Titolo |
Pubblicato in |
Anno |
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices |
Lecture Notes in Computer Science |
2024 |
Do you Trust your Device? Open Challenges in IoT Security Analysis |
Proceedings of the International Conference on Security and Cryptography |
2024 |
Is AI a Trick or T(h)reat for Securing Programmable Data Planes? |
IEEE NETWORK |
2024 |
With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces |
IEEE SECURITY & PRIVACY |
2024 |
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones |
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS |
2024 |
A survey on security and privacy issues of UAVs |
COMPUTER NETWORKS |
2023 |
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey |
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS |
2023 |
GNN4IFA: Interest Flooding Attack Detection with Graph Neural Networks |
IEEE 8th European Symposium on Security and Privacy (EuroS&P) |
2023 |
A comprehensive security and performance assessment of UAV authentication schemes |
SECURITY AND PRIVACY |
2023 |
Anonymous Federated Learning via Named-Data Networking |
FUTURE GENERATION COMPUTER SYSTEMS |
2023 |
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices |
IEEE SECURITY & PRIVACY |
2023 |
FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns |
International Workshop on Visualization for Cyber Security |
2023 |
Sim2Testbed Transfer: NDN Performance Evaluation |
Proceedings of the 17th International Conference on Availability, Reliability and Security |
2022 |
ICN PATTA: ICN Privacy Attack Through Traffic Analysis |
2021 IEEE 46th Conference on Local Computer Networks (LCN) |
2021 |
Bloom Filter based Collective Remote Attestation for Dynamic Networks |
ARES 2021: The 16th International Conference on Availability, Reliability and Security |
2021 |
Introduction to the special issue on security and privacy for connected cyber-physical systems |
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS |
2021 |
dAPTaset: A Comprehensive Mapping of APT-Related Data |
Computer Security |
2020 |
Malware triage for early identification of Advanced Persistent Threat activities |
DIGITAL THREATS |
2020 |
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges |
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS |
2020 |
Semba: Secure multi-biometric authentication |
IET BIOMETRICS |
2019 |