Mauro Conti

Affiliations:
  • University of Padua, Italy


According to our database1, Mauro Conti authored at least 600 papers between 2006 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2022, "for contributions to communications network security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Light-YOLOv5: A Lightweight Drone Detector for Resource-Constrained Cameras.
IEEE Internet Things J., March, 2024

Anonymous Federated Learning via Named-Data Networking.
Future Gener. Comput. Syst., March, 2024

A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., February, 2024

Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach.
IEEE Trans. Wirel. Commun., January, 2024

Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization.
IEEE Trans. Serv. Comput., 2024

Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective.
IEEE Internet Things J., 2024

Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices.
IEEE Secur. Priv., 2024

A Survey on Decentralized Identifiers and Verifiable Credentials.
CoRR, 2024

"All of Me": Mining Users' Attributes from their Public Spotify Playlists.
CoRR, 2024

A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols.
CoRR, 2024

Privacy-Preserving in Blockchain-based Federated Learning Systems.
CoRR, 2024

De-Authentication Using Ambient Light Sensor.
IEEE Access, 2024

LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of Vehicles.
Proceedings of the 25th International Conference on Distributed Computing and Networking, 2024

X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm.
ACM Trans. Web, November, 2023

Honey-list based authentication protocol for industrial IoT swarms.
Comput. Commun., November, 2023

BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT.
IEEE Internet Things J., September, 2023

A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification.
IET Cyper-Phys. Syst.: Theory & Appl., September, 2023

PIGNUS: A Deep Learning model for IDS in industrial internet-of-things.
Comput. Secur., September, 2023

COUNT: Blockchain framework for resource accountability in e-healthcare.
Comput. Commun., September, 2023

An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach.
Comput. Commun., September, 2023

Turning captchas against humanity: Captcha-based attacks in online social media.
Online Soc. Networks Media, July, 2023

VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics.
J. Cybersecur. Priv., July, 2023

An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF.
Internet Things, July, 2023

TANGO: A temporal spatial dynamic graph model for event prediction.
Neurocomputing, July, 2023

Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks.
IEEE Trans. Netw. Serv. Manag., June, 2023

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework.
IEEE Trans. Netw. Serv. Manag., June, 2023

Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain.
IEEE Trans. Netw. Serv. Manag., June, 2023

Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems.
IEEE Trans. Ind. Informatics, June, 2023

ICSSIM - A framework for building industrial control systems security testbeds.
Comput. Ind., June, 2023

An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems.
Comput. Commun., May, 2023

Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Dataset, May, 2023

Deep Neural Networks for Direction of Arrival Estimation of Multiple Targets With Sparse Prior for Line-of-Sight Scenarios.
IEEE Trans. Veh. Technol., April, 2023

Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023

Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics.
ACM Trans. Cyber Phys. Syst., April, 2023

HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN.
Int. J. Inf. Sec., April, 2023

A survey on security and privacy issues of UAVs.
Comput. Networks, April, 2023

Poisoning Bearer Context Migration in O-RAN 5G Network.
IEEE Wirel. Commun. Lett., March, 2023

SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning.
Proc. Priv. Enhancing Technol., January, 2023

Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing.
Wirel. Pers. Commun., 2023

Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks.
IEEE Trans. Wirel. Commun., 2023

Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit.
IEEE Trans. Serv. Comput., 2023

SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming.
IEEE Trans. Dependable Secur. Comput., 2023

Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2023

Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

Comparing the Impact of Social Media Regulations on News Consumption.
IEEE Trans. Comput. Soc. Syst., 2023

BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.
Pervasive Mob. Comput., 2023

SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model.
IACR Cryptol. ePrint Arch., 2023

Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.
ACM Comput. Surv., 2023

DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles.
CoRR, 2023

Topology-Based Reconstruction Prevention for Decentralised Learning.
CoRR, 2023

Dr. Jekyll and Mr. Hyde: Two Faces of LLMs.
CoRR, 2023

NLP-Based Techniques for Cyber Threat Intelligence.
CoRR, 2023

Invisible Threats: Backdoor Attack in OCR Systems.
CoRR, 2023

BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks.
CoRR, 2023

EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks.
CoRR, 2023

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?
CoRR, 2023

GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems.
CoRR, 2023

Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents.
CoRR, 2023

Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations.
CoRR, 2023

Cryptocurrency wallets: assessment and security.
CoRR, 2023

Temporal Dynamics of Coordinated Online Behavior: Stability, Archetypes, and Influence.
CoRR, 2023

Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs.
CoRR, 2023

Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

You Can't Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality.
IEEE Access, 2023

Privacy-Preserving and Security in SDN-Based IoT: A Survey.
IEEE Access, 2023

The Impact of Covid-19 on Online Discussions: the Case Study of the Sanctioned Suicide Forum.
Proceedings of the ACM Web Conference 2023, 2023

BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Leveraging Social Networks for Mergers and Acquisitions Forecasting.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

A First Look at Shill Looping in NFT Ecosystem.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning.
Proceedings of the IEEE Sensors Applications Symposium, 2023

Boosting Big Brother: Attacking Search Engines with Encodings.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Beware of Pickpockets: A Practical Attack against Blocking Cards.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Proceedings of the IEEE INFOCOM 2023, 2023

Are We All in a Truman Show? Spotting Instagram Crowdturfing through Self-Training.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders.
Proceedings of the IEEE International Conference on Communications, 2023

Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks.
Proceedings of the IEEE International Conference on Communications, 2023

Going in Style: Audio Backdoors Through Stylistic Transformations.
Proceedings of the IEEE International Conference on Acoustics, 2023

Balancing Privacy and Accuracy in Federated Learning for Speech Emotion Recognition.
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023

GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Turning Privacy-preserving Mechanisms against Federated Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation.
Proceedings of the IEEE International Conference on Big Data, 2023

If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages.
Proceedings of the Applied Cryptography and Network Security, 2023

STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

OpenScope-sec: An ADS-B Simulator to Support the Security Research.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Netw. Serv. Manag., December, 2022

SPRITZ-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents.
Dataset, September, 2022

Pristine and Malicious URLs.
Dataset, April, 2022

Defeating Adversarial Attacks Againt Adversarial attacks in Network Security.
Dataset, March, 2022

SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships.
IEEE Trans. Serv. Comput., 2022

User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
IEEE/ACM Trans. Netw., 2022

Demystifying the Transferability of Adversarial Attacks in Computer Networks.
IEEE Trans. Netw. Serv. Manag., 2022

DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022

Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
IEEE Trans. Green Commun. Netw., 2022

Covert Channel-Based Transmitter Authentication in Controller Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2022

BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem.
IEEE Trans. Cloud Comput., 2022

A survey and taxonomy of consensus protocols for blockchains.
J. Syst. Archit., 2022

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022

A survey on security challenges and solutions in the IOTA.
J. Netw. Comput. Appl., 2022

On the feasibility of crawling-based attacks against recommender systems.
J. Comput. Secur., 2022

Misinformation Detection on Social Media: Challenges and the Road Ahead.
IT Prof., 2022

Obfuscation detection in Android applications using deep learning.
J. Inf. Secur. Appl., 2022

CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022

Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things.
IEEE Internet Things J., 2022

Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
IEEE Internet Things J., 2022

Effect of DIS Attack on 6TiSCH Network Formation.
IEEE Commun. Lett., 2022

Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs.
IACR Cryptol. ePrint Arch., 2022

On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models.
CoRR, 2022

ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds.
CoRR, 2022

On the Feasibility of Profiling Electric Vehicles through Charging Data.
CoRR, 2022

SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks.
CoRR, 2022

Hyperloop: A Cybersecurity Perspective.
CoRR, 2022

Identity-Based Authentication for On-Demand Charging of Electric Vehicles.
CoRR, 2022

Hide and Seek - Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles.
CoRR, 2022

Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems.
CoRR, 2022

Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy.
CoRR, 2022

Real or Virtual: A Video Conferencing Background Manipulation-Detection System.
CoRR, 2022

Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit.
CoRR, 2022

Detecting High-Quality GAN-Generated Face Images using Neural Networks.
CoRR, 2022

Captcha Attack: Turning Captchas Against Humanity.
CoRR, 2022

Formal model for inter-component communication and its security in android.
Computing, 2022

Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents.
Comput. Secur., 2022

A few-shot malware classification approach for unknown family recognition using malware feature visualization.
Comput. Secur., 2022

An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Comput. Secur., 2022

A machine learning-based approach to detect threats in bio-cyber DNA storage systems.
Comput. Commun., 2022

ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags.
Comput. Networks, 2022

A PLS-HECC-based device authentication and key agreement scheme for smart home networks.
Comput. Networks, 2022

Secure over-the-air software update for connected vehicles.
Comput. Networks, 2022

SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones.
Comput. Networks, 2022

Side-channel attacks on mobile and IoT devices for Cyber-Physical systems.
Comput. Networks, 2022

Virtual Influencers in Online Social Media.
IEEE Commun. Mag., 2022

Software defined network-based HTTP flooding attack defender.
Comput. Electr. Eng., 2022

DeBot: A deep learning-based model for bot detection in industrial internet-of-things.
Comput. Electr. Eng., 2022

Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
IEEE Access, 2022

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews.
IEEE Access, 2022

Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022

The Spread of Propaganda by Coordinated Communities on Social Media.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022

Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand.
Proceedings of the 31st USENIX Security Symposium, 2022

Graph Encryption for Shortest Path Queries with k Unsorted Nodes.
Proceedings of the IEEE International Conference on Trust, 2022

Face Recognition Systems: Are you sure they only consider your face?
Proceedings of the 43rd IEEE Security and Privacy, 2022

SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles.
Proceedings of the 30th International Conference on Software, 2022

VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

What you see is not what you get: a man-in-the-middle attack applied to video channels.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2022

Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Building Embedded Systems Like It's 1996.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering.
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022

ICSpot: A High-Interaction Honeypot for Industrial Control Systems.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Face the Truth: Interpretable Emotion Genuineness Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

PRaNA: PRNU-based Technique to Tell Real and Deepfake Videos Apart.
Proceedings of the International Joint Conference on Neural Networks, 2022

Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Contactless Authentication for Wearable Devices Using RFID.
Proceedings of the IEEE International Conference on Digital Health, 2022

AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

EVExchange: A Relay Attack on Electric Vehicle Charging System.
Proceedings of the Computer Security - ESORICS 2022, 2022

For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection.
Proceedings of the Computer Security - ESORICS 2022, 2022

We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads.
Proceedings of the Computer Security - ESORICS 2022, 2022

MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Label-Only Membership Inference Attack against Node-Level Graph Neural Networks.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

Analyzing Price Deviations in DeFi Oracles.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

PoSC: Combined Score for Consensus in Intemet-of-Things Applications.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

Dynamic Backdoors with Global Average Pooling.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022

SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022

HolA: Holistic and Autonomous Attestation for IoT Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Sim2Testbed Transfer: NDN Performance Evaluation.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Dataset for Real and Virtual Backgrounds of Video Calls.
Dataset, October, 2021

Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence.
IEEE Trans. Sustain. Comput., 2021

AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.
IEEE Trans. Netw. Serv. Manag., 2021

TEL: Low-Latency Failover Traffic Engineering in Data Plane.
IEEE Trans. Netw. Serv. Manag., 2021

Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021

DETONAR: Detection of Routing Attacks in RPL-Based IoT.
IEEE Trans. Netw. Serv. Manag., 2021

DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks.
IEEE Trans. Emerg. Top. Comput., 2021

An SDN-based framework for QoS routing in internet of underwater things.
Telecommun. Syst., 2021

Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole.
IEEE Trans. Circuits Syst. Video Technol., 2021

Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems.
ACM Trans. Cyber Phys. Syst., 2021

A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks.
Pervasive Mob. Comput., 2021

Privacy for 5G-Supported Vehicular Networks.
IEEE Open J. Commun. Soc., 2021

SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling.
J. Netw. Comput. Appl., 2021

Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps.
Int. J. Inf. Sec., 2021

ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN.
Int. J. Inf. Sec., 2021

LEChain: A blockchain-based lawful evidence management scheme for digital forensics.
Future Gener. Comput. Syst., 2021

Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021

Editorial: Special issue on trusted Cloud-Edges computations.
Future Gener. Comput. Syst., 2021

Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions.
Comput. Sci. Rev., 2021

A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics.
CoRR, 2021

EVScout2.0: Electric Vehicle Profiling Through Charging Profile.
CoRR, 2021

Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System.
CoRR, 2021

News consumption and social media regulations policy.
CoRR, 2021

Online Advertising Security: Issues, Taxonomy, and Future Directions.
IEEE Commun. Surv. Tutorials, 2021

A Survey on Industrial Control System Testbeds and Datasets for Security Research.
IEEE Commun. Surv. Tutorials, 2021

Vulnerabilities in Android webview objects: Still not the end!
Comput. Secur., 2021

BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications.
Comput. Commun., 2021

Truck platoon security: State-of-the-art and road ahead.
Comput. Networks, 2021

5G Security Challenges and Solutions: A Review by OSI Layers.
IEEE Access, 2021

FADIA: fairness-driven collaborative remote attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

ICN PATTA: ICN Privacy Attack Through Traffic Analysis.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Malingering Scraper: A Novel Framework to Reconstruct Honest Profiles from Malingerer Psychopathological Tests.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

COTS Drone Detection using Video Streaming Characteristics.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

It's a Matter of Style: Detecting Social Bots through Writing Style Consistency.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Looking Through Walls: Inferring Scenes from Video-Surveillance Encrypted Traffic.
Proceedings of the IEEE International Conference on Acoustics, 2021

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

The Rise of ICS Malware: A Comparative Analysis.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Secure Static Content Delivery for CDN Using Blockchain Technology.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand.
Proceedings of the Computer Security - ESORICS 2021, 2021

Practical Exchange for Unique Digital Goods.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

MiniV2G: An Electric Vehicle Charging Emulator.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

Contact Tracing Made Un-relay-able.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

A threat model method for ICS malware: the TRISIS case.
Proceedings of the CF '21: Computing Frontiers Conference, 2021

Knocking on Tangle's Doors: Security Analysis of IOTA Ports.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Towards An Enhanced Reputation System for IOTA's Coordicide.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

SnakeGX: A Sneaky Attack Against SGX Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks.
Wirel. Networks, 2020

BitProb: Probabilistic Bit Signatures for Accurate Application Identification.
IEEE Trans. Netw. Serv. Manag., 2020

DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures.
IEEE Trans. Netw. Serv. Manag., 2020

A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2020

Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2020

Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel.
IEEE Trans. Inf. Forensics Secur., 2020

SARA: Secure Asynchronous Remote Attestation for IoT Systems.
IEEE Trans. Inf. Forensics Secur., 2020

PermPair: Android Malware Detection Using Permission Pairs.
IEEE Trans. Inf. Forensics Secur., 2020

A Novel Stealthy Attack to Gather SDN Configuration-Information.
IEEE Trans. Emerg. Top. Comput., 2020

A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
ACM Trans. Cyber Phys. Syst., 2020

Privacy Aware Data Deduplication for Side Channel in Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Private Blockchain in Industrial IoT.
IEEE Netw., 2020

On defending against label flipping attacks on malware detection systems.
Neural Comput. Appl., 2020

A robust multicast communication protocol for Low power and Lossy networks.
J. Netw. Comput. Appl., 2020

Deep and broad URL feature mining for android malware detection.
Inf. Sci., 2020

Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.
IEEE Secur. Priv., 2020

TMaR: a two-stage MapReduce scheduler for heterogeneous environments.
Hum. centric Comput. Inf. Sci., 2020

Similarity-based Android malware detection using Hamming distance of static binary features.
Future Gener. Comput. Syst., 2020

Special issue on Trusted Cloud-Edges Computations.
Future Gener. Comput. Syst., 2020

A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
ACM Comput. Surv., 2020

Mascara: A Novel Attack Leveraging Android Virtualization.
CoRR, 2020

Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis.
CoRR, 2020

Online Advertising Security: Issues, Taxonomy, and Future Directions.
CoRR, 2020

The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions.
IEEE Commun. Surv. Tutorials, 2020

Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges.
IEEE Commun. Surv. Tutorials, 2020

LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
Comput. Secur., 2020

Context-based Co-presence detection techniques: A survey.
Comput. Secur., 2020

SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage.
Comput. Commun., 2020

Detection of algorithmically-generated domains: An adversarial machine learning approach.
Comput. Commun., 2020

Security and design requirements for software-defined VANETs.
Comput. Networks, 2020

NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN.
Comput. Networks, 2020

Secure over-the-air software updates in connected vehicles: A survey.
Comput. Networks, 2020

Security issues and challenges in V2X: A Survey.
Comput. Networks, 2020

TAMBUS: A novel authentication method through covert channels for securing industrial networks.
Comput. Networks, 2020

Can machine learning model with static features be fooled: an adversarial machine learning approach.
Clust. Comput., 2020

Attestation-enabled secure and scalable routing protocol for IoT networks.
Ad Hoc Networks, 2020

Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020

Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

UAVs Path Deviation Attacks: Survey and Research Challenges.
Proceedings of the 2020 IEEE International Conference on Sensing, 2020

Spatial bloom filter in named data networking: a memory efficient solution.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

ALISI: a lightweight identification system based on Iroha.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

A Proactive Cache Privacy Attack on NDN.
Proceedings of the NOMS 2020, 2020

PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition.
Proceedings of the Information Security - 23rd International Conference, 2020

SHeFU: Secure Hardware-Enabled Protocol for Firmware Updates.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020

STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
Proceedings of the Computer Security - ESORICS 2020, 2020

Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage.
Proceedings of the Computer Security - ESORICS 2020, 2020

Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.
Proceedings of the Computer Security - ESORICS 2020, 2020

Eathentication: A Chewing-based Authentication Method.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Fake News Spreaders Profiling Through Behavioural Analysis.
Proceedings of the Working Notes of CLEF 2020, 2020

A Statistical Analysis Framework for ICS Process Datasets.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

Detecting Covert Cryptomining Using HPC.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

Proof of Evolution: leveraging blockchain mining for a cooperative execution of Genetic Algorithms.
Proceedings of the IEEE International Conference on Blockchain, 2020

Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics.
Proceedings of the Advances in Human Factors in Cybersecurity, 2020

ASAINT: a spy App identification system based on network traffic.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

CyberWolf: assessing vulnerabilities of ICT-intensive financial markets.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube.
Proceedings of the Influence and Behavior Analysis in Social Networks and Social Media, 2019

LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things.
Wirel. Networks, 2019

Lightweight solutions to counter DDoS attacks in software defined networking.
Wirel. Networks, 2019

A Cyber-Kill-Chain based taxonomy of crypto-ransomware features.
J. Comput. Virol. Hacking Tech., 2019

Wide-Scale Internet Disconnection: Impact and Recovery on Social-Based P2P Overlays.
IEEE Trans. Netw. Sci. Eng., 2019

MapReduce: an infrastructure review and research insights.
J. Supercomput., 2019

Skype & Type: Keyboard Eavesdropping in Voice-over-IP.
ACM Trans. Priv. Secur., 2019

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.
IEEE Trans. Ind. Informatics, 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Secur. Comput., 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.
IEEE Trans. Big Data, 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.
IEEE Trans. Big Data, 2019

FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments.
J. Parallel Distributed Comput., 2019

Towards privacy preserving unstructured big data publishing.
J. Intell. Fuzzy Syst., 2019

PILOT: Password and PIN information leakage from obfuscated typing videos.
J. Comput. Secur., 2019

AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones.
J. Inf. Secur. Appl., 2019

SHeLA: Scalable Heterogeneous Layered Attestation.
IEEE Internet Things J., 2019

You click, I steal: analyzing and detecting click hijacking attacks in web pages.
Int. J. Inf. Sec., 2019

SYN-Guard: An effective counter for SYN flooding attack in software-defined networking.
Int. J. Commun. Syst., 2019

A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware.
IACR Cryptol. ePrint Arch., 2019

Improving Password Guessing via Representation Learning.
IACR Cryptol. ePrint Arch., 2019

A machine learning based approach to detect malicious android apps using discriminant system calls.
Future Gener. Comput. Syst., 2019

SAND: Social-aware, network-failure resilient, and decentralized microblogging system.
Future Gener. Comput. Syst., 2019

SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT.
Future Gener. Comput. Syst., 2019

Intelligent conditional collaborative private data sharing.
Future Gener. Comput. Syst., 2019

(Mis)Information Operations: An Integrated Perspective.
CoRR, 2019

SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices.
CoRR, 2019

Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage.
CoRR, 2019

A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions.
CoRR, 2019

Reliable Group Communication Protocol for Internet of Things.
CoRR, 2019

Secure OTA Software Updates in Connected Vehicles: A survey.
CoRR, 2019

Software defined service function chaining with failure consideration for fog computing.
Concurr. Comput. Pract. Exp., 2019

Identification of Android malware using refined system calls.
Concurr. Comput. Pract. Exp., 2019

CENSOR: Cloud-enabled secure IoT architecture over SDN paradigm.
Concurr. Comput. Pract. Exp., 2019

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Efficient privacy preserving device authentication in WBANs for industrial e-health applications.
Comput. Secur., 2019

Analysis and classification of context-based malware behavior.
Comput. Commun., 2019

Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN.
Comput. Networks, 2019

Efficient physical intrusion detection in Internet of Things: A Node deployment approach.
Comput. Networks, 2019

BlockA<i>uth</i>: BlockChain based distributed producer authentication in ICN.
Comput. Networks, 2019

Mobility-aware cross-layer routing for peer-to-peer networks.
Comput. Electr. Eng., 2019

Fast multi-hop broadcast of alert messages in VANETs: An analytical model.
Ad Hoc Networks, 2019

ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN.
Proceedings of the Wired/Wireless Internet Communications, 2019

Threat is in the Air: Machine Learning for Wireless Network Applications.
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019

MimePot: a Model-based Honeypot for Industrial Control Networks.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

KingFisher: an Industrial Security Framework based on Variational Autoencoders.
Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems, 2019

RADIS: Remote Attestation of Distributed IoT Services.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystem.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks.
Proceedings of the 5th IEEE International Symposium on Measurements & Networking, 2019

CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Remote Attestation as a Service for IoT.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the IEEE INFOCOM 2019, 2019

SoFA: A Spark-oriented Fog Architecture.
Proceedings of the IECON 2019, 2019

TACAN: transmitter authentication through covert channels in controller area networks.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

A New Secure Data Dissemination Model in Internet of Drones.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

SACHa: Self-Attestation of Configurable Hardware.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Detecting ADS-B Spoofing Attacks Using Deep Neural Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

AMON: an Automaton MONitor for Industrial Cyber-Physical Security.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

On the Exploitation of Online SMS Receiving Services to Forge ID Verification.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Secure Machine to Machine Communication in Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
Wirel. Networks, 2018

Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
IEEE Trans. Smart Grid, 2018

SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
IEEE Trans. Netw. Serv. Manag., 2018

DELTA: Data Extraction and Logging Tool for Android.
IEEE Trans. Mob. Comput., 2018

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomed. Health Informatics, 2018

Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Inf. Forensics Secur., 2018

Robust Smartphone App Identification via Encrypted Network Traffic Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2018

Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles.
Online Soc. Networks Media, 2018

Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intell. Humaniz. Comput., 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018

An efficient routing protocol for the QoS support of large-scale MANETs.
Int. J. Commun. Syst., 2018

Internet of Things security and forensics: Challenges and opportunities.
Future Gener. Comput. Syst., 2018

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018

The insider on the outside: a novel system for the detection of information leakers in social networks.
Eur. J. Inf. Syst., 2018

A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
ACM Comput. Surv., 2018

FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware.
CoRR, 2018

All You Need is "Love": Evading Hate-speech Detection.
CoRR, 2018

A Survey on Context-based Co-presence Detection Techniques.
CoRR, 2018

Cyber Threat Intelligence : Challenges and Opportunities.
CoRR, 2018

SCARR: A Novel Scalable Runtime Remote Attestation.
CoRR, 2018

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis.
IEEE Commun. Surv. Tutorials, 2018

A Survey on Security and Privacy Issues of Bitcoin.
IEEE Commun. Surv. Tutorials, 2018

Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
IEEE Commun. Surv. Tutorials, 2018

On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Comput. Secur., 2018

Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks.
Comput. Commun., 2018

Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN.
Comput. Commun., 2018

Advertising in the IoT Era: Vision and Challenges.
IEEE Commun. Mag., 2018

Secure Comparison Under Ideal/Real Simulation Paradigm.
IEEE Access, 2018

QoE Degradation Attack in Dynamic Adaptive Streaming Over ICN.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Proceedings of the 27th USENIX Security Symposium, 2018

PADS: Practical Attestation for Highly Dynamic Swarm Topologies.
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018

Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

Leveraging Blockchain to Enable Smart-Health Applications.
Proceedings of the 4th IEEE International Forum on Research and Technology for Society and Industry, 2018

A Novel Architecture for Cyber-Physical Security in Industrial Control Networks.
Proceedings of the 4th IEEE International Forum on Research and Technology for Society and Industry, 2018

Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Optimizing Message Ferry Scheduling in a DTN.
Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018

GATE and FENCE: Geo-Blocking Protocols for Named Data Networking.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

IaaS-Aided Access Control for Information-Centric IoT.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Deep and Broad Learning Based Detection of Android Malware via Network Traffic.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Malware Signature Generation Using Locality Sensitive Hashing.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

RARE: Defeating side channels based on data-deduplication in cloud storage.
Proceedings of the IEEE INFOCOM 2018, 2018

POSTER: An Intelligent Framework to Parallelize Hadoop Phases.
Proceedings of the Poster Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices.
Proceedings of the Computer Security, 2018

Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Emergency Access Control Management Via Attribute Based Encrypted QR Codes.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

IoT-enabled smart lighting systems for smart cities.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

All You Need is: Evading Hate Speech Detection.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around).
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

The position cheating attack on inter-vehicular online gaming.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

Distributed Services Attestation in IoT.
Proceedings of the From Database to Cyber Security, 2018

AppHunter: Mobile Application Traffic Classification.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks.
ACM Trans. Internet Techn., 2017

SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
IEEE Trans. Netw. Serv. Manag., 2017

Drone Path Planning for Secure Positioning and Secure Position Verification.
IEEE Trans. Mob. Comput., 2017

EnergIoT: A solution to improve network lifetime of IoT devices.
Pervasive Mob. Comput., 2017

Anonymous end-to-end communications in adversarial mobile clouds.
Pervasive Mob. Comput., 2017

Forensics Analysis of Android Mobile VoIP Apps.
CoRR, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
CoRR, 2017

A Survey on the Security of Stateful SDN Data Planes.
IEEE Commun. Surv. Tutorials, 2017

PIndroid: A novel Android malware detection system using ensemble learning methods.
Comput. Secur., 2017

Android inter-app communication threats and detection techniques.
Comput. Secur., 2017

DDoS attacks in cloud computing: Issues, taxonomy, and future directions.
Comput. Commun., 2017

Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions.
IEEE Cloud Comput., 2017

DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Comput. Electr. Eng., 2017

Service resizing for quick DDoS mitigation in cloud computing environment.
Ann. des Télécommunications, 2017

Toward secure and efficient attestation for highly dynamic swarms: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A roaming-based denial of service attack on LTE networks: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A comprehensive and effective mechanism for DDoS detection in SDN.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

SNIFFO: Security of networks and intelligence for field operations.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Practical extensions to countermeasure DoS attacks in software defined networking.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Blocking intrusions at border using software defined-internet exchange point (SD-IXP).
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

A Novel Distributed Fog-Based Networked Architecture to Preserve Energy in Fog Data Centers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Panorama: Real-time bird's eye view of an OpenFlow network.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

FADEWICH: Fast Deauthentication Over the Wireless Channel.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Ensuring information security by using Haskell's advanced type system.
Proceedings of the International Carnahan Conference on Security Technology, 2017

GolfEngine: Network management system for software defined networking.
Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing, 2017

You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
Proceedings of the Computer Security - ESORICS 2017, 2017

Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Proceedings of the Risks and Security of Internet and Systems, 2017

Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Do we need a holistic approach for the design of secure IoT systems?
Proceedings of the Computing Frontiers Conference, 2017

Detection of Information Leaks via Reflection in Android Apps.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Proceedings of the Applied Cryptography and Network Security, 2017

Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Applications of Trusted Computing in Cloud Context.
Proceedings of the Research Advances in Cloud Computing, 2017

Analysis of Security in Modern Container Platforms.
Proceedings of the Research Advances in Cloud Computing, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Forensics Analysis of Android Mobile VoIP Apps.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis.
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016

Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Analyzing Android Encrypted Network Traffic to Identify User Actions.
IEEE Trans. Inf. Forensics Secur., 2016

Modeling Enlargement Attacks Against UWB Distance Bounding Protocols.
IEEE Trans. Inf. Forensics Secur., 2016

Biometric Authentication Methods on Smartphones: A Survey.
PsychNology J., 2016

Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Proc. Priv. Enhancing Technol., 2016

On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
IEEE Micro, 2016

Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016

Android App Collusion Threat and Mitigation Techniques.
CoRR, 2016

Security and Privacy Analysis of NSF Future Internet Architectures.
CoRR, 2016

A Survey of Man In The Middle Attacks.
IEEE Commun. Surv. Tutorials, 2016

Colluding browser extension attack on user privacy and its implication for web browsers.
Comput. Secur., 2016

ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs.
Comput. Commun., 2016

DDoS attacks in cloud computing: Collateral damage to non-targets.
Comput. Networks, 2016

The impact of malicious nodes positioning on vehicular alert messaging system.
Ad Hoc Networks, 2016

POSTER: Toward a Secure and Scalable Attestation.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
Proceedings of the 25th USENIX Security Symposium, 2016

RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions.
Proceedings of the Symbiotic Interaction, 2016

ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Amplified Distributed Denial of Service Attack in Software Defined Networking.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Towards a realistic model for failure propagation in interdependent networks.
Proceedings of the 2016 International Conference on Computing, 2016

ELBA: Efficient Layer Based Routing Algorithm in SDN.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Mind The Plug! Laptop-User Recognition Through Power Consumption.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

SANA: Secure and Scalable Aggregate Network Attestation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

FlowMine: Android app analysis via data flow.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A Host and Network Based Intrusion Detection for Android Smartphones.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
Proceedings of the Applied Cryptography and Network Security, 2016

OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

Anonymity in an Electronic Society: A Survey.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Privacy for LBSs: On Using a Footprint Model to Face the Enemy.
Proceedings of the Advanced Research in Data Privacy, 2015

Secure Wireless Sensor Networks - Threats and Solutions
Advances in Information Security 65, Springer, ISBN: 978-1-4939-3460-7, 2015

Provable Storage Medium for Data Storage Outsourcing.
IEEE Trans. Serv. Comput., 2015

Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
IEEE Trans. Parallel Distributed Syst., 2015

Employing Program Semantics for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2015

To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
CoRR, 2015

Android Security: A Survey of Issues, Malware Penetration, and Defenses.
IEEE Commun. Surv. Tutorials, 2015

Robust access control framework for mobile cloud computing network.
Comput. Commun., 2015

The verifier bee: A path planner for drone-based secure location verification.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Impact of country-scale Internet disconnection on structured and social P2P overlays.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

TRAP: Using Targeted ads to unveil Google personal profiles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

EyeCloud: A BotCloud Detection System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A robust dynamic analysis system preventing SandBox detection by Android malware.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

On the Feasibility of Attribute-Based Encryption on Smartphone Devices.
Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015

Hand Drawn Optical Circuit Recognition.
Proceedings of the Proceeding of the Seventh International Conference on Intelligent Human Computer Interaction, 2015

Impact of security threats in vehicular alert messaging systems.
Proceedings of the IEEE International Conference on Communication, 2015

Toward an Anonymous Process Mining.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Obfuscation and Diversification for Securing Cloud Computing.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Brain-Computer Interface applications: Security and privacy challenges.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

CaT: Evaluating cloud-aided TLS for smartphone energy efficiency.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Verifiable and privacy-preserving fine-grained data-collection for smart metering.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Proceedings of the 10th ACM Symposium on Information, 2015

Revealing Censored Information Through Comments and Commenters in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
IEEE Trans. Serv. Comput., 2014

Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication.
IEEE Trans. Intell. Transp. Syst., 2014

Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
IEEE Trans. Inf. Forensics Secur., 2014

MOSES: Supporting and Enforcing Security Profiles on Smartphones.
IEEE Trans. Dependable Secur. Comput., 2014

Clone wars: Distributed detection of clone attacks in mobile WSNs.
J. Comput. Syst. Sci., 2014

A secure alert messaging system for safe driving.
Comput. Commun., 2014

Smart health: A context-aware health paradigm within smart cities.
IEEE Commun. Mag., 2014

Attack Resilient Underwater Networks Through Software Defined Networking.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014

Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Privacy Leakage Attacks in Browsers by Colluding Extensions.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Secure Message Delivery Games for Device-to-Device Communications.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Proceedings of the Computer Security - ESORICS 2014, 2014

Environment-Reactive Malware Behavior: Detection and Categorization.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
Proceedings of the Risks and Security of Internet and Systems, 2014

VirtualFriendship: Hiding interactions on Online Social Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

OASIS: Operational Access Sandboxes for Information Security.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Covert ephemeral communication in named data networking.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Virtual private social networks and a facebook implementation.
ACM Trans. Web, 2013

Hybrid Static-Runtime Information Flow and Declassification Enforcement.
IEEE Trans. Inf. Forensics Secur., 2013

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
IEEE Trans. Inf. Forensics Secur., 2013

Preserving privacy against external and internal threats in WSN data aggregation.
Telecommun. Syst., 2013

Windows Mobile LiveSD Forensics.
J. Netw. Comput. Appl., 2013

Providing Source Location Privacy in Wireless Sensor Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2013

A lightweight mechanism for detection of cache pollution attacks in Named Data Networking.
Comput. Networks, 2013

Smartphone and Laptop Frameworks for vehicular networking experimentation.
Proceedings of the IFIP Wireless Days, 2013

MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Friend in the Middle (FiM): Tackling de-anonymization in social networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Secure Verification of Location Claims on a Vehicular Safety Application.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Preserving Smartphone Users' Anonymity in Cloudy Days.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

ContextOS: A Context Aware Operating System for Mobile Devices.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

CREPUSCOLO: A collusion resistant privacy preserving location verification system.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Secure Data Aggregation in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2012

CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
IEEE Trans. Inf. Forensics Secur., 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
Proceedings of the Security Protocols XX, 2012

MOSES: supporting operation modes on smartphones.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Wireless Sensor Replica Detection in Mobile Environments.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Demonstrating the effectiveness of MOSES for separation of execution modes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

FakeBook: Detecting Fake Profiles in On-Line Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Secure topology maintenance and events collection in WSNs.
Secur. Commun. Networks, 2011

CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
Int. J. Inf. Sec., 2011

"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
EURASIP J. Wirel. Commun. Netw., 2011

Events privacy in WSNs: A new model and its application.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Virtual private social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
eRIPP-FS: Enforcing privacy and security in RFID.
Secur. Commun. Networks, 2010

Censorship-Resilient Communications through Information Scattering.
Proceedings of the Security Protocols XVIII, 2010

Censorship-Resilient Communications through Information Scattering (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

CED<sup>2</sup>: Communication Efficient Disjointness Decision.
Proceedings of the Security and Privacy in Communication Networks, 2010

The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

CRePE: Context-Related Policy Enforcement for Android.
Proceedings of the Information Security - 13th International Conference, 2010

Event Handoff Unobservability in WSN.
Proceedings of the Open Research Problems in Network Security, 2010

Time Warp: How Time Affects Privacy in LBSs.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Privacy-preserving robust data aggregation in wireless sensor networks.
Secur. Commun. Networks, 2009

Distributed data source verification in wireless sensor networks.
Inf. Fusion, 2009

Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
EURASIP J. Wirel. Commun. Netw., 2009

Secure median computation in wireless sensor networks.
Ad Hoc Networks, 2009

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009

2008
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Securely computing an approximate median in wireless sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

2006
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006

Secure Cooperative Channel Establishment inWireless Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006


  Loading...