default search action
Roberto Di Pietro
Person information
- affiliation: HBKU-CSE, Hamad Bin Khalifa University - College of Science and Engineering, Doha, Qatar
- affiliation (former): Roma Tre University, Rome, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e12]Markulf Kohlweiss, Roberto Di Pietro, Alastair R. Beresford:
Cryptology and Network Security - 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14905, Springer 2025, ISBN 978-981-97-8012-9 [contents] - [e11]Markulf Kohlweiss, Roberto Di Pietro, Alastair R. Beresford:
Cryptology and Network Security - 23rd International Conference, CANS 2024, Cambridge, UK, September 24-27, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14906, Springer 2025, ISBN 978-981-97-8015-0 [contents] - 2024
- [b3]Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro:
Physical Layer Security in Power Line Communications - Fundamentals, Models and Applications. Advances in Information Security 108, Springer 2024, ISBN 978-3-031-57348-4, pp. 1-126 - [j115]Mouna Rabhi, Roberto Di Pietro:
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure. Comput. Commun. 218: 1-13 (2024) - [j114]Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro:
MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning. Comput. Secur. 143: 103905 (2024) - [j113]Zebo Yang, Haneen Alfauri, Behrooz Farkiani, Raj Jain, Roberto Di Pietro, Aiman Erbad:
A Survey and Comparison of Post-Quantum and Quantum Blockchains. IEEE Commun. Surv. Tutorials 26(2): 967-1002 (2024) - [j112]Mouna Rabhi, Spiridon Bakiras, Roberto Di Pietro:
Audio-deepfake detection: Adversarial attacks and countermeasures. Expert Syst. Appl. 250: 123941 (2024) - [j111]Tara Salman, Ali Ghubaish, Roberto Di Pietro, Mohamed Baza, Hani Alshahrani, Raj Jain, Kim-Kwang Raymond Choo:
CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in Security. IEEE Trans. Dependable Secur. Comput. 21(4): 3030-3047 (2024) - [c147]Maurantonio Caprolu, Roberto Di Pietro, Flavio Lombardi, Elia Onofri:
Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights. DAPPS 2024: 51-60 - [c146]Omar Adel Ibrahim, Roberto Di Pietro:
MAG-JAM: Jamming Detection via Magnetic Emissions. ESORICS (1) 2024: 167-186 - [i53]Maurantonio Caprolu, Roberto Di Pietro, Flavio Lombardi, Elia Onofri:
Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights. CoRR abs/2404.10543 (2024) - [i52]Zebo Yang, Haneen Alfauri, Behrooz Farkiani, Raj Jain, Roberto Di Pietro, Aiman Erbad:
A Survey and Comparison of Post-quantum and Quantum Blockchains. CoRR abs/2409.01358 (2024) - 2023
- [j110]Lubna Fayez Eliyan, Roberto Di Pietro:
DeMi: A Solution to Detect and Mitigate DoS Attacks in SDN. IEEE Access 11: 82477-82495 (2023) - [j109]Hussein A. Aly, Roberto Di Pietro:
PulseOblivion: An Effective Session-Based Continuous Authentication Scheme Using PPG Signals. IEEE Access 11: 124213-124227 (2023) - [j108]Aymen Omri, Javier Hernandez Fernandez, Roberto Di Pietro:
Extending device noise measurement capacity for OFDM-based PLC systems: Design, implementation, and on-field validation. Comput. Networks 237: 110038 (2023) - [j107]Andrea De Salve, Paolo Mori, Laura Ricci, Roberto Di Pietro:
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions. Comput. Commun. 203: 199-225 (2023) - [j106]Mohammed Al-Sadi, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
LENTO: Unpredictable Latency-based continuous authEntication for Network inTensive IoT envirOnments. Future Gener. Comput. Syst. 139: 151-166 (2023) - [j105]Eva Wisse, Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
A2RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones. IEEE Internet Things J. 10(12): 10587-10604 (2023) - [j104]Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles. IEEE Trans. Dependable Secur. Comput. 20(2): 1541-1558 (2023) - [j103]Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro:
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol. IEEE Trans. Dependable Secur. Comput. 20(3): 2500-2515 (2023) - [j102]Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro:
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning. IEEE Trans. Inf. Forensics Secur. 18: 274-289 (2023) - [c145]Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones. ACSAC 2023: 178-189 - [c144]Maurantonio Caprolu, Elmahdi Bentafat, Spiridon Bakiras, Roberto Di Pietro:
UBIC-A Blockchain-Less Cryptocurrency. DAPPS 2023: 23-30 - [c143]Hanaa Abbas, Maurantonio Caprolu, Roberto Di Pietro:
Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights. FC 2023: 259-275 - [c142]Ahmad Sani Bello, Jens Schneider, Roberto Di Pietro:
LLD: A Low Latency Detection Solution to Thwart Cryptocurrency Pump & Dumps. ICBC 2023: 1-9 - [c141]Maurantonio Caprolu, Roberto Di Pietro:
Account Clustering in the Polkadot Network: Heuristic, Experiments, and Insights. ICBC 2023: 1-4 - [c140]Maurantonio Caprolu, Alireza Sadighian, Roberto Di Pietro:
Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key Findings. ICCCN 2023: 1-10 - [c139]Ahmed Mahrous, Jens Schneider, Roberto Di Pietro:
The Role of Emojis in Sentiment Analysis of Financial Microblogs. IDSTA 2023: 76-84 - [c138]Aymen Omri, Javier Hernandez Fernandez, Roberto Di Pietro:
Subcarrier-Index Modulation for OFDM-based PLC Systems. ISCC 2023: 649-655 - [c137]Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro:
Performance Analysis of Physical Layer Security in Power Line Communication Networks. ISCC 2023: 777-782 - [c136]Aymen Omri, Javier Hernandez Fernandez, Roberto Di Pietro:
Secure and Successful Transmission Probability Analysis for PLC Networks. ISNCC 2023: 1-7 - [c135]Omar Adel Ibrahim, Roberto Di Pietro:
Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions. WISEC 2023: 305-316 - [i51]Stefano Cresci, Roberto Di Pietro, Angelo Spognardi, Maurizio Tesconi, Marinella Petrocchi:
Demystifying Misconceptions in Social Bots Research. CoRR abs/2303.17251 (2023) - [i50]Mouna Rabhi, Roberto Di Pietro:
Adversarial Attacks Neutralization via Data Set Randomization. CoRR abs/2306.12161 (2023) - [i49]Waqas Aman, Flavio Giorgi, Giulio Attenni, Saif Al-Kuwari, Elmehdi Illi, Marwa K. Qaraqe, Gaia Maselli, Roberto Di Pietro:
Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication. CoRR abs/2307.12643 (2023) - [i48]Abdulah Jarouf, Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro:
Inferring Power Grid Information with Power Line Communications: Review and Insights. CoRR abs/2308.10598 (2023) - 2022
- [j101]Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro:
Channel Impulse Response Multilevel Quantization for Power Line Communications. IEEE Access 10: 66113-66126 (2022) - [j100]Gabriele Oligeri, Savio Sciancalepore, Omar Adel Ibrahim, Roberto Di Pietro:
GPS spoofing detection via crowd-sourced information for connected vehicles. Comput. Networks 216: 109230 (2022) - [j99]Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
Satellite-based communications security: A survey of threats, solutions, and research challenges. Comput. Networks 216: 109246 (2022) - [j98]Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro:
Noise2Weight: On detecting payload weight from drones acoustic emissions. Future Gener. Comput. Syst. 134: 319-333 (2022) - [j97]Simone Raponi, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro:
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures. IEEE Secur. Priv. 20(3): 71-79 (2022) - [j96]Pietro Tedeschi, Kang Eun Jeon, James She, Simon Wong, Spiridon Bakiras, Roberto Di Pietro:
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons. IEEE Secur. Priv. 20(3): 91-100 (2022) - [j95]Roberto Di Pietro, Ni Trieu, Vincenzo Iovino:
COVID-19 and cybersecurity. IET Inf. Secur. 16(5): 321-323 (2022) - [j94]Eduard Marin, Diego Perino, Roberto Di Pietro:
Serverless computing: a security perspective. J. Cloud Comput. 11: 69 (2022) - [j93]Pietro Tedeschi, Gabriele Oligeri, Roberto Di Pietro:
Localization of a Power-Modulated Jammer. Sensors 22(2): 646 (2022) - [j92]Savio Sciancalepore, Pietro Tedeschi, Ahmed Aziz, Roberto Di Pietro:
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts. IEEE Trans. Dependable Secur. Comput. 19(4): 2709-2726 (2022) - [j91]Simone Raponi, Zeinab Khalifa, Gabriele Oligeri, Roberto Di Pietro:
Fake News Propagation: A Review of Epidemic Models, Datasets, and Insights. ACM Trans. Web 16(3): 12:1-12:34 (2022) - [c134]Hanaa Abbas, Maurantonio Caprolu, Roberto Di Pietro:
Analysis of Polkadot: Architecture, Internals, and Contradictions. Blockchain 2022: 61-70 - [c133]Omar Adel Ibrahim, Gabriele Oligeri, Roberto Di Pietro:
Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations. CNS 2022: 109-117 - [c132]Savio Sciancalepore, Simone Raponi, Daniele Caldarola, Roberto Di Pietro:
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal. ICICS 2022: 201-217 - [c131]Mouna Rabhi, Spiridon Bakiras, Roberto Di Pietro:
FN2: Fake News DetectioN Based on Textual and Contextual Features. ICICS 2022: 472-491 - [c130]Roberto Di Pietro:
Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead. SACMAT 2022: 1-2 - [c129]Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro:
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. SecureComm 2022: 130-149 - [c128]Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro:
MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions. WISEC 2022: 290-291 - [e10]David Megías, Roberto Di Pietro, Joaquín García-Alfaro:
EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022. ACM 2022, ISBN 978-1-4503-9603-5 [contents] - [e9]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13554, Springer 2022, ISBN 978-3-031-17139-0 [contents] - [e8]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13555, Springer 2022, ISBN 978-3-031-17145-1 [contents] - [e7]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13556, Springer 2022, ISBN 978-3-031-17142-0 [contents] - [i47]Roberto Di Pietro, Stefano Cresci:
Metaverse: Security and Privacy Issues. CoRR abs/2205.07590 (2022) - [i46]Andrea De Salve, Paolo Mori, Laura Ricci, Roberto Di Pietro:
Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions. CoRR abs/2206.03084 (2022) - [i45]Hanaa Abbas, Roberto Di Pietro:
Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions. CoRR abs/2207.02051 (2022) - [i44]Hanaa Abbas, Maurantonio Caprolu, Roberto Di Pietro:
Analysis of Polkadot: Architecture, Internals, and Contradictions. CoRR abs/2207.14128 (2022) - [i43]Maurantonio Caprolu, Alireza Sadighian, Roberto Di Pietro:
Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings. CoRR abs/2208.04903 (2022) - [i42]Eva Wisse, Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
A2RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones. CoRR abs/2210.11743 (2022) - 2021
- [b2]Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci:
New Dimensions of Information Warfare. Advances in Information Security 84, Springer 2021, ISBN 978-3-030-60617-6, pp. 1-226 - [j90]Christina Pöpper, Michail Maniatakos, Roberto Di Pietro:
Cyber security research in the Arab region: a blooming ecosystem with global ambitions. Commun. ACM 64(4): 96-101 (2021) - [j89]Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro:
IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-Enabled Architecture for Contact Tracing. IEEE Commun. Mag. 59(6): 82-88 (2021) - [j88]Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro:
Cryptomining makes noise: Detecting cryptojacking via Machine Learning. Comput. Commun. 171: 126-139 (2021) - [j87]Maurantonio Caprolu, Savio Sciancalepore, Roberto Di Pietro:
Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges. IEEE Commun. Surv. Tutorials 23(1): 311-340 (2021) - [j86]Isra Mohamed Ali, Maurantonio Caprolu, Roberto Di Pietro:
Foundations, Properties, and Security Applications of Puzzles: A Survey. ACM Comput. Surv. 53(4): 72:1-72:38 (2021) - [j85]Lubna Fayez Eliyan, Roberto Di Pietro:
DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges. Future Gener. Comput. Syst. 122: 149-171 (2021) - [j84]Savio Sciancalepore, Roberto Di Pietro:
PPRQ: Privacy-Preserving MAX/MIN Range Queries in IoT Networks. IEEE Internet Things J. 8(6): 5075-5092 (2021) - [j83]Savio Sciancalepore, Saeif Alhazbi, Roberto Di Pietro:
Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures. J. Netw. Comput. Appl. 174: 102892 (2021) - [j82]Savio Sciancalepore, Roberto Di Pietro:
SOS: Standard-Compliant and Packet Loss Tolerant Security Framework for ADS-B Communications. IEEE Trans. Dependable Secur. Comput. 18(4): 1681-1698 (2021) - [j81]Omar Adel Ibrahim, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro:
MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions. ACM Trans. Embed. Comput. Syst. 20(1): 8:1-8:26 (2021) - [j80]Andrea De Salve, Paolo Mori, Barbara Guidi, Laura Ricci, Roberto Di Pietro:
Predicting Influential Users in Online Social Network Groups. ACM Trans. Knowl. Discov. Data 15(3): 35:1-35:50 (2021) - [c127]Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles. ACSAC 2021: 207-218 - [c126]Maurantonio Caprolu, Matteo Pontecorvi, Matteo Signorini, Carlos Segarra, Roberto Di Pietro:
Analysis and Patterns of Unknown Transactions in Bitcoin. Blockchain 2021: 170-179 - [c125]Savio Sciancalepore, Pietro Tedeschi, Usman Riasat, Roberto Di Pietro:
Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access. CNS 2021: 10-18 - [c124]Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
Modelling a Communication Channel under Jamming: Experimental Model and Applications. ISPA/BDCloud/SocialCom/SustainCom 2021: 1562-1573 - [c123]Simone Raponi, Maurantonio Caprolu, Roberto Di Pietro:
Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions. ITASEC 2021: 394-405 - [c122]Roberto Di Pietro, Stefano Cresci:
Metaverse: Security and Privacy Issues. TPS-ISA 2021: 281-288 - [e6]Jorge Lobo, Roberto Di Pietro, Omar Chowdhury, Hongxin Hu:
SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021. ACM 2021, ISBN 978-1-4503-8365-3 [contents] - [e5]Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12382, Springer 2021, ISBN 978-3-030-68850-9 [contents] - [e4]Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12383, Springer 2021, ISBN 978-3-030-68883-7 [contents] - [i41]Pietro Tedeschi, Kang Eun Jeon, James She, Simon Wong, Spiridon Bakiras, Roberto Di Pietro:
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless BLE Beacons. CoRR abs/2103.06221 (2021) - [i40]Maurantonio Caprolu, Matteo Pontecorvi, Matteo Signorini, Carlos Segarra, Roberto Di Pietro:
A Novel Framework for the Analysis of Unknown Transactions in Bitcoin: Theory, Model, and Experimental Results. CoRR abs/2103.09459 (2021) - [i39]Eduard Marin, Diego Perino, Roberto Di Pietro:
Serverless Computing: A Security Perspective. CoRR abs/2107.03832 (2021) - [i38]Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges. CoRR abs/2112.11324 (2021) - 2020
- [j79]Pietro Tedeschi, Gabriele Oligeri, Roberto Di Pietro:
Leveraging Jamming to Help Drones Complete Their Mission. IEEE Access 8: 5049-5064 (2020) - [j78]Simone Raponi, Roberto Di Pietro:
A Longitudinal Study on Web-Sites Password Management (in)Security: Evidence and Remedies. IEEE Access 8: 52075-52090 (2020) - [j77]Matteo Signorini, Matteo Pontecorvi, Waël Kanoun, Roberto Di Pietro:
BAD: A Blockchain Anomaly Detection Solution. IEEE Access 8: 173481-173490 (2020) - [j76]Maurantonio Caprolu, Roberto Di Pietro, Simone Raponi, Savio Sciancalepore, Pietro Tedeschi:
Vessels Cybersecurity: Issues, Challenges, and the Road Ahead. IEEE Commun. Mag. 58(6): 90-96 (2020) - [j75]Savio Sciancalepore, Omar Adel Ibrahim, Gabriele Oligeri, Roberto Di Pietro:
PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis. Comput. Networks 168 (2020) - [j74]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Emergent properties, models, and laws of behavioral similarities within groups of twitter users. Comput. Commun. 150: 47-61 (2020) - [j73]Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges. IEEE Commun. Surv. Tutorials 22(4): 2658-2693 (2020) - [j72]Pietro Tedeschi, Savio Sciancalepore, Areej Eliyan, Roberto Di Pietro:
LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications. IEEE Internet Things J. 7(1): 621-638 (2020) - [j71]Andrea De Salve, Roberto Di Pietro, Paolo Mori, Laura Ricci:
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks. IEEE Trans. Dependable Secur. Comput. 17(1): 2-21 (2020) - [c121]Ahmed Aziz, Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
SecureAIS - Securing Pairwise Vessels Communications. CNS 2020: 1-9 - [c120]Maurantonio Caprolu, Stefano Cresci, Simone Raponi, Roberto Di Pietro:
New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies. CRiSIS 2020: 3-27 - [c119]Giovanni Da San Martino, Stefano Cresci, Alberto Barrón-Cedeño, Seunghak Yu, Roberto Di Pietro, Preslav Nakov:
A Survey on Computational Propaganda Detection. IJCAI 2020: 4826-4832 - [c118]Gabriele Oligeri, Savio Sciancalepore, Roberto Di Pietro:
GNSS spoofing detection via opportunistic IRIDIUM signals. WISEC 2020: 42-52 - [c117]Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro:
BrokenStrokes: on the (in)security of wireless keyboards. WISEC 2020: 231-241 - [i37]Maurantonio Caprolu, Savio Sciancalepore, Roberto Di Pietro:
Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges. CoRR abs/2001.02877 (2020) - [i36]Simone Raponi, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro:
Fridges on the Highway: Road Traffic Poisoning of Navigation Apps. CoRR abs/2002.05051 (2020) - [i35]Omar Adel Ibrahim, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro:
MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions. CoRR abs/2002.05905 (2020) - [i34]Maurantonio Caprolu, Roberto Di Pietro, Simone Raponi, Savio Sciancalepore, Pietro Tedeschi:
Vessels Cybersecurity: Issues, Challenges, and the Road Ahead. CoRR abs/2003.01991 (2020) - [i33]Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges. CoRR abs/2004.10394 (2020) - [i32]Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro:
Noise2Weight: On Detecting Payload Weight from Drones Acoustic Emissions. CoRR abs/2005.01347 (2020) - [i31]Gabriele Oligeri, Savio Sciancalepore, Roberto Di Pietro:
GNSS Spoofing Detection via Opportunistic IRIDIUM Signals. CoRR abs/2006.10284 (2020) - [i30]Giovanni Da San Martino, Stefano Cresci, Alberto Barrón-Cedeño, Seunghak Yu, Roberto Di Pietro, Preslav Nakov:
A Survey on Computational Propaganda Detection. CoRR abs/2007.08024 (2020) - [i29]Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro:
IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-enabled Architecture for Contact Tracing. CoRR abs/2007.11928 (2020) - [i28]Gabriele Oligeri, Simone Raponi, Savio Sciancalepore, Roberto Di Pietro:
PAST-AI: Physical-layer Authentication of Satellite Transmitters via Deep Learning. CoRR abs/2010.05470 (2020) - [i27]Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro:
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol. CoRR abs/2011.07306 (2020)
2010 – 2019
- 2019
- [j70]Savio Sciancalepore, Roberto Di Pietro:
Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios. IEEE Access 7: 156175-156190 (2019) - [j69]Savio Sciancalepore, Gabriele Oligeri, Giuseppe Piro, Gennaro Boggia, Roberto Di Pietro:
EXCHANge: Securing IoT via channel anonymity. Comput. Commun. 134: 14-29 (2019) - [j68]Maurantonio Caprolu, Simone Raponi, Roberto Di Pietro:
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN. Secur. Commun. Networks 2019: 6874592:1-6874592:16 (2019) - [c116]Roberto Di Pietro, Leonardo Jero, Flavio Lombardi, Agusti Solanas:
GPU Algorithms for K-Anonymity in Microdata. CNS 2019: 1-9 - [c115]Roberto Di Pietro, Gabriele Oligeri, Pietro Tedeschi:
JAM-ME: Exploiting Jamming to Accomplish Drone Mission. CNS 2019: 1-9 - [c114]Savio Sciancalepore, Roberto Di Pietro:
DRAKE: Distributed Relay-Assisted Key Establishment. CNS 2019: 100-108 - [c113]Stefano Cresci, Roberto Di Pietro, Maurizio Tesconi:
Semantically-Aware Statistical Metrics via Weighting Kernels. DSAA 2019: 51-60 - [c112]Maurantonio Caprolu, Roberto Di Pietro, Flavio Lombardi, Simone Raponi:
Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues. EDGE 2019: 116-123 - [c111]Simone Raponi, Maurantonio Caprolu, Roberto Di Pietro:
Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions. EDGE 2019: 59-75 - [c110]Roberto Di Pietro:
Next Generation Information Warfare: Challenges and Research Directions. ICISSP 2019: 7-8 - [c109]Roberto Di Pietro, Maurantonio Caprolu, Simone Raponi:
Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues. ICISSP (Revised Selected Papers) 2019: 24-47 - [c108]Savio Sciancalepore, Saeif Alhazbi, Roberto Di Pietro:
Reliability of ADS-B communications: novel insights based on an experimental assessment. SAC 2019: 2414-2421 - [c107]Savio Sciancalepore, Saeif Alhazbi, Roberto Di Pietro:
Location Privacy Issues in the OpenSky Network Crowdsourcing Platform. SecureComm (1) 2019: 549-568 - [c106]Gabriele Oligeri, Savio Sciancalepore, Omar Adel Ibrahim, Roberto Di Pietro:
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments). WiSec 2019: 12-22 - [c105]Savio Sciancalepore, Omar Adel Ibrahim, Gabriele Oligeri, Roberto Di Pietro:
Detecting Drones Status via Encrypted Traffic Analysis. WiseML@WiSec 2019: 67-72 - [i26]Savio Sciancalepore, Omar Adel Ibrahim, Gabriele Oligeri, Roberto Di Pietro:
Picking a Needle in a Haystack: Detecting Drones via Network Traffic Analysis. CoRR abs/1901.03535 (2019) - [i25]Isra Mohamed Ali, Maurantonio Caprolu, Roberto Di Pietro:
Foundations, Properties, and Security Applications of Puzzles: A Survey. CoRR abs/1904.10164 (2019) - [i24]Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro:
BrokenStrokes: On the (in)Security of Wireless Keyboards. CoRR abs/1910.03895 (2019) - [i23]Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro:
Crypto Mining Makes Noise. CoRR abs/1910.09272 (2019) - [i22]Simone Raponi, Roberto Di Pietro:
Web-sites password management (in)security: Evidence and remedies. CoRR abs/1911.08565 (2019) - 2018
- [j67]Antony Martin, Simone Raponi, Théo Combe, Roberto Di Pietro:
Docker ecosystem - Vulnerability Analysis. Comput. Commun. 122: 30-43 (2018) - [j66]Roberto Di Pietro, Gabriele Oligeri:
GopJam: Key-less jamming mitigation via gossiping. J. Netw. Comput. Appl. 123: 57-68 (2018) - [j65]Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro:
Strength of Crowd (SOC) - Defeating a Reactive Jammer in IoT with Decoy Messages. Sensors 18(10): 3492 (2018) - [j64]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling. IEEE Trans. Dependable Secur. Comput. 15(4): 561-576 (2018) - [c104]Roberto Di Pietro, Flavio Lombardi:
Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives. From Database to Cyber Security 2018: 166-185 - [c103]Roberto Di Pietro, Gabriele Oligeri, Xavier Salleras, Matteo Signorini:
N-Guard: a Solution to Secure Access to NFC tags. CNS 2018: 1-9 - [c102]Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro:
Shooting to the Stars: Secure Location Verification via Meteor Burst Communications. CNS 2018: 1-9 - [c101]Omar Adel Ibrahim, Ahmed Mohamed Hussain, Gabriele Oligeri, Roberto Di Pietro:
Key is in the Air: Hacking Remote Keyless Entry Systems. ISSA/CSITS@ESORICS 2018: 125-132 - [c100]Roberto Di Pietro, Xavier Salleras, Matteo Signorini, Erez Waisbard:
A blockchain-based Trust System for the Internet of Things. SACMAT 2018: 77-83 - [c99]Matteo Signorini, Wael Kanoun, Roberto Di Pietro:
ADvISE: Anomaly Detection tool for blockchaIn SystEms. SERVICES 2018: 65-66 - [c98]Savio Sciancalepore, Roberto Di Pietro:
SOS - Securing Open Skies. SpaCCS 2018: 15-32 - [c97]Simone Raponi, Roberto Di Pietro:
A Spark Is Enough in a Straw World: A Study of Websites Password Management in the Wild. STM 2018: 37-53 - [i21]Simone Raponi, Roberto Di Pietro:
A Spark is Enough in a Straw World: a Study of Websites Password Management in the Wild. CoRR abs/1804.07016 (2018) - [i20]Matteo Signorini, Matteo Pontecorvi, Wael Kanoun, Roberto Di Pietro:
BAD: Blockchain Anomaly Detection. CoRR abs/1807.03833 (2018) - [i19]Roberto Di Pietro, Flavio Lombardi:
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives. CoRR abs/1807.11016 (2018) - [i18]Savio Sciancalepore, Roberto Di Pietro:
SOS - Securing Open Skies. CoRR abs/1809.09026 (2018) - 2017
- [j63]Roberto Di Pietro, Gabriele Oligeri:
Enabling broadcast communications in presence of jamming via probabilistic pairing. Comput. Networks 116: 33-46 (2017) - [j62]Giulio Aliberti, Roberto Di Pietro, Stefano Guarino:
Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results. J. Netw. Comput. Appl. 99: 146-165 (2017) - [c96]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours. DSAA 2017: 686-695 - [c95]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
CoLLIDE: CLoud Latency-based IDEntification. EUSPN/ICTH 2017: 81-88 - [c94]Vanesa Daza, Roberto Di Pietro, Ivan Klimek, Matteo Signorini:
CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT. ICC 2017: 1-6 - [c93]Roberto Di Pietro, Federico Franzoni, Flavio Lombardi:
HyBIS: Advanced Introspection for Effective Windows Guest Protection. SEC 2017: 189-204 - [c92]Giulio Aliberti, Roberto Di Pietro, Stefano Guarino:
SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices. SECRYPT 2017: 163-174 - [c91]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race. WWW (Companion Volume) 2017: 963-972 - [i17]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. CoRR abs/1701.03017 (2017) - [i16]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. CoRR abs/1703.04482 (2017) - 2016
- [j61]Théo Combe, Antony Martin, Roberto Di Pietro:
To Docker or Not to Docker: A Security Perspective. IEEE Cloud Comput. 3(5): 54-62 (2016) - [j60]Giulio Aliberti, Roberto Di Pietro, Stefano Guarino:
Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel. Comput. Networks 109: 21-30 (2016) - [j59]Roberto Di Pietro, Alessandro Sorniotti:
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution. Comput. Commun. 82: 71-82 (2016) - [j58]Roberto Battistoni, Roberto Di Pietro, Flavio Lombardi:
CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments. Comput. Commun. 91-92: 29-43 (2016) - [j57]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection. IEEE Intell. Syst. 31(5): 58-64 (2016) - [j56]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments. IEEE Trans. Dependable Secur. Comput. 13(2): 296-311 (2016) - [j55]Roberto Di Pietro, Flavio Lombardi, Antonio Villani:
CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix. ACM Trans. Embed. Comput. Syst. 15(1): 15:1-15:25 (2016) - [j54]Guillermo Suarez-Tangil, Juan E. Tapiador, Flavio Lombardi, Roberto Di Pietro:
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware. IEEE Trans. Mob. Comput. 15(4): 789-802 (2016) - [c90]Andrea De Salve, Roberto Di Pietro, Paolo Mori, Laura Ricci:
Logical key hierarchy for groups management in Distributed Online Social Network. ISCC 2016: 710-717 - [i15]Roberto Di Pietro, Federico Franzoni, Flavio Lombardi:
HyBIS: Windows Guest Protection through Advanced Memory Introspection. CoRR abs/1601.05851 (2016) - [i14]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
DNA-inspired online behavioral modeling and its application to spambot detection. CoRR abs/1602.00110 (2016) - [i13]Stefano Cresci, Marinella Petrocchi, Maurizio Tesconi, Roberto Di Pietro, Angelo Spognardi:
Social Fingerprinting - or the Truth About You. ERCIM News 2016(106) (2016) - 2015
- [j53]Roberto Di Pietro, Gabriele Oligeri:
ESC: An efficient, scalable, and crypto-less solution to secure wireless networks. Comput. Networks 84: 46-63 (2015) - [j52]Davide Balzarotti, Roberto Di Pietro, Antonio Villani:
The impact of GPU-assisted malware on memory forensics: A case study. Digit. Investig. 14 Supplement 1: S16-S24 (2015) - [j51]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Fame for sale: Efficient detection of fake Twitter followers. Decis. Support Syst. 80: 56-71 (2015) - [j50]Giulio Aliberti, Alessandro Colantonio, Roberto Di Pietro, Riccardo Mariani:
EXPEDITE: EXPress closED ITemset Enumeration. Expert Syst. Appl. 42(8): 3933-3944 (2015) - [j49]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment. Future Gener. Comput. Syst. 48: 28-38 (2015) - [j48]Roberto Di Pietro, Gabriele Oligeri:
Silence is Golden: Exploiting Jamming and Radio Silence to Communicate. ACM Trans. Inf. Syst. Secur. 17(3): 9:1-9:24 (2015) - [j47]Stefano Guarino, Eyüp S. Canlar, Mauro Conti, Roberto Di Pietro, Agusti Solanas:
Provable Storage Medium for Data Storage Outsourcing. IEEE Trans. Serv. Comput. 8(6): 985-997 (2015) - [c89]Alessandro Colantonio, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi:
Visual detection of singularities in review platforms. SAC 2015: 1294-1295 - [c88]Alessandro Colantonio, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi:
VISIO: A Visual Approach for Singularity Detection in Recommendation Systems. TrustBus 2015: 33-47 - [c87]Roberto Di Pietro, Gabriele Oligeri:
Freedom of speech: thwarting jammers via a probabilistic approach. WISEC 2015: 4:1-4:6 - [p2]Mauro Conti, Roberto Di Pietro, Luciana Marconi:
Privacy for LBSs: On Using a Footprint Model to Face the Enemy. Advanced Research in Data Privacy 2015: 169-195 - [i12]Roberto Battistoni, Roberto Di Pietro, Flavio Lombardi:
CloRoFor: Cloud Robust Forensics. CoRR abs/1506.01739 (2015) - [i11]Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Fame for sale: efficient detection of fake Twitter followers. CoRR abs/1509.04098 (2015) - 2014
- [j46]Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. Pérez-Martínez, Roberto Di Pietro, Despina N. Perrea, Antoni Martínez-Ballesté:
Smart health: A context-aware health paradigm within smart cities. IEEE Commun. Mag. 52(8): 74-81 (2014) - [j45]Roberto Di Pietro, Stefano Guarino, Nino Vincenzo Verde, Josep Domingo-Ferrer:
Security in wireless ad-hoc networks - A survey. Comput. Commun. 51: 1-20 (2014) - [j44]Guillermo Suarez-Tangil, Juan E. Tapiador, Flavio Lombardi, Roberto Di Pietro:
Thwarting Obfuscated Malware via Differential Fault Analysis. Computer 47(6): 24-31 (2014) - [j43]Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
CloRExPa: Cloud resilience via execution path analysis. Future Gener. Comput. Syst. 32: 168-179 (2014) - [j42]Mauro Conti, Roberto Di Pietro, Angelo Spognardi:
Clone wars: Distributed detection of clone attacks in mobile WSNs. J. Comput. Syst. Sci. 80(3): 654-669 (2014) - [c86]Jorge Blasco Alís, Roberto Di Pietro, Agustín Orfila, Alessandro Sorniotti:
A tunable proof of ownership scheme for deduplication using Bloom filters. CNS 2014: 481-489 - [c85]Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi, Roberto Di Pietro:
A Criticism to Society (As Seen by Twitter Analytics). ICDCS Workshops 2014: 194-200 - [c84]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments. ICETE (Selected Papers) 2014: 340-362 - [c83]Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments. SECRYPT 2014: 125-136 - [c82]Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi:
A Lot of Slots - Outliers Confinement in Review-Based Systems. WISE (1) 2014: 15-30 - [i10]Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Discriminating Between the Wheat and the Chaff in Online Recommendation Systems. ERCIM News 2014(96) (2014) - 2013
- [j41]Marco Riccardi, Roberto Di Pietro, Marta Palanques, Jorge Aguila Vila:
Titans' revenge: Detecting Zeus via its own flaws. Comput. Networks 57(2): 422-435 (2013) - [j40]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Windows Mobile LiveSD Forensics. J. Netw. Comput. Appl. 36(2): 677-684 (2013) - [j39]Roberto Di Pietro, Gabriele Oligeri:
Jamming mitigation in cognitive radio networks. IEEE Netw. 27(3): 10-15 (2013) - [j38]Roberto Di Pietro, Nino Vincenzo Verde:
Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps. Pervasive Mob. Comput. 9(4): 588-597 (2013) - [j37]Emiliano De Cristofaro, Roberto Di Pietro:
Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems. IEEE Syst. J. 7(2): 311-322 (2013) - [j36]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini:
Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4): 2163-2176 (2013) - [j35]Roberto Di Pietro, Gabriele Oligeri:
COKE Crypto-Less Over-the-Air Key Establishment. IEEE Trans. Inf. Forensics Secur. 8(1): 163-173 (2013) - [j34]Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik:
United We Stand: Intrusion Resilience in Mobile Unattended WSNs. IEEE Trans. Mob. Comput. 12(7): 1456-1468 (2013) - [c81]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
CREPUSCOLO: A collusion resistant privacy preserving location verification system. CRiSIS 2013: 1-9 - [c80]Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde:
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices. CRiSIS 2013: 1-6 - [c79]Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali:
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements. CRiSIS 2013: 1-8 - [c78]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
CheR: Cheating Resilience in the Cloud via Smart Resource Allocation. FPS 2013: 339-352 - [c77]Roberto Di Pietro, Stefano Guarino:
Data confidentiality and availability via secret sharing and node mobility in UWSN. INFOCOM 2013: 205-209 - [c76]Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra:
AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing. UIC/ATC 2013: 371-379 - [c75]Roberto Di Pietro, Stefano Guarino:
Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks. WOWMOM 2013: 1-6 - [c74]Roberto Di Pietro, Roberto Mandati, Nino Vincenzo Verde:
Track me if you can: Transparent obfuscation for Location based Services. WOWMOM 2013: 1-9 - [p1]Roberto Di Pietro, Josep Domingo-Ferrer:
Security in Wireless Ad Hoc Networks. Mobile Ad Hoc Networking 2013: 106-153 - [e3]Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State:
Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers. Lecture Notes in Computer Science 7731, Springer 2013, ISBN 978-3-642-35889-0 [contents] - [e2]Angelos D. Keromytis, Roberto Di Pietro:
Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 106, Springer 2013, ISBN 978-3-642-36882-0 [contents] - [i9]Roberto Di Pietro, Flavio Lombardi, Antonio Villani:
CUDA Leaks: Information Leakage in GPU Architectures. CoRR abs/1305.7383 (2013) - [i8]Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali:
Mapping the File Systems Genome: rationales, technique, results and applications. CoRR abs/1306.2833 (2013) - [i7]Roberto Di Pietro, Gabriele Oligeri:
Silence is Golden: exploiting jamming and radio silence to communicate. CoRR abs/1307.5714 (2013) - 2012
- [j33]Alessandro Colantonio, Roberto Di Pietro, Nino Vincenzo Verde:
A business-driven decomposition methodology for role mining. Comput. Secur. 31(7): 844-855 (2012) - [j32]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Visual Role Mining: A Picture Is Worth a Thousand Roles. IEEE Trans. Knowl. Data Eng. 24(6): 1120-1133 (2012) - [j31]Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik:
Self-healing in unattended wireless sensor networks. ACM Trans. Sens. Networks 9(1): 7:1-7:21 (2012) - [c73]Roberto Di Pietro, Alessandro Sorniotti:
Boosting efficiency and security in proof of ownership for deduplication. AsiaCCS 2012: 81-82 - [c72]Emiliano De Cristofaro, Roberto Di Pietro:
Preserving Query Privacy in Urban Sensing Systems. ICDCN 2012: 218-233 - [c71]Mauro Conti, Roberto Di Pietro, Angelo Spognardi:
Wireless Sensor Replica Detection in Mobile Environments. ICDCN 2012: 249-264 - [c70]Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. Privacy Enhancing Technologies 2012: 180-200 - [c69]Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. Security Protocols Workshop 2012: 199-213 - [c68]Roberto Di Pietro, Fabio Martinelli, Nino Vincenzo Verde:
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions. SRDS 2012: 213-218 - [c67]Marta Palanques, Roberto Di Pietro, Carlos del Ojo, Marcel Malet, Miquel Marino, Toni Felguera:
Secure Cloud Browser: Model and Architecture to Support Secure WEB Navigation. SRDS 2012: 402-403 - [e1]Marwan Krunz, Loukas Lazos, Roberto Di Pietro, Wade Trappe:
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012. ACM 2012, ISBN 978-1-4503-1265-3 [contents] - 2011
- [j30]Roberto Di Pietro, Alexandre Viejo:
Location privacy and resilience in wireless sensor networks querying. Comput. Commun. 34(3): 515-523 (2011) - [j29]Elisabetta Allegra, Roberto Di Pietro, Mauro La Noce, Valerio Ruocco, Nino Vincenzo Verde:
Cross-border co-operation and education in digital investigations: A European perspective. Digit. Investig. 8(2): 106-113 (2011) - [j28]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A new role mining framework to elicit business roles and to mitigate enterprise risk. Decis. Support Syst. 50(4): 715-731 (2011) - [j27]Mauro Conti, Roberto Di Pietro, Angelo Spognardi:
"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j26]Luciana Marconi, Mauro Conti, Roberto Di Pietro:
CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection. Int. J. Inf. Sec. 10(5): 301-319 (2011) - [j25]Roberto Di Pietro, Refik Molva:
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems. J. Netw. Comput. Appl. 34(3): 853-863 (2011) - [j24]Flavio Lombardi, Roberto Di Pietro:
Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4): 1113-1122 (2011) - [j23]Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Intrusion-resilient integrity in data-centric unattended WSNs. Pervasive Mob. Comput. 7(4): 495-508 (2011) - [j22]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini:
Secure topology maintenance and events collection in WSNs. Secur. Commun. Networks 4(7): 744-762 (2011) - [j21]Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei:
Distributed Detection of Clone Attacks in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(5): 685-698 (2011) - [j20]Gabriele Oligeri, Stefano Chessa, Roberto Di Pietro, Gaetano Giunta:
Robust and efficient authentication of video stream broadcasting. ACM Trans. Inf. Syst. Secur. 14(1): 5:1-5:25 (2011) - [c66]Marco Riccardi, Roberto Di Pietro, Jorge Aguila Vila:
Taming Zeus by leveraging its own crypto internals. eCrime Researchers Summit 2011: 1-9 - [c65]Roberto Di Pietro, Nino Vincenzo Verde:
Epidemic data survivability in unattended wireless sensor networks. WISEC 2011: 11-22 - [c64]Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Events privacy in WSNs: A new model and its application. WOWMOM 2011: 1-9 - [c63]Roberto Di Pietro, Nino Vincenzo Verde:
Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks. WOWMOM 2011: 1-6 - [i6]Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. IACR Cryptol. ePrint Arch. 2011: 244 (2011) - 2010
- [j19]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Taming role mining complexity in RBAC. Comput. Secur. 29(5): 548-564 (2010) - [j18]Alessandro Colantonio, Roberto Di Pietro:
Concise: Compressed 'n' Composable Integer Set. Inf. Process. Lett. 110(16): 644-650 (2010) - [j17]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Hierarchies of keys in secure multicast communications. J. Comput. Secur. 18(5): 839-860 (2010) - [j16]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
eRIPP-FS: Enforcing privacy and security in RFID. Secur. Commun. Networks 3(1): 58-70 (2010) - [c62]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini:
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. CIT 2010: 910-915 - [c61]Flavio Lombardi, Roberto Di Pietro:
A Security Management Architecture for the Protection of Kernel Virtual Machines. CIT 2010: 948-953 - [c60]Roberto Bragantini, Mauro Conti, Roberto Di Pietro:
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance. CIT 2010: 1096-1101 - [c59]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Evaluating the Risk of Adopting RBAC Roles. DBSec 2010: 303-310 - [c58]Flavio Lombardi, Roberto Di Pietro:
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization. ICICS 2010: 92-106 - [c57]Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti:
Time Warp: How Time Affects Privacy in LBSs. ICICS 2010: 325-339 - [c56]Stefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Event Handoff Unobservability in WSN. iNetSec 2010: 20-28 - [c55]Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik:
Intrusion-Resilience in Mobile Unattended WSNs. INFOCOM 2010: 2303-2311 - [c54]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The smallville effect: social ties make mobile networks more secure against node capture attack. MOBIWAC 2010: 99-106 - [c53]Flavio Lombardi, Roberto Di Pietro:
Transparent security for cloud. SAC 2010: 414-415 - [c52]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
ABBA: adaptive bicluster-based approach to impute missing values in binary matrices. SAC 2010: 1026-1033 - [c51]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Mining Business-Relevant RBAC States through Decomposition. SEC 2010: 19-30 - [c50]Luciana Marconi, Mauro Conti, Roberto Di Pietro:
CED2: Communication Efficient Disjointness Decision. SecureComm 2010: 290-306 - [c49]Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik:
Securing Mobile Unattended WSNs against a Mobile Adversary. SRDS 2010: 11-20 - [c48]Flavio Lombardi, Roberto Di Pietro, Claudio Soriente:
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization. SRDS 2010: 338-342 - [i5]Alessandro Colantonio, Roberto Di Pietro:
CONCISE: Compressed 'n' Composable Integer Set. CoRR abs/1004.0403 (2010)
2000 – 2009
- 2009
- [j15]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) - [j14]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j13]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Distributed data source verification in wireless sensor networks. Inf. Fusion 10(4): 342-353 (2009) - [j12]Roberto Di Pietro, Pietro Michiardi, Refik Molva:
Confidentiality and integrity for data aggregation in WSN using peer monitoring. Secur. Commun. Networks 2(2): 181-194 (2009) - [j11]Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini:
Privacy-preserving robust data aggregation in wireless sensor networks. Secur. Commun. Networks 2(2): 195-213 (2009) - [j10]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) - [c47]Flavio Lombardi, Roberto Di Pietro:
KvmSec: a security extension for Linux kernel virtual machines. SAC 2009: 2029-2034 - [c46]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A formal framework to elicit roles with business meaning in RBAC systems. SACMAT 2009: 85-94 - [c45]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Mining Stable Roles in RBAC. SEC 2009: 259-269 - [c44]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. SEC 2009: 376-386 - [c43]Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. SecureComm 2009: 265-284 - [c42]Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 - [c41]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. WWIC 2009: 85-96 - [i4]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack. CoRR abs/0912.2199 (2009) - 2008
- [j9]Paolo Cencioni, Roberto Di Pietro:
A mechanism to enforce privacy in vehicle-to-infrastructure communication. Comput. Commun. 31(12): 2790-2802 (2008) - [j8]Roberto Di Pietro, Stefano Iannitti:
Maximizing service availability for secure satellite broadcasting. Int. J. Satell. Commun. Netw. 26(4): 269-289 (2008) - [j7]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Redoubtable Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): 13:1-13:22 (2008) - [c40]Michele Albano, Stefano Chessa, Roberto Di Pietro:
Information Assurance in Critical Infrastructures via Wireless Sensor Networks. IAS 2008: 305-310 - [c39]Agusti Solanas, Roberto Di Pietro:
A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets. MDAI 2008: 203-214 - [c38]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 - [c37]Roberto Di Pietro, Pietro Michiardi:
Gossip-based aggregate computation: computing faster with non address-oblivious schemes. PODC 2008: 442 - [c36]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello:
A cost-driven approach to role engineering. SAC 2008: 2129-2136 - [c35]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello:
Leveraging Lattices to Improve Role Mining. SEC 2008: 333-347 - [c34]Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini:
A Live Digital Forensic system for Windows networks. SEC 2008: 653-667 - [c33]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and efficient provable data possession. SecureComm 2008: 9 - [c32]Andrea Cirulli, Roberto Di Pietro:
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications. SecureComm 2008: 29 - [c31]Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik:
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194 - [c30]Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback:
RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 - [c29]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. WISEC 2008: 214-219 - [i3]Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello:
An Activity-Based Model for Separation of Duty. CoRR abs/0810.5351 (2008) - [i2]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 114 (2008) - [i1]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary. IACR Cryptol. ePrint Arch. 2008: 293 (2008) - 2007
- [j6]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5(1): 49-62 (2007) - [j5]Giorgio Zanin, Roberto Di Pietro, Luigi V. Mancini:
Robust RSA distributed signatures for large-scale long-lived ad hoc networks. J. Comput. Secur. 15(1): 171-196 (2007) - [c28]Roberto Di Pietro, Refik Molva:
Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202 - [c27]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Towards threat-adaptive dynamic fragment replication in large scale distributed systems. IPDPS 2007: 1 - [c26]Paolo Cencioni, Roberto Di Pietro:
VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol. MASS 2007: 1-6 - [c25]Yee Wei Law, Li-Hsing Yen, Roberto Di Pietro, Marimuthu Palaniswami:
Secure k-Connectivity Properties of Wireless Sensor Networks. MASS 2007: 1-6 - [c24]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. MobiHoc 2007: 80-89 - [c23]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234 - [c22]Stefano Chessa, Roberto Di Pietro, Erina Ferro, Gaetano Giunta, Gabriele Oligeri:
Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. VTC Spring 2007: 634-638 - 2006
- [j4]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel. Networks 12(6): 709-721 (2006) - [c21]Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil:
Addressing the shortcomings of one-way chains. AsiaCCS 2006: 289-296 - [c20]Angelo Spognardi, Roberto Di Pietro:
A formal framework for the performance analysis of P2P networks protocols. IPDPS 2006 - [c19]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
Secure Cooperative Channel Establishment inWireless Sensor Networks. PerCom Workshops 2006: 327-331 - [c18]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Sensor Networks that Are Provably Resilient. SecureComm 2006: 1-10 - [c17]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN. SMC 2006: 1468-1473 - [c16]Roberto Di Pietro, Luigi V. Mancini, Giorgio Zanin:
Efficient and Adaptive Threshold Signatures for Ad hoc networks. WCAN@ICALP 2006: 93-105 - 2005
- [c15]Angelo Spognardi, Alessandro Lucarelli, Roberto Di Pietro:
A methodology for P2P file-sharing traffic detection. HOT-P2P 2005: 52-61 - [c14]Roberto Di Pietro, Gianluigi Me, Maurizio Adriano Strangio:
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions. ICMB 2005: 28-34 - [c13]Roberto Di Pietro, Stefano Chessa, Piero Maestrini:
Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast. SecureComm 2005: 13-22 - [c12]Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil:
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. SecureComm 2005: 400-402 - 2004
- [b1]Roberto Di Pietro:
Security issues for wireless sensor networks. Sapienza University of Rome, Italy, 2004 - [j3]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Key management for high bandwidth secure multicast. J. Comput. Secur. 12(5): 693-709 (2004) - [c11]Angelo Spognardi, Roberto Di Pietro, Luigi V. Mancini:
BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks. HOT-P2P 2004: 22-29 - [c10]Stefano Chessa, Roberto Di Pietro, Piero Maestrini:
Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2. WONS 2004: 184-198 - [c9]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. IPDPS 2004 - [c8]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Connectivity properties of secure wireless sensor networks. SASN 2004: 53-58 - 2003
- [j2]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003) - [j1]Roberto Di Pietro, Luigi V. Mancini:
Security and privacy issues of handheld and wearable wireless devices. Commun. ACM 46(9): 74-79 (2003) - [c7]Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga:
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397- - [c6]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Random key-assignment for secure Wireless Sensor Networks. SASN 2003: 62-71 - [c5]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132 - [c4]Roberto Di Pietro, Antonio Durante, Luigi V. Mancini:
A Reliable Key Authentication Schema for Secure Multicast Communications. SRDS 2003: 231-240 - 2002
- [c3]Antonio Durante, Roberto Di Pietro, Luigi V. Mancini:
Formal Specification for Fast Automatic IDS Training. FASec 2002: 191-204 - [c2]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73 - [c1]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434
Coauthor Index
aka: Luigi Vincenzo Mancini
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 17:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint