Gianmarco Baldini

According to our database1, Gianmarco Baldini authored at least 78 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Continuous Authentication of Automotive Vehicles Using Inertial Measurement Units.
Sensors, 2019

Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots.
Internet Technol. Lett., 2019

Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices.
Comput. Stand. Interfaces, 2019

Radiometric identification using variational mode decomposition.
Comput. Electr. Eng., 2019

Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network.
IEEE Access, 2019

A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS.
Proceedings of the 2019 Global IoT Summit, 2019

Zone Keys Trust Management in Vehicular Networks based on Blockchain.
Proceedings of the 2019 Global IoT Summit, 2019

An assessment of the impact of IQ imbalances on the physical layer authentication of IoT wireless devices.
Proceedings of the 2019 Global IoT Summit, 2019

An assessment of the impact of wireless interferences on IoT emitter identification using Time Frequency representations and CNN.
Proceedings of the 2019 Global IoT Summit, 2019

Toward a Blockchain-based Platform to Manage Cybersecurity Certification of IoT devices.
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019

A Performance Evaluation on Distance Measures in KNN for Mobile Malware Detection.
Proceedings of the 6th International Conference on Control, 2019

2018
Speed Consistency in the Smart Tachograph.
Sensors, 2018

Ethical Design in the Internet of Things.
Science and Engineering Ethics, 2018

Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union.
Int. J. Crit. Infrastructure Prot., 2018

Synchrosqueezing Transform Based Methodology for Radiometric Identification.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Towards a Mobile Malware Detection Framework with the Support of Machine Learning.
Proceedings of the Security in Computer and Information Sciences, 2018

2017
GNSS Receiver Identification Using Clock-Derived Metrics.
Sensors, 2017

Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns.
Sensors, 2017

An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting.
Mobile Information Systems, 2017

Future evolution of public safety communications in the 5G Era.
Trans. Emerging Telecommunications Technologies, 2017

Mobile phone identification through the built-in magnetometers.
CoRR, 2017

A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components.
IEEE Communications Surveys and Tutorials, 2017

Privacy-preserving attribute-based credentials in cooperative intelligent transport systems.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices.
Proceedings of the 24. IEEE Symposium on Communications and Vehicular Technology, 2017

A wireless propagation analysis for the frequency of the pseudonym changes to support privacy in VANETs.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Security and privacy issues for an IoT based smart home.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Imaging time series for internet of things radio frequency fingerprinting.
Proceedings of the International Carnahan Conference on Security Technology, 2017

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Improving Internet of Things device certification with policy-based management.
Proceedings of the Global Internet of Things Summit, 2017

Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy.
Proceedings of the Global Internet of Things Summit, 2017

2016
Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS).
Sensors, 2016

Security certification and labelling in Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

A novel multi-hop secure LTE-D2D communication protocol for IoT scenarios.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Informed consent in Internet of Things: The case study of cooperative intelligent transport systems.
Proceedings of the 23rd International Conference on Telecommunications, 2016

LTE D2D communication for collaborative wearable sensor networks: A connectivity analysis.
Proceedings of the European Conference on Networks and Communications, 2016

2015
Apodization Method for Standard Load Modulation Amplitude Measurement on Proximity Integrated Circuit Cards.
IEEE Trans. Instrumentation and Measurement, 2015

Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios.
Security and Communication Networks, 2015

DIAT: A Scalable Distributed Architecture for IoT.
IEEE Internet of Things Journal, 2015

Experimental detection of mobile satellite transmissions with cyclostationary features.
Int. J. Satellite Communications Networking, 2015

SecKit: A Model-based Security Toolkit for the Internet of Things.
Comput. Secur., 2015

An agent-based framework for Informed Consent in the internet of things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Detection of DECT identity spoofing through radio frequency fingerprinting.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

2014
An urn occupancy approach for cognitive radio networks in DTVB white spaces.
Telecommunication Systems, 2014

Building Trust in the Human?Internet of Things Relationship.
IEEE Technol. Soc. Mag., 2014

An emergency communication system based on software-defined radio.
EURASIP J. Wireless Comm. and Networking, 2014

Survey of Wireless Communication Technologies for Public Safety.
IEEE Communications Surveys and Tutorials, 2014

Enforcement of security policy rules for the Internet of Things.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Connectivity and security in a D2D communication protocol for public safety applications.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

Propagation measurements in 5.8GHz and pathloss study for CEN-DSRC.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Privacy leakages in Smart Home wireless technologies.
Proceedings of the International Carnahan Conference on Security Technology, 2014

European Citizens and Their Trust in Social Networks.
Proceedings of the Learning and Collaboration Technologies. Technology-Rich Environments for Learning and Collaboration, 2014

A Model-Based Security Toolkit for the Internet of Things.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Software Radio Implementation of Centralized MAC Protocol for Cognitive Radio Networks.
Wireless Personal Communications, 2013

Distributed access control policies for spectrum sharing.
Security and Communication Networks, 2013

LTE: the technology driver for future public safety communications.
IEEE Communications Magazine, 2013

Cyclostationary feature analysis of CEN-DSRC for cognitive vehicular networks.
Proceedings of the 2013 IEEE Intelligent Vehicles Symposium (IV), 2013

Identity-based security systems for vehicular ad-hoc networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Applying generalized urn models to cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2013

An Architecture for Secure m-Commerce Applications.
Proceedings of the 19th International Conference on Control Systems and Computer Science, 2013

A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
Future of wireless communication: RadioApps and related security and radio computer framework.
IEEE Wireless Commun., 2012

A Cognitive Management Framework to Support Exploitation of the Future Internet of Things.
Scalable Computing: Practice and Experience, 2012

Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead.
IEEE Communications Surveys and Tutorials, 2012

Security Aspects of Policy Controlled Cognitive Radio.
Proceedings of the 5th International Conference on New Technologies, 2012

2011
The EULER project: application of software defined radio in joint security operations.
IEEE Communications Magazine, 2011

Design of a Robust Cognitive Control Channel for Cognitive Radio Networks Based on Ultra Wideband Pulse Shaped Signal.
Proceedings of the Multiple Access Communications - 4th International Workshop, 2011

2010
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure.
Int. J. Crit. Infrastructure Prot., 2010

ETSI reconfigurable radio systems: status and future directions on software defined radio and cognitive radio standards.
IEEE Communications Magazine, 2010

Aggregate interference in white spaces.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

Implementation of a wireless test bed for the functional verification of the ultra-wideband Detect-and-Avoid mechanism.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

Adaptive and Distributed Access Control in Cognitive Radio Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

European Standardization and SDR Certification.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
Experimentally detecting IEEE 802.11n Wi-Fi based on cyclostationarity features for ultra-wide band cognitive radios.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

ETSI Reconfigurable Radio Systems - Software Defined Radio and Cognitive Radio standards.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Test bed design for detect and avoid of ultra wideband devices.
Proceedings of the 2009 ACM Workshop on Cognitive Radio Networks, CoRoNet 2009, Beijing, 2009

2008
Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms.
Proceedings of the Intelligence and Security Informatics, 2008

Service Modeling Language Applied to Critical Infrastructure.
Proceedings of the Critical Information Infrastructure Security, 2008


  Loading...