Gabriele Oligeri

Orcid: 0000-0002-9637-0430

According to our database1, Gabriele Oligeri authored at least 68 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database.
IEEE Access, 2024

FadePrint - Satellite Spoofing Detection via Fading Fingerprinting.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

GhostBuster: Detecting Misbehaving Remote ID-Enabled Drones.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Challenges of Radio Frequency Fingerprinting: From Data Collection to Deployment.
CoRR, 2023

Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram.
CoRR, 2023

MITRE ATT&CK: State of the Art and Way Forward.
CoRR, 2023

False Data Injection Attacks in Smart Grids: State of the Art and Way Forward.
CoRR, 2023

Early Jamming Detection in Mobile Indoor Scenarios via Deep Learning.
CoRR, 2023

Jamming Detection in Power Line Communications Leveraging Deep Learning Techniques.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Early Malware Characterization based on Online Social Networks.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

David and Goliath: Asymmetric Advantage in MIoT.
Proceedings of the 6th International Conference on Advanced Communication Technologies and Networking, 2023

BloodHound: Early Detection and Identification of Jamming at the PHY-layer.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Fake News Propagation: A Review of Epidemic Models, Datasets, and Insights.
ACM Trans. Web, 2022

Localization of a Power-Modulated Jammer.
Sensors, 2022

Sound of guns: digital forensics of gun audio samples meets artificial intelligence.
Multim. Tools Appl., 2022

Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures.
IEEE Secur. Priv., 2022

GPS spoofing detection via crowd-sourced information for connected vehicles.
Comput. Networks, 2022

Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Context-Aware Drone Detection.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions.
ACM Trans. Embed. Comput. Syst., 2021

Cryptomining makes noise: Detecting cryptojacking via Machine Learning.
Comput. Commun., 2021

KaFHCa: Key-establishment via Frequency Hopping Collisions.
Proceedings of the ICC 2021, 2021

Data Confidentiality for IoT Networks: Cryptographic Gaps and Physical-Layer Opportunities.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

2020
The Dark (and Bright) Side of IoT: Attacks and Countermeasures to Identification of Smart Home Devices and Services.
CoRR, 2020

Fridges on the Highway: Road Traffic Poisoning of Navigation Apps.
CoRR, 2020

PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis.
Comput. Networks, 2020

Leveraging Jamming to Help Drones Complete Their Mission.
IEEE Access, 2020

BrokenStrokes: on the (in)security of wireless keyboards.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

GNSS spoofing detection via opportunistic IRIDIUM signals.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

2019
Crypto Mining Makes Noise.
CoRR, 2019

Picking a Needle in a Haystack: Detecting Drones via Network Traffic Analysis.
CoRR, 2019

EXCHANge: Securing IoT via channel anonymity.
Comput. Commun., 2019

Detecting Drones Status via Encrypted Traffic Analysis.
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019

Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

JAM-ME: Exploiting Jamming to Accomplish Drone Mission.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Strength of Crowd (SOC) - Defeating a Reactive Jammer in IoT with Decoy Messages.
Sensors, 2018

GopJam: Key-less jamming mitigation via gossiping.
J. Netw. Comput. Appl., 2018

Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset.
IACR Cryptol. ePrint Arch., 2018

Key is in the Air: Hacking Remote Keyless Entry Systems.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

Shooting to the Stars: Secure Location Verification via Meteor Burst Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

N-Guard: a Solution to Secure Access to NFC tags.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Enabling broadcast communications in presence of jamming via probabilistic pairing.
Comput. Networks, 2017

2015
Silence is Golden: Exploiting Jamming and Radio Silence to Communicate.
ACM Trans. Inf. Syst. Secur., 2015

ESC: An efficient, scalable, and crypto-less solution to secure wireless networks.
Comput. Networks, 2015

Freedom of speech: thwarting jammers via a probabilistic approach.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2013
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload.
ACM Trans. Internet Techn., 2013

United We Stand: Intrusion Resilience in Mobile Unattended WSNs.
IEEE Trans. Mob. Comput., 2013

COKE Crypto-Less Over-the-Air Key Establishment.
IEEE Trans. Inf. Forensics Secur., 2013

Jamming mitigation in cognitive radio networks.
IEEE Netw., 2013

A cyber-physical approach to secret key generation in smart environments.
J. Ambient Intell. Humaniz. Comput., 2013

A survey of architectures and scenarios in satellite-based wireless sensor networks: system design aspects.
Int. J. Satell. Commun. Netw., 2013

SHAKE: Single HAsh key establishment for resource constrained devices.
Ad Hoc Networks, 2013

2011
Robust and efficient authentication of video stream broadcasting.
ACM Trans. Inf. Syst. Secur., 2011

Loss tolerant video streaming authentication in heterogeneous wireless networks.
Comput. Commun., 2011

2010
Video Streaming Authentication Combining Signature Amortization and Watermarking.
PhD thesis, 2010

Quality of experience in multicast hybrid networks: avoiding bandwidth wasting with a double-stage FEC scheme.
IET Commun., 2010

Securing Mobile Unattended WSNs against a Mobile Adversary.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Intrusion-Resilience in Mobile Unattended WSNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

AmbiSec: Securing Smart Spaces Using Entropy Harvesting.
Proceedings of the Ambient Intelligence, 2010

2009
Measurement-based frame error model for simulating outdoor Wi-Fi networks.
IEEE Trans. Wirel. Commun., 2009

Communications and networking over satellites: SatNEx experimental activities and testbeds.
Int. J. Satell. Commun. Netw., 2009

2007
Embedding Source Signature in Multicast Wireless Video Streams.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Frame error model in rural Wi-Fi networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007


  Loading...