Alberto Giaretta

Orcid: 0000-0001-9293-7711

Affiliations:
  • Örebro University, Sweden (PhD 2021)
  • University of Padova, Department of Mathematics, Italy (former)


According to our database1, Alberto Giaretta authored at least 29 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cybersecurity and Embodiment Integrity for Modern Robots: A Conceptual Framework.
CoRR, 2024

2023
On the people counting problem in smart homes: undirected graphs and theoretical lower-bounds.
J. Ambient Intell. Humaniz. Comput., 2023

Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations.
CoRR, 2023

Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders.
Proceedings of the IEEE International Conference on Communications, 2023

2022
S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices.
ACM Trans. Sens. Networks, 2022

Are Smart Homes Adequate for Older Adults with Dementia?
Sensors, 2022

Security and Privacy in Virtual Reality - A Literature Survey.
CoRR, 2022

A machine learning-based approach to detect threats in bio-cyber DNA storage systems.
Comput. Commun., 2022

A PLS-HECC-based device authentication and key agreement scheme for smart home networks.
Comput. Networks, 2022

2021
Microservices: Migration of a Mission Critical System.
IEEE Trans. Serv. Comput., 2021

DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks.
IEEE Trans. Emerg. Top. Comput., 2021

2020
Users' Concern for Privacy in Context-Aware Reasoning Systems.
CoRR, 2020

BitFlow: Enabling real-time cash-flow evaluations through blockchain.
Concurr. Comput. Pract. Exp., 2020

IoT Device Profiling: From MUD Files to S×C Contracts.
Proceedings of the Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark., 2020

2019
IoT Security Configurability with Security-by-Contract.
Sensors, 2019

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era.
Future Internet, 2019

UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things.
CoRR, 2019

Protecting the Internet of Things with Security-by-Contract and Fog Computing.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

UniquID: A Quest to Reconcile Identity Access Management and the IoT.
Proceedings of the Software Technology: Methods and Tools - 51st International Conference, 2019

2018
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation.
Secur. Commun. Networks, 2018

Vulnerabilities and Security Breaches in Cryptocurrencies.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Community Targeted Spam: A Middle Ground Between General Spam and Spear Phishing.
CoRR, 2017

Analysis of DDoS-Capable IoT Malwares.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016

The Internet of Hackable Things.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016

AntibIoTic: Protecting IoT Devices Against DDoS Attacks.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016


  Loading...