default search action
Walter Tiberti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Zeeshan Ali, Walter Tiberti, Andrea Marotta, Dajana Cassioli:
Empowering Network Security: BERT Transformer Learning Approach and MLP for Intrusion Detection in Imbalanced Network Traffic. IEEE Access 12: 137618-137633 (2024) - [j4]Carlo Centofanti, Walter Tiberti, Andrea Marotta, Fabio Graziosi, Dajana Cassioli:
Taming latency at the edge: A user-aware service placement approach. Comput. Networks 247: 110444 (2024) - [c10]Federica Caruso, Sara Peretti, Walter Tiberti, Dajana Cassioli, Tania Di Mascio:
CyberChallenge.IT@UnivAQ: A Cybersecurity Educational Training Path for High School and University Students. MIS4TEL 2024: 289-301 - 2023
- [c9]Carlo Centofanti, Walter Tiberti, Andrea Marotta, Fabio Graziosi, Dajana Cassioli:
Latency-Aware Kubernetes Scheduling for Microservices Orchestration at the Edge. NetSoft 2023: 426-431 - 2022
- [c8]Walter Tiberti, Eleonora Di Fina, Andrea Marotta, Dajana Cassioli:
Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface. FNWF 2022: 367-372 - 2021
- [j3]Walter Tiberti, Dajana Cassioli, Antinisca Di Marco, Luigi Pomante, Marco Santic:
A Model-Based Approach for Adaptable Middleware Evolution in WSN Platforms. J. Sens. Actuator Networks 10(1): 20 (2021) - [j2]Joseba Andoni Agirre, Leire Etxeberria, Raul Barbosa, Stylianos Basagiannis, Georgios Giantamidis, Thomas Bauer, Enrico Ferrari, Mikel Labayen Esnaola, Vanessa Orani, Johnny Öberg, David Pereira, José Proença, Rupert Schlick, Ales Smrcka, Walter Tiberti, Stefano Tonetta, Marco Bozzano, Ahmet Yazici, Behrooz Sangchoolie:
The VALU3S ECSEL project: Verification and validation of automated systems safety and security. Microprocess. Microsystems 87: 104349 (2021) - 2020
- [j1]Walter Tiberti, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci:
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks. Int. J. Distributed Sens. Networks 16(10): 155014772095167 (2020) - [c7]Walter Tiberti, Alessio Carmenini, Luigi Pomante, Dajana Cassioli:
A Lightweight Blockchain-based Technique for Anti-Tampering in Wireless Sensor Networks. DSD 2020: 577-582 - [c6]Luigi Pomante, Marco Pugliese, Luciano Bozzi, Walter Tiberti, D. Grimani, Fortunato Santucci:
SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15.4 WSN Applications. DSD 2020: 588-595 - [c5]Walter Tiberti, Bruno Vieira, Harrison Kurunathan, Ricardo Severino, Eduardo Tovar:
Tightening Up Security In Low Power Deterministic Networks. WFCS 2020: 1-7
2010 – 2019
- 2018
- [c4]Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti:
TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks. CS2@HiPEAC 2018: 13-16 - [c3]Vittorio Cortellessa, Antinisca Di Marco, Daniele Di Pompeo, Francesco Gallo, Stefano Pace, Luigi Pomante, Walter Tiberti:
Energy-Driven Reconfiguration of Applications for Wireless Sensor Networks. ICPE Companion 2018: 79-84 - 2016
- [c2]Lorenzo Corradetti, Daniele Gregori, Stefano Marchesani, Luigi Pomante, Marco Santic, Walter Tiberti:
A renovated mobile agents middleware for WSN porting of Agilla to the TinyOS 2.x platform. RTSI 2016: 1-5 - 2015
- [c1]Luca Berardinelli, Antinisca Di Marco, Stefano Pace, Luigi Pomante, Walter Tiberti:
Energy Consumption Analysis and Design of Energy-Aware WSN Agents in fUML. ECMFA 2015: 1-17
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-15 21:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint