Mauro Conti

Affiliations:
  • University of Padua, Italy


According to our database1, Mauro Conti authored at least 423 papers between 2006 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Captcha Attack: Turning Captchas Against Humanity.
CoRR, 2022

AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

2021
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence.
IEEE Trans. Sustain. Comput., 2021

AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller.
IEEE Trans. Netw. Serv. Manag., 2021

TEL: Low-Latency Failover Traffic Engineering in Data Plane.
IEEE Trans. Netw. Serv. Manag., 2021

Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021

DETONAR: Detection of Routing Attacks in RPL-Based IoT.
IEEE Trans. Netw. Serv. Manag., 2021

DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks.
IEEE Trans. Emerg. Top. Comput., 2021

An SDN-based framework for QoS routing in internet of underwater things.
Telecommun. Syst., 2021

Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole.
IEEE Trans. Circuits Syst. Video Technol., 2021

Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems.
ACM Trans. Cyber Phys. Syst., 2021

A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks.
Pervasive Mob. Comput., 2021

Privacy for 5G-Supported Vehicular Networks.
IEEE Open J. Commun. Soc., 2021

SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling.
J. Netw. Comput. Appl., 2021

Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps.
Int. J. Inf. Sec., 2021

ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN.
Int. J. Inf. Sec., 2021

LEChain: A blockchain-based lawful evidence management scheme for digital forensics.
Future Gener. Comput. Syst., 2021

Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021

Editorial: Special issue on trusted Cloud-Edges computations.
Future Gener. Comput. Syst., 2021

Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions.
Comput. Sci. Rev., 2021

Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand.
CoRR, 2021

Demystifying the Transferability of Adversarial Attacks in Computer Networks.
CoRR, 2021

A Survey on Security and Privacy Issues of UAVs.
CoRR, 2021

The Spread of Propaganda by Coordinated Communities on Social Media.
CoRR, 2021

A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics.
CoRR, 2021

Can You Hear It? Backdoor Attacks via Ultrasonic Triggers.
CoRR, 2021

EVScout2.0: Electric Vehicle Profiling Through Charging Profile.
CoRR, 2021

Do Not Deceive Your Employer with a Virtual Background: A Video Conferencing Manipulation-Detection System.
CoRR, 2021

News consumption and social media regulations policy.
CoRR, 2021

MiniV2G: An Electric Vehicle Charging Emulator.
CoRR, 2021

Online Advertising Security: Issues, Taxonomy, and Future Directions.
IEEE Commun. Surv. Tutorials, 2021

A Survey on Industrial Control System Testbeds and Datasets for Security Research.
IEEE Commun. Surv. Tutorials, 2021

Vulnerabilities in Android webview objects: Still not the end!
Comput. Secur., 2021

BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications.
Comput. Commun., 2021

Truck platoon security: State-of-the-art and road ahead.
Comput. Networks, 2021

5G Security Challenges and Solutions: A Review by OSI Layers.
IEEE Access, 2021

FADIA: fairness-driven collaborative remote attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

ICN PATTA: ICN Privacy Attack Through Traffic Analysis.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

COTS Drone Detection using Video Streaming Characteristics.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

It's a Matter of Style: Detecting Social Bots through Writing Style Consistency.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Looking Through Walls: Inferring Scenes from Video-Surveillance Encrypted Traffic.
Proceedings of the IEEE International Conference on Acoustics, 2021

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand.
Proceedings of the Computer Security - ESORICS 2021, 2021

Practical Exchange for Unique Digital Goods.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

Contact Tracing Made Un-relay-able.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

A threat model method for ICS malware: the TRISIS case.
Proceedings of the CF '21: Computing Frontiers Conference, 2021

Towards An Enhanced Reputation System for IOTA's Coordicide.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

SnakeGX: A Sneaky Attack Against SGX Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks.
Wirel. Networks, 2020

BitProb: Probabilistic Bit Signatures for Accurate Application Identification.
IEEE Trans. Netw. Serv. Manag., 2020

DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures.
IEEE Trans. Netw. Serv. Manag., 2020

A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2020

Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2020

Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel.
IEEE Trans. Inf. Forensics Secur., 2020

SARA: Secure Asynchronous Remote Attestation for IoT Systems.
IEEE Trans. Inf. Forensics Secur., 2020

PermPair: Android Malware Detection Using Permission Pairs.
IEEE Trans. Inf. Forensics Secur., 2020

A Novel Stealthy Attack to Gather SDN Configuration-Information.
IEEE Trans. Emerg. Top. Comput., 2020

A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
ACM Trans. Cyber Phys. Syst., 2020

Privacy Aware Data Deduplication for Side Channel in Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Private Blockchain in Industrial IoT.
IEEE Netw., 2020

On defending against label flipping attacks on malware detection systems.
Neural Comput. Appl., 2020

A robust multicast communication protocol for Low power and Lossy networks.
J. Netw. Comput. Appl., 2020

Deep and broad URL feature mining for android malware detection.
Inf. Sci., 2020

Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.
IEEE Secur. Priv., 2020

TMaR: a two-stage MapReduce scheduler for heterogeneous environments.
Hum. centric Comput. Inf. Sci., 2020

Similarity-based Android malware detection using Hamming distance of static binary features.
Future Gener. Comput. Syst., 2020

Special issue on Trusted Cloud-Edges Computations.
Future Gener. Comput. Syst., 2020

A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
ACM Comput. Surv., 2020

Mascara: A Novel Attack Leveraging Android Virtualization.
CoRR, 2020

A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems.
CoRR, 2020

Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis.
CoRR, 2020

Online Advertising Security: Issues, Taxonomy, and Future Directions.
CoRR, 2020

Information Consumption and Social Response in a Segregated Environment: the Case of Gab.
CoRR, 2020

The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions.
IEEE Commun. Surv. Tutorials, 2020

Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges.
IEEE Commun. Surv. Tutorials, 2020

LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
Comput. Secur., 2020

Context-based Co-presence detection techniques: A survey.
Comput. Secur., 2020

SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage.
Comput. Commun., 2020

Detection of algorithmically-generated domains: An adversarial machine learning approach.
Comput. Commun., 2020

Security and design requirements for software-defined VANETs.
Comput. Networks, 2020

NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN.
Comput. Networks, 2020

Secure over-the-air software updates in connected vehicles: A survey.
Comput. Networks, 2020

Security issues and challenges in V2X: A Survey.
Comput. Networks, 2020

TAMBUS: A novel authentication method through covert channels for securing industrial networks.
Comput. Networks, 2020

Can machine learning model with static features be fooled: an adversarial machine learning approach.
Clust. Comput., 2020

Attestation-enabled secure and scalable routing protocol for IoT networks.
Ad Hoc Networks, 2020

Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020

Peek-a-boo: i see your smart home activities, even encrypted!
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

UAVs Path Deviation Attacks: Survey and Research Challenges.
Proceedings of the 2020 IEEE International Conference on Sensing, 2020

Spatial bloom filter in named data networking: a memory efficient solution.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

ALISI: a lightweight identification system based on Iroha.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

A Proactive Cache Privacy Attack on NDN.
Proceedings of the NOMS 2020, 2020

PvP: Profiling Versus Player! Exploiting Gaming Data for Player Recognition.
Proceedings of the Information Security - 23rd International Conference, 2020

SHeFU: Secure Hardware-Enabled Protocol for Firmware Updates.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020

STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
Proceedings of the Computer Security - ESORICS 2020, 2020

Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage.
Proceedings of the Computer Security - ESORICS 2020, 2020

Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.
Proceedings of the Computer Security - ESORICS 2020, 2020

Eathentication: A Chewing-based Authentication Method.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Fake News Spreaders Profiling Through Behavioural Analysis.
Proceedings of the Working Notes of CLEF 2020, 2020

A Statistical Analysis Framework for ICS Process Datasets.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

Detecting Covert Cryptomining Using HPC.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

Proof of Evolution: leveraging blockchain mining for a cooperative execution of Genetic Algorithms.
Proceedings of the IEEE International Conference on Blockchain, 2020

Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

Predicting Twitter Users' Political Orientation: An Application to the Italian Political Scenario.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics.
Proceedings of the Advances in Human Factors in Cybersecurity, 2020

ASAINT: a spy App identification system based on network traffic.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

CyberWolf: assessing vulnerabilities of ICT-intensive financial markets.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube.
Proceedings of the Influence and Behavior Analysis in Social Networks and Social Media, 2019

LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things.
Wirel. Networks, 2019

Lightweight solutions to counter DDoS attacks in software defined networking.
Wirel. Networks, 2019

A Cyber-Kill-Chain based taxonomy of crypto-ransomware features.
J. Comput. Virol. Hacking Tech., 2019

Wide-Scale Internet Disconnection: Impact and Recovery on Social-Based P2P Overlays.
IEEE Trans. Netw. Sci. Eng., 2019

MapReduce: an infrastructure review and research insights.
J. Supercomput., 2019

Skype & Type: Keyboard Eavesdropping in Voice-over-IP.
ACM Trans. Priv. Secur., 2019

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.
IEEE Trans. Ind. Informatics, 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Secur. Comput., 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.
IEEE Trans. Big Data, 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.
IEEE Trans. Big Data, 2019

FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments.
J. Parallel Distributed Comput., 2019

Towards privacy preserving unstructured big data publishing.
J. Intell. Fuzzy Syst., 2019

PILOT: Password and PIN information leakage from obfuscated typing videos.
J. Comput. Secur., 2019

AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones.
J. Inf. Secur. Appl., 2019

SHeLA: Scalable Heterogeneous Layered Attestation.
IEEE Internet Things J., 2019

You click, I steal: analyzing and detecting click hijacking attacks in web pages.
Int. J. Inf. Sec., 2019

SYN-Guard: An effective counter for SYN flooding attack in software-defined networking.
Int. J. Commun. Syst., 2019

A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware.
IACR Cryptol. ePrint Arch., 2019

Improving Password Guessing via Representation Learning.
IACR Cryptol. ePrint Arch., 2019

A machine learning based approach to detect malicious android apps using discriminant system calls.
Future Gener. Comput. Syst., 2019

SAND: Social-aware, network-failure resilient, and decentralized microblogging system.
Future Gener. Comput. Syst., 2019

SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT.
Future Gener. Comput. Syst., 2019

Intelligent conditional collaborative private data sharing.
Future Gener. Comput. Syst., 2019

(Mis)Information Operations: An Integrated Perspective.
CoRR, 2019

Covert Channel-Based Transmitter Authentication in Controller Area Networks.
CoRR, 2019

SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices.
CoRR, 2019

Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage.
CoRR, 2019

A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions.
CoRR, 2019

Reliable Group Communication Protocol for Internet of Things.
CoRR, 2019

Secure OTA Software Updates in Connected Vehicles: A survey.
CoRR, 2019

Software defined service function chaining with failure consideration for fog computing.
Concurr. Comput. Pract. Exp., 2019

Identification of Android malware using refined system calls.
Concurr. Comput. Pract. Exp., 2019

CENSOR: Cloud-enabled secure IoT architecture over SDN paradigm.
Concurr. Comput. Pract. Exp., 2019

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Efficient privacy preserving device authentication in WBANs for industrial e-health applications.
Comput. Secur., 2019

Analysis and classification of context-based malware behavior.
Comput. Commun., 2019

Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN.
Comput. Networks, 2019

Efficient physical intrusion detection in Internet of Things: A Node deployment approach.
Comput. Networks, 2019

BlockA<i>uth</i>: BlockChain based distributed producer authentication in ICN.
Comput. Networks, 2019

Mobility-aware cross-layer routing for peer-to-peer networks.
Comput. Electr. Eng., 2019

Fast multi-hop broadcast of alert messages in VANETs: An analytical model.
Ad Hoc Networks, 2019

ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN.
Proceedings of the Wired/Wireless Internet Communications, 2019

Threat is in the Air: Machine Learning for Wireless Network Applications.
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019

MimePot: a Model-based Honeypot for Industrial Control Networks.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

KingFisher: an Industrial Security Framework based on Variational Autoencoders.
Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems, 2019

RADIS: Remote Attestation of Distributed IoT Services.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

Don't hesitate to share!: a novel IoT data protection scheme based on BGN cryptosystem.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks.
Proceedings of the 5th IEEE International Symposium on Measurements & Networking, 2019

CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDN.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Remote Attestation as a Service for IoT.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the IEEE INFOCOM 2019, 2019

SoFA: A Spark-oriented Fog Architecture.
Proceedings of the IECON 2019, 2019

TACAN: transmitter authentication through covert channels in controller area networks.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

A New Secure Data Dissemination Model in Internet of Drones.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

SACHa: Self-Attestation of Configurable Hardware.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Detecting ADS-B Spoofing Attacks Using Deep Neural Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

AMON: an Automaton MONitor for Industrial Cyber-Physical Security.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

On the Exploitation of Online SMS Receiving Services to Forge ID Verification.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Secure Machine to Machine Communication in Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Enhancing QoE for video streaming in MANETs via multi-constraint routing.
Wirel. Networks, 2018

Provably Secure Authenticated Key Agreement Scheme for Smart Grid.
IEEE Trans. Smart Grid, 2018

SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
IEEE Trans. Netw. Serv. Manag., 2018

DELTA: Data Extraction and Logging Tool for Android.
IEEE Trans. Mob. Comput., 2018

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.
IEEE J. Biomed. Health Informatics, 2018

Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Inf. Forensics Secur., 2018

Robust Smartphone App Identification via Encrypted Network Traffic Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2018

Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles.
Online Soc. Networks Media, 2018

Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intell. Humaniz. Comput., 2018

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks.
IEEE Internet Things J., 2018

An efficient routing protocol for the QoS support of large-scale MANETs.
Int. J. Commun. Syst., 2018

Internet of Things security and forensics: Challenges and opportunities.
Future Gener. Comput. Syst., 2018

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018

The insider on the outside: a novel system for the detection of information leakers in social networks.
Eur. J. Inf. Syst., 2018

A Survey on Homomorphic Encryption Schemes: Theory and Implementation.
ACM Comput. Surv., 2018

FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware.
CoRR, 2018

All You Need is "Love": Evading Hate-speech Detection.
CoRR, 2018

A Survey on Context-based Co-presence Detection Techniques.
CoRR, 2018

Cyber Threat Intelligence : Challenges and Opportunities.
CoRR, 2018

SCARR: A Novel Scalable Runtime Remote Attestation.
CoRR, 2018

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis.
IEEE Commun. Surv. Tutorials, 2018

A Survey on Security and Privacy Issues of Bitcoin.
IEEE Commun. Surv. Tutorials, 2018

Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
IEEE Commun. Surv. Tutorials, 2018

On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Comput. Secur., 2018

Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks.
Comput. Commun., 2018

Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN.
Comput. Commun., 2018

Advertising in the IoT Era: Vision and Challenges.
IEEE Commun. Mag., 2018

Secure Comparison Under Ideal/Real Simulation Paradigm.
IEEE Access, 2018

QoE Degradation Attack in Dynamic Adaptive Streaming Over ICN.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Proceedings of the 27th USENIX Security Symposium, 2018

PADS: Practical Attestation for Highly Dynamic Swarm Topologies.
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018

Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

Leveraging Blockchain to Enable Smart-Health Applications.
Proceedings of the 4th IEEE International Forum on Research and Technology for Society and Industry, 2018

A Novel Architecture for Cyber-Physical Security in Industrial Control Networks.
Proceedings of the 4th IEEE International Forum on Research and Technology for Society and Industry, 2018

Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Optimizing Message Ferry Scheduling in a DTN.
Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, 2018

GATE and FENCE: Geo-Blocking Protocols for Named Data Networking.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

IaaS-Aided Access Control for Information-Centric IoT.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Deep and Broad Learning Based Detection of Android Malware via Network Traffic.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Malware Signature Generation Using Locality Sensitive Hashing.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

RARE: Defeating side channels based on data-deduplication in cloud storage.
Proceedings of the IEEE INFOCOM 2018, 2018

POSTER: An Intelligent Framework to Parallelize Hadoop Phases.
Proceedings of the Poster Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices.
Proceedings of the Computer Security, 2018

Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Emergency Access Control Management Via Attribute Based Encrypted QR Codes.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

IoT-enabled smart lighting systems for smart cities.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

All You Need is: Evading Hate Speech Detection.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around).
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

The position cheating attack on inter-vehicular online gaming.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

Distributed Services Attestation in IoT.
Proceedings of the From Database to Cyber Security, 2018

AppHunter: Mobile Application Traffic Classification.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks.
ACM Trans. Internet Techn., 2017

SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks.
IEEE Trans. Netw. Serv. Manag., 2017

Drone Path Planning for Secure Positioning and Secure Position Verification.
IEEE Trans. Mob. Comput., 2017

EnergIoT: A solution to improve network lifetime of IoT devices.
Pervasive Mob. Comput., 2017

Anonymous end-to-end communications in adversarial mobile clouds.
Pervasive Mob. Comput., 2017

Forensics Analysis of Android Mobile VoIP Apps.
CoRR, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
CoRR, 2017

A Survey on the Security of Stateful SDN Data Planes.
IEEE Commun. Surv. Tutorials, 2017

PIndroid: A novel Android malware detection system using ensemble learning methods.
Comput. Secur., 2017

Android inter-app communication threats and detection techniques.
Comput. Secur., 2017

DDoS attacks in cloud computing: Issues, taxonomy, and future directions.
Comput. Commun., 2017

Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions.
IEEE Cloud Comput., 2017

DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Comput. Electr. Eng., 2017

Service resizing for quick DDoS mitigation in cloud computing environment.
Ann. des Télécommunications, 2017

Toward secure and efficient attestation for highly dynamic swarms: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A roaming-based denial of service attack on LTE networks: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A comprehensive and effective mechanism for DDoS detection in SDN.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

SNIFFO: Security of networks and intelligence for field operations.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Practical extensions to countermeasure DoS attacks in software defined networking.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Blocking intrusions at border using software defined-internet exchange point (SD-IXP).
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

A Novel Distributed Fog-Based Networked Architecture to Preserve Energy in Fog Data Centers.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Panorama: Real-time bird's eye view of an OpenFlow network.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

FADEWICH: Fast Deauthentication Over the Wireless Channel.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Ensuring information security by using Haskell's advanced type system.
Proceedings of the International Carnahan Conference on Security Technology, 2017

GolfEngine: Network management system for software defined networking.
Proceedings of the 13th IEEE International Conference on Intelligent Computer Communication and Processing, 2017

You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Know Your Enemy: Stealth Configuration-Information Gathering in SDN.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
Proceedings of the Computer Security - ESORICS 2017, 2017

Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Proceedings of the Risks and Security of Internet and Systems, 2017

Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Do we need a holistic approach for the design of secure IoT systems?
Proceedings of the Computing Frontiers Conference, 2017

Detection of Information Leaks via Reflection in Android Apps.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

On the Influence of Emotional Valence Shifts on the Spread of Information in Social Networks.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Proceedings of the Applied Cryptography and Network Security, 2017

Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Applications of Trusted Computing in Cloud Context.
Proceedings of the Research Advances in Cloud Computing, 2017

Analysis of Security in Modern Container Platforms.
Proceedings of the Research Advances in Cloud Computing, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Forensics Analysis of Android Mobile VoIP Apps.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis.
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016

Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Analyzing Android Encrypted Network Traffic to Identify User Actions.
IEEE Trans. Inf. Forensics Secur., 2016

Modeling Enlargement Attacks Against UWB Distance Bounding Protocols.
IEEE Trans. Inf. Forensics Secur., 2016

Biometric Authentication Methods on Smartphones: A Survey.
PsychNology J., 2016

Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Proc. Priv. Enhancing Technol., 2016

On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
IEEE Micro, 2016

Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016

Android App Collusion Threat and Mitigation Techniques.
CoRR, 2016

Security and Privacy Analysis of NSF Future Internet Architectures.
CoRR, 2016

A Survey of Man In The Middle Attacks.
IEEE Commun. Surv. Tutorials, 2016

Colluding browser extension attack on user privacy and its implication for web browsers.
Comput. Secur., 2016

ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs.
Comput. Commun., 2016

DDoS attacks in cloud computing: Collateral damage to non-targets.
Comput. Networks, 2016

The impact of malicious nodes positioning on vehicular alert messaging system.
Ad Hoc Networks, 2016

POSTER: Toward a Secure and Scalable Attestation.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
Proceedings of the 25th USENIX Security Symposium, 2016

RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions.
Proceedings of the Symbiotic Interaction, 2016

ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Amplified Distributed Denial of Service Attack in Software Defined Networking.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Towards a realistic model for failure propagation in interdependent networks.
Proceedings of the 2016 International Conference on Computing, 2016

ELBA: Efficient Layer Based Routing Algorithm in SDN.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Mind The Plug! Laptop-User Recognition Through Power Consumption.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

SANA: Secure and Scalable Aggregate Network Attestation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

FlowMine: Android app analysis via data flow.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A Host and Network Based Intrusion Detection for Android Smartphones.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
Proceedings of the Applied Cryptography and Network Security, 2016

OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

Anonymity in an Electronic Society: A Survey.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Privacy for LBSs: On Using a Footprint Model to Face the Enemy.
Proceedings of the Advanced Research in Data Privacy, 2015

Secure Wireless Sensor Networks - Threats and Solutions
Advances in Information Security 65, Springer, ISBN: 978-1-4939-3460-7, 2015

Provable Storage Medium for Data Storage Outsourcing.
IEEE Trans. Serv. Comput., 2015

Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
IEEE Trans. Parallel Distributed Syst., 2015

Employing Program Semantics for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2015

To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
CoRR, 2015

Android Security: A Survey of Issues, Malware Penetration, and Defenses.
IEEE Commun. Surv. Tutorials, 2015

Robust access control framework for mobile cloud computing network.
Comput. Commun., 2015

The verifier bee: A path planner for drone-based secure location verification.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Impact of country-scale Internet disconnection on structured and social P2P overlays.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

TRAP: Using Targeted ads to unveil Google personal profiles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

EyeCloud: A BotCloud Detection System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A robust dynamic analysis system preventing SandBox detection by Android malware.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

On the Feasibility of Attribute-Based Encryption on Smartphone Devices.
Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015

Hand Drawn Optical Circuit Recognition.
Proceedings of the Proceeding of the Seventh International Conference on Intelligent Human Computer Interaction, 2015

Impact of security threats in vehicular alert messaging systems.
Proceedings of the IEEE International Conference on Communication, 2015

Toward an Anonymous Process Mining.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Obfuscation and Diversification for Securing Cloud Computing.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Brain-Computer Interface applications: Security and privacy challenges.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

CaT: Evaluating cloud-aided TLS for smartphone energy efficiency.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Verifiable and privacy-preserving fine-grained data-collection for smart metering.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Proceedings of the 10th ACM Symposium on Information, 2015

Revealing Censored Information Through Comments and Commenters in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
IEEE Trans. Serv. Comput., 2014

Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication.
IEEE Trans. Intell. Transp. Syst., 2014

Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
IEEE Trans. Inf. Forensics Secur., 2014

MOSES: Supporting and Enforcing Security Profiles on Smartphones.
IEEE Trans. Dependable Secur. Comput., 2014

Clone wars: Distributed detection of clone attacks in mobile WSNs.
J. Comput. Syst. Sci., 2014

A secure alert messaging system for safe driving.
Comput. Commun., 2014

Smart health: A context-aware health paradigm within smart cities.
IEEE Commun. Mag., 2014

Attack Resilient Underwater Networks Through Software Defined Networking.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014

Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Privacy Leakage Attacks in Browsers by Colluding Extensions.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Secure Message Delivery Games for Device-to-Device Communications.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Proceedings of the Computer Security - ESORICS 2014, 2014

Environment-Reactive Malware Behavior: Detection and Categorization.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks.
Proceedings of the Risks and Security of Internet and Systems, 2014

VirtualFriendship: Hiding interactions on Online Social Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

OASIS: Operational Access Sandboxes for Information Security.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Covert ephemeral communication in named data networking.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Virtual private social networks and a facebook implementation.
ACM Trans. Web, 2013

Hybrid Static-Runtime Information Flow and Declassification Enforcement.
IEEE Trans. Inf. Forensics Secur., 2013

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
IEEE Trans. Inf. Forensics Secur., 2013

Preserving privacy against external and internal threats in WSN data aggregation.
Telecommun. Syst., 2013

Windows Mobile LiveSD Forensics.
J. Netw. Comput. Appl., 2013

Providing Source Location Privacy in Wireless Sensor Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2013

A lightweight mechanism for detection of cache pollution attacks in Named Data Networking.
Comput. Networks, 2013

Smartphone and Laptop Frameworks for vehicular networking experimentation.
Proceedings of the IFIP Wireless Days, 2013

MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Friend in the Middle (FiM): Tackling de-anonymization in social networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Secure Verification of Location Claims on a Vehicular Safety Application.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Preserving Smartphone Users' Anonymity in Cloudy Days.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

ContextOS: A Context Aware Operating System for Mobile Devices.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

CREPUSCOLO: A collusion resistant privacy preserving location verification system.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Secure Data Aggregation in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2012

CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
IEEE Trans. Inf. Forensics Secur., 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
Proceedings of the Security Protocols XX, 2012

MOSES: supporting operation modes on smartphones.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Wireless Sensor Replica Detection in Mobile Environments.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Demonstrating the effectiveness of MOSES for separation of execution modes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

FakeBook: Detecting Fake Profiles in On-Line Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Distributed Detection of Clone Attacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Secure topology maintenance and events collection in WSNs.
Secur. Commun. Networks, 2011

CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
Int. J. Inf. Sec., 2011

"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
EURASIP J. Wirel. Commun. Netw., 2011

Events privacy in WSNs: A new model and its application.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Virtual private social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
eRIPP-FS: Enforcing privacy and security in RFID.
Secur. Commun. Networks, 2010

Censorship-Resilient Communications through Information Scattering.
Proceedings of the Security Protocols XVIII, 2010

Censorship-Resilient Communications through Information Scattering (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

CED<sup>2</sup>: Communication Efficient Disjointness Decision.
Proceedings of the Security and Privacy in Communication Networks, 2010

The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

CRePE: Context-Related Policy Enforcement for Android.
Proceedings of the Information Security - 13th International Conference, 2010

Event Handoff Unobservability in WSN.
Proceedings of the Open Research Problems in Network Security, 2010

Time Warp: How Time Affects Privacy in LBSs.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Privacy-preserving robust data aggregation in wireless sensor networks.
Secur. Commun. Networks, 2009

Distributed data source verification in wireless sensor networks.
Inf. Fusion, 2009

Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
EURASIP J. Wirel. Commun. Netw., 2009

Secure median computation in wireless sensor networks.
Ad Hoc Networks, 2009

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009

2008
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Securely computing an approximate median in wireless sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

2006
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006

Secure Cooperative Channel Establishment inWireless Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006


  Loading...