Gianluca Dini

According to our database1, Gianluca Dini
  • authored at least 107 papers between 1994 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Sec. Comput., 2018

Risk analysis of Android applications: A user-centric solution.
Future Generation Comp. Syst., 2018

2017
Drone Path Planning for Secure Positioning and Secure Position Verification.
IEEE Trans. Mob. Comput., 2017

JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs.
IEEE Trans. Dependable Sec. Comput., 2017

Kassandra: A framework for distributed simulation of heterogeneous cooperating objects.
Journal of Systems Architecture - Embedded Systems Design, 2017

Protected pointers in wireless sensor networks.
IJAHUC, 2017

DIO Suppression Attack Against Routing in the Internet of Things.
IEEE Communications Letters, 2017

Modeling and generation of secure component communications in AUTOSAR.
Proceedings of the Symposium on Applied Computing, 2017

Sensing the cities with social-aware unmanned aerial vehicles.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Verifying Data Secure Flow in AUTOSAR Models by Static Analysis.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

An Implementation and Evaluation of the Security Features of RPL.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2017

A Low-Cost UAV-Based Secure Location Verification Method.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Secure Positioning in Wireless Sensor Networks through Enlargement Miscontrol Detection.
TOSN, 2016

Modeling Enlargement Attacks Against UWB Distance Bounding Protocols.
IEEE Trans. Information Forensics and Security, 2016

Performance and Security Evaluation of SDN Networks in OMNeT++/INET.
CoRR, 2016

Localization with Guaranteed Bound on the Position Error using a Drone.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016

Using AUTOSAR High-Level Specifications for the Synthesis of Security Components in Automotive Systems.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2016

GREP: A group rekeying protocol based on member join history.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Data-Sluice: Fine-grained traffic control for Android application.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Distributed motion misbehavior detection in teams of heterogeneous aerial robots.
Robotics and Autonomous Systems, 2015

Distributed storage protection in wireless sensor networks.
Journal of Systems Architecture - Embedded Systems Design, 2015

A uniformity-based approach to location privacy.
Computer Communications, 2015

On Designing Resilient Location-Privacy Obfuscators.
Comput. J., 2015

Password systems: Design and implementation.
Computers & Electrical Engineering, 2015

Key propagation in wireless sensor networks.
Computers & Electrical Engineering, 2015

The verifier bee: A path planner for drone-based secure location verification.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Simulative Evaluation of Security Attacks in Networked Critical Infrastructures.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Secure positioning with non-ideal distance bounding protocols.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks.
Wireless Networks, 2014

Social and Q&A interfaces for app download.
Inf. Process. Manage., 2014

On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding.
IEEE Communications Letters, 2014

On evaluating the performance impact of the IEEE 802.15.4 security sub-layer.
Computer Communications, 2014

HUMsim: A Privacy-Oriented Human Mobility Simulator.
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014

A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2014

A performance evaluation method for WSNs security.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

2013
IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-642-37368-8, 2013

A Social-Feedback Enriched Interface for Software Download.
JOEUC, 2013

Mobile Underwater Sensor Networks for Protection and Security: Field Experience at the UAN11 Experiment.
J. Field Robotics, 2013

HISS: A HIghly Scalable Scheme for Group Rekeying.
Comput. J., 2013

Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming.
Proceedings of the SENSORNETS 2013, 2013

STaR: a Reconfigurable and Transparent middleware for WSNs security.
Proceedings of 4th International Workshop on Networks of Cooperating Objects for Smart Cities 2013, 2013

SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013

On simulative analysis of attack impact in Wireless Sensor Networks.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Integration of Privacy Protection Mechanisms in Location-Based Services.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Probabilistic Contract Compliance for Mobile Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A Secure Communication Suite for Underwater Acoustic Sensor Networks.
Sensors, 2012

Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network.
Sensors, 2012

Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network.
Ad Hoc Networks, 2012

LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks.
Ad Hoc Networks, 2012

ASF: An attack simulation framework for wireless sensor networks.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

MADAM: A Multi-level Anomaly Detector for Android Malware.
Proceedings of the Computer Network Security, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Uniform Obfuscation for Location Privacy.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks.
ACM Trans. Embedded Comput. Syst., 2011

RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks.
Personal and Ubiquitous Computing, 2011

LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Distributed Intrusion Detection for the Security of Societies of Robots
CoRR, 2011

Neighbourhood monitoring for decentralised coordination in multi-agent systems: A case-study.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

A cryptographic suite for underwater cooperative applications.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

On experimentally evaluating the impact of security on IEEE 802.15.4 networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
A Security Architecture for Reconfigurable Networked Embedded Systems.
IJWIN, 2010

Considerations on Security in ZigBee Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

Scalable rekeying in dynamic multi-groups.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

A reputation-based approach to tolerate misbehaving carriers in Delay Tolerant Networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

RiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks.
Proceedings of the International Conference on Wireless and Ubiquitous Systems , 2010

2009
Bloumail: an interactive tool for blocking spam at the originator.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

On securing publish-subscribe systems with security groups.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
Heterogeneous Wireless Multirobot System.
IEEE Robot. Automat. Mag., 2008

Consensus-based distributed intrusion detection for multi-robot systems.
Proceedings of the 2008 IEEE International Conference on Robotics and Automation, 2008

An Algorithm for Reconnecting Wireless Sensor Network Partitions.
Proceedings of the Wireless Sensor Networks, 5th European Conference, 2008

Decentralized Deployment of Mobile Sensors for Optimal Connected Sensing Coverage.
Proceedings of the Distributed Computing in Sensor Systems, 2008

2007
A Component-Based Approach to the Design of Networked Control Systems.
Eur. J. Control, 2007

A methodology for verification of digital items in fair exchange protocols with active trustee.
Electronic Commerce Research, 2007

Improving authentication of remote card transactions with mobile personal trusted devices.
Computer Communications, 2007

Practical Verification of Untrusted Terminals using Remote Attestation.
Proceedings of the SECRYPT 2007, 2007

Repairing network partitions in Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Decentralized intrusion detection for secure cooperative multi-agent systems.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2007

2006
Caching and prefetching algorithms for programs with looping reference patterns.
Comput. J., 2006

An Efficient Key Revocation Protocol for Wireless Sensor Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Credentials and Beliefs in Remote Trusted Platforms Attestation.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Scalable and Secure Group Rekeying in Wireless Sensor Networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

An Overview of VOAC, a Virtual Organizations Access Control Infrastructure.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

2005
FACT: A Tool for Code Generation from Communicating Automata.
Proceedings of the IASTED International Conference on Software Engineering, 2005

2003
A secure and available electronic voting service for a large-scale distributed system.
Future Generation Comp. Syst., 2003

2002
Increasing security and availability of an Internet voting system.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

2001
Application-controlled memory management in a single address space environment.
STTT, 2001

Electronic voting in a large-scale distributed system.
Networks, 2001

2000
Sharing objects in a distributed, single address space environment.
Future Generation Comp. Syst., 2000

Single address space implementation in distributed systems.
Concurrency - Practice and Experience, 2000

An Overview of Ulisse, a Distributed Single Address Space System.
Proceedings of the Persistent Object Systems, 9th International Workshop, 2000

1999
Implementing a Distributed Single Address Space in the Presence of Failures.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Recoverable-Persistence in a Distributed Single Address Space.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

Programming Partition-Aware Network Applications.
Proceedings of the Advances in Distributed Systems, 1999

1998
Mechanisms for application-level recoverable-persistence in a single address space.
Microprocessors and Microsystems - Embedded Hardware Design, 1998

Detecting Key-Dependencies.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Enriched View Synchrony: A Programming Paradigm for Partitionable Asynchronous Distributed Systems.
IEEE Trans. Computers, 1997

1996
On Programming with View Synchrony.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Implementing distributed process farms.
Microprocessors and Microsystems - Embedded Hardware Design, 1995

Graphical design of distributed applications through reusable components.
IEEE P&DT, 1995

Reusing sequential software in a distributed environment.
Distributed Systems Engineering, 1995

1994
Replicated File Management in Large-Scale Distributed Systems.
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994


  Loading...