - [c251]Francesco Luigi De Faveri
, Luca Cosuti
, Pier Paolo Tricomi
, Mauro Conti
:
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections. SocialSec 2023: 38-57 - [c250]Tommaso Bianchi, Surudhi Asokraj, Alessandro Brighente, Mauro Conti
, Radha Poovendran:
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer. VTC2023-Spring 2023: 1-6 - [c249]Pier Paolo Tricomi
, Marco Chilese
, Mauro Conti
, Ahmad-Reza Sadeghi
:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. WebSci 2023: 346-356 - [c248]Alessandro Visintin, Mauro Conti:
Leveraging Social Networks for Mergers and Acquisitions Forecasting. WISE 2023: 144-159 - [c247]Marco Casagrande
, Riccardo Cestaro
, Eleonora Losiouk
, Mauro Conti
, Daniele Antonioli
:
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. WISEC 2023: 85-95 - [c246]Alessandro Lotto
, Vaibhav Singh
, Bhaskar Ramasubramanian
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. WISEC 2023: 133-144 - [c245]Elisa Sartori
, Luca Pajola
, Giovanni Da San Martino
, Mauro Conti
:
The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum. WWW 2023: 4060-4064 - [d5]Riccardo Spolaor
, Hao Liu, Federico Turrin
, Mauro Conti
, Xiuzhen Cheng:
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. Zenodo, 2023 - [i139]Alessandro Brighente, Mauro Conti, Denis Donadel
, Radha Poovendran, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023) - [i138]Serena Tardelli, Leonardo Nizzoli, Maurizio Tesconi, Mauro Conti, Preslav Nakov, Giovanni Da San Martino, Stefano Cresci:
Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence. CoRR abs/2301.06774 (2023) - [i137]Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi:
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms. CoRR abs/2301.06815 (2023) - [i136]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. CoRR abs/2302.08992 (2023) - [i135]Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. CoRR abs/2303.09999 (2023) - [i134]Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti:
Cryptocurrency wallets: assessment and security. CoRR abs/2303.12940 (2023) - [i133]Marco Venturini, Francesco Freda, Emanuele Miotto, Alberto Giaretta, Mauro Conti:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. CoRR abs/2303.17351 (2023) - [i132]Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi:
Social Honeypot for Humans: Luring People through Self-managed Instagram Pages. CoRR abs/2303.17946 (2023) - [i131]Ehsan Nowroozi, Yoosef Habibi, Mauro Conti:
Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents. CoRR abs/2304.02982 (2023) - [i130]Nicholas Boucher
, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. CoRR abs/2304.14031 (2023) - [i129]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023) - [i128]Emad Efatinasab
, Francesco Marchiori, Denis Donadel, Alessandro Brighente, Mauro Conti:
GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems. CoRR abs/2306.05923 (2023) - [i127]Francesco Luigi De Faveri, Luca Cosuti, Pier Paolo Tricomi, Mauro Conti:
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections. CoRR abs/2306.07183 (2023) - [i126]Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. CoRR abs/2306.15363 (2023) - [i125]Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado Aaron Visaggio, Mauro Conti:
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? CoRR abs/2306.16087 (2023) - [i124]Fatemeh Najafi, Masoud Kaveh, Mohammad Reza Mosavi, Alessandro Brighente, Mauro Conti:
EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks. CoRR abs/2307.09968 (2023) - [i123]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023) - [i122]Francesco Marchiori, Mauro Conti:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. CoRR abs/2309.03607 (2023) - [i121]Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin:
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments. CoRR abs/2309.06077 (2023) - [i120]Ankit Gangwal, Aashish Paliwal, Mauro Conti:
De-authentication using Ambient Light Sensor. CoRR abs/2309.12220 (2023) - [i119]Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. CoRR abs/2310.02655 (2023) - [i118]Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek:
Invisible Threats: Backdoor Attack in OCR Systems. CoRR abs/2310.08259 (2023) - [i117]Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., P. Vinod, Mauro Conti:
NLP-Based Techniques for Cyber Threat Intelligence. CoRR abs/2311.08807 (2023) - [i116]Giuseppe Cascavilla, Gemma Catolino, Mauro Conti, D. Mellios, Damian A. Tamburri:
When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning. CoRR abs/2311.17026 (2023) - 2022
- [j206]Fran Casino
, Thomas K. Dasaklis, Georgios P. Spathoulas
, Marios Anagnostopoulos
, Amrita Ghosal
, István Böröcz, Agusti Solanas
, Mauro Conti
, Constantinos Patsakis
:
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 10: 25464-25493 (2022) - [j205]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey. IEEE Access 10: 121173-121192 (2022) - [j204]Reza Mohammadi, Chhagan Lal
, Mauro Conti
, Lokesh Sharma:
Software defined network-based HTTP flooding attack defender. Comput. Electr. Eng. 101: 108019 (2022) - [j203]PLS Jayalaxmi, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim, Reji Thomas:
DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102: 108214 (2022) - [j202]Mauro Conti
, Jenil Gathani, Pier Paolo Tricomi:
Virtual Influencers in Online Social Media. IEEE Commun. Mag. 60(8): 86-91 (2022) - [j201]Mohamed A. El-Zawawy
, Alessandro Brighente
, Mauro Conti
:
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. Comput. Networks 206: 108804 (2022) - [j200]Mauro Conti
, Eleonora Losiouk
, Radha Poovendran, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [j199]Jamshid Pirayesh, Alberto Giaretta, Mauro Conti
, Parviz Keshavarzi:
A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Comput. Networks 216: 109077 (2022) - [j198]Mohd Shariq, Karan Singh, Chhagan Lal
, Mauro Conti
, Tayyab Ali Khan:
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags. Comput. Networks 217: 109360 (2022) - [j197]Amrita Ghosal
, Subir Halder, Mauro Conti
:
Secure over-the-air software update for connected vehicles. Comput. Networks 218: 109394 (2022) - [j196]Federico Tavella
, Alberto Giaretta
, Mauro Conti
, Sasitharan Balasubramaniam
:
A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Comput. Commun. 187: 59-70 (2022) - [j195]Vasilios Koutsokostas, Nikolaos Lykousas
, Theodoros Apostolopoulos, Gabriele Orazi, Amrita Ghosal, Fran Casino, Mauro Conti
, Constantinos Patsakis:
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents. Comput. Secur. 114: 102582 (2022) - [j194]Mauro Conti
, Shubham Khandhar, Vinod P.:
A few-shot malware classification approach for unknown family recognition using malware feature visualization. Comput. Secur. 122: 102887 (2022) - [j193]Ankur O. Bang
, Udai Pratap Rao
, Andrea Visconti, Alessandro Brighente, Mauro Conti
:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Comput. Secur. 123: 102914 (2022) - [j192]Mohamed A. El-Zawawy
, Parvez Faruki, Mauro Conti
:
Formal model for inter-component communication and its security in android. Computing 104(8): 1839-1865 (2022) - [j191]Alakesh Kalita
, Alessandro Brighente
, Manas Khatua
, Mauro Conti
:
Effect of DIS Attack on 6TiSCH Network Formation. IEEE Commun. Lett. 26(5): 1190-1193 (2022) - [j190]Milad Taleby Ahvanooey
, Mark Xuefang Zhu
, Qianmu Li
, Wojciech Mazurczyk
, Kim-Kwang Raymond Choo
, Brij Bhooshan Gupta
, Mauro Conti
:
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey. IEEE Internet Things J. 9(10): 7639-7663 (2022) - [j189]Rekha Goyat
, Gulshan Kumar
, Mamoun Alazab
, Mauro Conti
, Mritunjay Kumar Rai
, Reji Thomas
, Rahul Saha
, Tai-Hoon Kim
:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - [j188]Mauro Conti
, P. Vinod, Alessio Vitella
:
Obfuscation detection in Android applications using deep learning. J. Inf. Secur. Appl. 70: 103311 (2022) - [j187]Milad Taleby Ahvanooey
,