Marco Tiloca

Orcid: 0000-0001-8842-9810

According to our database1, Marco Tiloca authored at least 35 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols.
IEEE Access, 2024

2023
Secure Software Updates for IoT Based on Industry Requirements.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Key Update for the IoT Security Standard OSCORE.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things.
ACM Trans. Internet Things, 2022

Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation.
Comput. Commun., 2022

2021
Evaluating the performance of the OSCORE security protocol in constrained IoT environments.
Internet Things, 2021

Flowrider: Fast On-Demand Key Provisioning for Cloud Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

On-demand Key Distribution for Cloud Networks.
Proceedings of the 24th Conference on Innovation in Clouds, 2021

2020
Group rekeying based on member join history.
Int. J. Inf. Sec., 2020

Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

2019
DISH: DIstributed SHuffling Against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks.
ACM Trans. Sens. Networks, 2019

Group-IKEv2 for multicast IPsec in the internet of things.
Int. J. Secur. Networks, 2019

2018
SARDOS: Self-Adaptive Reaction Against Denial of Service in the Internet of Things.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Axiom: DTLS-Based Secure IoT Group Communication.
ACM Trans. Embed. Comput. Syst., 2017

JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs.
IEEE Trans. Dependable Secur. Comput., 2017

On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.
Int. J. Inf. Sec., 2017

2016
Robust and Scalable DTLS Session Establishment.
ERCIM News, 2016

Performance and Security Evaluation of SDN Networks in OMNeT++/INET.
CoRR, 2016

GREP: A group rekeying protocol based on member join history.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
SMACK: Short message authentication check against battery exhaustion in the Internet of Things.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Simulative Evaluation of Security Attacks in Networked Critical Infrastructures.
Proceedings of the Computer Safety, Reliability, and Security, 2015

2014
A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks.
Wirel. Networks, 2014

Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems.
Proceedings of the Modelling and Simulation for Autonomous Systems, 2014

2013
IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-642-37368-8, 2013

Solutions and Tools for Secure Communication in Wireless Sensor Networks.
PhD thesis, 2013

HISS: A HIghly Scalable Scheme for Group Rekeying.
Comput. J., 2013

STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming.
Proceedings of the SENSORNETS 2013, 2013

STaR: a Reconfigurable and Transparent middleware for WSNs security.
Proceedings of 4th International Workshop on Networks of Cooperating Objects for Smart Cities 2013, 2013

SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013

On simulative analysis of attack impact in Wireless Sensor Networks.
Proceedings of 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation, 2013

2012
ASF: An attack simulation framework for wireless sensor networks.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

2011
On experimentally evaluating the impact of security on IEEE 802.15.4 networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
Considerations on Security in ZigBee Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010


  Loading...