Roberto Di Pietro

Orcid: 0000-0003-1909-0336

Affiliations:
  • HBKU-CSE, Hamad Bin Khalifa University - College of Science and Engineering, Doha, Qatar
  • Roma Tre University, Rome, Italy (former)


According to our database1, Roberto Di Pietro authored at least 280 papers between 2002 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2023, "For contributions to the security of distributed systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Extending device noise measurement capacity for OFDM-based PLC systems: Design, implementation, and on-field validation.
Comput. Networks, December, 2023

Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions.
Comput. Commun., April, 2023

PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2023

PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles.
IEEE Trans. Dependable Secur. Comput., 2023

SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol.
IEEE Trans. Dependable Secur. Comput., 2023

A<sup>2</sup>RID - Anonymous Direct Authentication and Remote Identification of Commercial Drones.
IEEE Internet Things J., 2023

LENTO: Unpredictable Latency-based continuous authEntication for Network inTensive IoT envirOnments.
Future Gener. Comput. Syst., 2023

Inferring Power Grid Information with Power Line Communications: Review and Insights.
CoRR, 2023

Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication.
CoRR, 2023

Adversarial Attacks Neutralization via Data Set Randomization.
CoRR, 2023

Demystifying Misconceptions in Social Bots Research.
CoRR, 2023

DeMi: A Solution to Detect and Mitigate DoS Attacks in SDN.
IEEE Access, 2023

PulseOblivion: An Effective Session-Based Continuous Authentication Scheme Using PPG Signals.
IEEE Access, 2023

Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Secure and Successful Transmission Probability Analysis for PLC Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Subcarrier-Index Modulation for OFDM-based PLC Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Performance Analysis of Physical Layer Security in Power Line Communication Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

The Role of Emojis in Sentiment Analysis of Financial Microblogs.
Proceedings of the Fourth International Conference on Intelligent Data Science Technologies and Applications, 2023

Characterizing the 2022- Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Key Findings.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Account Clustering in the Polkadot Network: Heuristic, Experiments, and Insights.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

LLD: A Low Latency Detection Solution to Thwart Cryptocurrency Pump & Dumps.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Understanding Polkadot Through Graph Analysis: Transaction Model, Network Properties, and Insights.
Proceedings of the Financial Cryptography and Data Security, 2023

UBIC-A Blockchain-Less Cryptocurrency.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023

Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Fake News Propagation: A Review of Epidemic Models, Datasets, and Insights.
ACM Trans. Web, 2022

Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts.
IEEE Trans. Dependable Secur. Comput., 2022

Localization of a Power-Modulated Jammer.
Sensors, 2022

Serverless computing: a security perspective.
J. Cloud Comput., 2022

COVID-19 and cybersecurity.
IET Inf. Secur., 2022

Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons.
IEEE Secur. Priv., 2022

Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures.
IEEE Secur. Priv., 2022

Noise2Weight: On detecting payload weight from drones acoustic emissions.
Future Gener. Comput. Syst., 2022

Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings.
CoRR, 2022

Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions.
CoRR, 2022

Satellite-based communications security: A survey of threats, solutions, and research challenges.
Comput. Networks, 2022

GPS spoofing detection via crowd-sourced information for connected vehicles.
Comput. Networks, 2022

Channel Impulse Response Multilevel Quantization for Power Line Communications.
IEEE Access, 2022

MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT.
Proceedings of the Security and Privacy in Communication Networks, 2022

Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

FN2: Fake News DetectioN Based on Textual and Contextual Features.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Analysis of Polkadot: Architecture, Internals, and Contradictions.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
New Dimensions of Information Warfare
Advances in Information Security 84, Springer, ISBN: 978-3-030-60617-6, 2021

Predicting Influential Users in Online Social Network Groups.
ACM Trans. Knowl. Discov. Data, 2021

MAGNETO: Fingerprinting USB Flash Drives via Unintentional Magnetic Emissions.
ACM Trans. Embed. Comput. Syst., 2021

SOS: Standard-Compliant and Packet Loss Tolerant Security Framework for ADS-B Communications.
IEEE Trans. Dependable Secur. Comput., 2021

Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures.
J. Netw. Comput. Appl., 2021

PPRQ: Privacy-Preserving MAX/MIN Range Queries in IoT Networks.
IEEE Internet Things J., 2021

DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges.
Future Gener. Comput. Syst., 2021

Foundations, Properties, and Security Applications of Puzzles: A Survey.
ACM Comput. Surv., 2021

A Novel Framework for the Analysis of Unknown Transactions in Bitcoin: Theory, Model, and Experimental Results.
CoRR, 2021

Privacy-Preserving and Sustainable Contact Tracing Using Batteryless BLE Beacons.
CoRR, 2021

Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges.
IEEE Commun. Surv. Tutorials, 2021

Cryptomining makes noise: Detecting cryptojacking via Machine Learning.
Comput. Commun., 2021

IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-Enabled Architecture for Contact Tracing.
IEEE Commun. Mag., 2021

Cyber security research in the Arab region: a blooming ecosystem with global ambitions.
Commun. ACM, 2021

Metaverse: Security and Privacy Issues.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Beyond SolarWinds: The Systemic Risks of Critical Infrastructures, State of Play, Future Directions.
Proceedings of the Italian Conference on Cybersecurity, 2021

Modelling a Communication Channel under Jamming: Experimental Model and Applications.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Analysis and Patterns of Unknown Transactions in Bitcoin.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020

LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications.
IEEE Internet Things J., 2020

Fridges on the Highway: Road Traffic Poisoning of Navigation Apps.
CoRR, 2020

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges.
IEEE Commun. Surv. Tutorials, 2020

Emergent properties, models, and laws of behavioral similarities within groups of twitter users.
Comput. Commun., 2020

PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis.
Comput. Networks, 2020

Vessels Cybersecurity: Issues, Challenges, and the Road Ahead.
IEEE Commun. Mag., 2020

Leveraging Jamming to Help Drones Complete Their Mission.
IEEE Access, 2020

BAD: A Blockchain Anomaly Detection Solution.
IEEE Access, 2020

A Longitudinal Study on Web-Sites Password Management (in)Security: Evidence and Remedies.
IEEE Access, 2020

BrokenStrokes: on the (in)security of wireless keyboards.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

GNSS spoofing detection via opportunistic IRIDIUM signals.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

A Survey on Computational Propaganda Detection.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies.
Proceedings of the Risks and Security of Internet and Systems, 2020

SecureAIS - Securing Pairwise Vessels Communications.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN.
Secur. Commun. Networks, 2019

Web-sites password management (in)security: Evidence and remedies.
CoRR, 2019

Crypto Mining Makes Noise.
CoRR, 2019

Picking a Needle in a Haystack: Detecting Drones via Network Traffic Analysis.
CoRR, 2019

EXCHANge: Securing IoT via channel anonymity.
Comput. Commun., 2019

Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios.
IEEE Access, 2019

Detecting Drones Status via Encrypted Traffic Analysis.
Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 2019

Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Location Privacy Issues in the OpenSky Network Crowdsourcing Platform.
Proceedings of the Security and Privacy in Communication Networks, 2019

Reliability of ADS-B communications: novel insights based on an experimental assessment.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Next Generation Information Warfare: Challenges and Research Directions.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions.
Proceedings of the Edge Computing - EDGE 2019, 2019

Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues.
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019

Semantically-Aware Statistical Metrics via Weighting Kernels.
Proceedings of the 2019 IEEE International Conference on Data Science and Advanced Analytics, 2019

DRAKE: Distributed Relay-Assisted Key Establishment.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

JAM-ME: Exploiting Jamming to Accomplish Drone Mission.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

GPU Algorithms for K-Anonymity in Microdata.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling.
IEEE Trans. Dependable Secur. Comput., 2018

Strength of Crowd (SOC) - Defeating a Reactive Jammer in IoT with Decoy Messages.
Sensors, 2018

GopJam: Key-less jamming mitigation via gossiping.
J. Netw. Comput. Appl., 2018

BAD: Blockchain Anomaly Detection.
CoRR, 2018

Docker ecosystem - Vulnerability Analysis.
Comput. Commun., 2018

A Spark Is Enough in a Straw World: A Study of Websites Password Management in the Wild.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

SOS - Securing Open Skies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

ADvISE: Anomaly Detection tool for blockchaIn SystEms.
Proceedings of the 2018 IEEE World Congress on Services, 2018

A blockchain-based Trust System for the Internet of Things.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Key is in the Air: Hacking Remote Keyless Entry Systems.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

Shooting to the Stars: Secure Location Verification via Meteor Burst Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

N-Guard: a Solution to Secure Access to NFC tags.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives.
Proceedings of the From Database to Cyber Security, 2018

2017
Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results.
J. Netw. Comput. Appl., 2017

Enabling broadcast communications in presence of jamming via probabilistic pairing.
Comput. Networks, 2017

The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

HyBIS: Advanced Introspection for Effective Windows Guest Protection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT.
Proceedings of the IEEE International Conference on Communications, 2017

CoLLIDE: CLoud Latency-based IDEntification.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

Exploiting Digital DNA for the Analysis of Similarities in Twitter Behaviours.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

2016
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware.
IEEE Trans. Mob. Comput., 2016

CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix.
ACM Trans. Embed. Comput. Syst., 2016

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments.
IEEE Trans. Dependable Secur. Comput., 2016

DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection.
IEEE Intell. Syst., 2016

Social Fingerprinting - or the Truth About You.
ERCIM News, 2016

HyBIS: Windows Guest Protection through Advanced Memory Introspection.
CoRR, 2016

Proof of ownership for deduplication systems: A secure, scalable, and efficient solution.
Comput. Commun., 2016

CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments.
Comput. Commun., 2016

Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel.
Comput. Networks, 2016

To Docker or Not to Docker: A Security Perspective.
IEEE Cloud Comput., 2016

Logical key hierarchy for groups management in Distributed Online Social Network.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Privacy for LBSs: On Using a Footprint Model to Face the Enemy.
Proceedings of the Advanced Research in Data Privacy, 2015

Provable Storage Medium for Data Storage Outsourcing.
IEEE Trans. Serv. Comput., 2015

Silence is Golden: Exploiting Jamming and Radio Silence to Communicate.
ACM Trans. Inf. Syst. Secur., 2015

AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Gener. Comput. Syst., 2015

EXPEDITE: EXPress closED ITemset Enumeration.
Expert Syst. Appl., 2015

Fame for sale: Efficient detection of fake Twitter followers.
Decis. Support Syst., 2015

The impact of GPU-assisted malware on memory forensics: A case study.
Digit. Investig., 2015

CloRoFor: Cloud Robust Forensics.
CoRR, 2015

ESC: An efficient, scalable, and crypto-less solution to secure wireless networks.
Comput. Networks, 2015

Freedom of speech: thwarting jammers via a probabilistic approach.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

VISIO: A Visual Approach for Singularity Detection in Recommendation Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Visual detection of singularities in review platforms.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

2014
Clone wars: Distributed detection of clone attacks in mobile WSNs.
J. Comput. Syst. Sci., 2014

CloRExPa: Cloud resilience via execution path analysis.
Future Gener. Comput. Syst., 2014

Discriminating Between the Wheat and the Chaff in Online Recommendation Systems.
ERCIM News, 2014

Thwarting Obfuscated Malware via Differential Fault Analysis.
Computer, 2014

Security in wireless ad-hoc networks - A survey.
Comput. Commun., 2014

Smart health: A context-aware health paradigm within smart cities.
IEEE Commun. Mag., 2014

A Lot of Slots - Outliers Confinement in Review-Based Systems.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments.
Proceedings of the SECRYPT 2014, 2014

SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

A Criticism to Society (As Seen by Twitter Analytics).
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

A tunable proof of ownership scheme for deduplication using Bloom filters.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
United We Stand: Intrusion Resilience in Mobile Unattended WSNs.
IEEE Trans. Mob. Comput., 2013

COKE Crypto-Less Over-the-Air Key Establishment.
IEEE Trans. Inf. Forensics Secur., 2013

Preserving privacy against external and internal threats in WSN data aggregation.
Telecommun. Syst., 2013

Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems.
IEEE Syst. J., 2013

Epidemic theory and data survivability in unattended wireless sensor networks: Models and gaps.
Pervasive Mob. Comput., 2013

Jamming mitigation in cognitive radio networks.
IEEE Netw., 2013

Windows Mobile LiveSD Forensics.
J. Netw. Comput. Appl., 2013

Mapping the File Systems Genome: rationales, technique, results and applications.
CoRR, 2013

CUDA Leaks: Information Leakage in GPU Architectures.
CoRR, 2013

Titans' revenge: Detecting Zeus via its own flaws.
Comput. Networks, 2013

Track me if you can: Transparent obfuscation for Location based Services.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Data confidentiality and availability via secret sharing and node mobility in UWSN.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

CREPUSCOLO: A collusion resistant privacy preserving location verification system.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Security in Wireless Ad Hoc Networks.
Proceedings of the Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition, 2013

2012
Self-healing in unattended wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Visual Role Mining: A Picture Is Worth a Thousand Roles.
IEEE Trans. Knowl. Data Eng., 2012

A business-driven decomposition methodology for role mining.
Comput. Secur., 2012

Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Secure Cloud Browser: Model and Architecture to Support Secure WEB Navigation.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
Proceedings of the Security Protocols XX, 2012

Preserving Query Privacy in Urban Sensing Systems.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Wireless Sensor Replica Detection in Mobile Environments.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Boosting efficiency and security in proof of ownership for deduplication.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Robust and efficient authentication of video stream broadcasting.
ACM Trans. Inf. Syst. Secur., 2011

Distributed Detection of Clone Attacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Secure topology maintenance and events collection in WSNs.
Secur. Commun. Networks, 2011

Intrusion-resilient integrity in data-centric unattended WSNs.
Pervasive Mob. Comput., 2011

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems.
J. Netw. Comput. Appl., 2011

Secure virtualization for cloud computing.
J. Netw. Comput. Appl., 2011

CASSANDRA: a probabilistic, efficient, and privacy-preserving solution to compute set intersection.
Int. J. Inf. Sec., 2011

PRISM - Privacy-Preserving Search in MapReduce.
IACR Cryptol. ePrint Arch., 2011

"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
EURASIP J. Wirel. Commun. Netw., 2011

A new role mining framework to elicit business roles and to mitigate enterprise risk.
Decis. Support Syst., 2011

Cross-border co-operation and education in digital investigations: A European perspective.
Digit. Investig., 2011

Location privacy and resilience in wireless sensor networks querying.
Comput. Commun., 2011

Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Events privacy in WSNs: A new model and its application.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Epidemic data survivability in unattended wireless sensor networks.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Taming Zeus by leveraging its own crypto internals.
Proceedings of the 2011 eCrime Researchers Summit, 2011

2010
eRIPP-FS: Enforcing privacy and security in RFID.
Secur. Commun. Networks, 2010

Hierarchies of keys in secure multicast communications.
J. Comput. Secur., 2010

Concise: Compressed 'n' Composable Integer Set.
Inf. Process. Lett., 2010

Taming role mining complexity in RBAC.
Comput. Secur., 2010

Securing Mobile Unattended WSNs against a Mobile Adversary.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

CReW: Cloud Resilience for Windows Guests through Monitored Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

CED<sup>2</sup>: Communication Efficient Disjointness Decision.
Proceedings of the Security and Privacy in Communication Networks, 2010

Mining Business-Relevant RBAC States through Decomposition.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Transparent security for cloud.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

ABBA: adaptive bicluster-based approach to impute missing values in binary matrices.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

The smallville effect: social ties make mobile networks more secure against node capture attack.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

Intrusion-Resilience in Mobile Unattended WSNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Event Handoff Unobservability in WSN.
Proceedings of the Open Research Problems in Network Security, 2010

Time Warp: How Time Affects Privacy in LBSs.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Evaluating the Risk of Adopting RBAC Roles.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

A Security Management Architecture for the Protection of Kernel Virtual Machines.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers, 2009

Confidentiality and integrity for data aggregation in WSN using peer monitoring.
Secur. Commun. Networks, 2009

Privacy-preserving robust data aggregation in wireless sensor networks.
Secur. Commun. Networks, 2009

Distributed data source verification in wireless sensor networks.
Inf. Fusion, 2009

Mobility and Cooperation to Thwart Node Capture Attacks in MANETs.
EURASIP J. Wirel. Commun. Netw., 2009

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

Collaborative authentication in unattended WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN.
Proceedings of the Security and Privacy in Communication Networks, 2009

A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.
Proceedings of the Emerging Challenges for Security, 2009

Mining Stable Roles in RBAC.
Proceedings of the Emerging Challenges for Security, 2009

A formal framework to elicit roles with business meaning in RBAC systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

KvmSec: a security extension for Linux kernel virtual machines.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Redoubtable Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Maximizing service availability for secure satellite broadcasting.
Int. J. Satell. Commun. Netw., 2008

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptol. ePrint Arch., 2008

Scalable and Efficient Provable Data Possession.
IACR Cryptol. ePrint Arch., 2008

An Activity-Based Model for Separation of Duty
CoRR, 2008

A mechanism to enforce privacy in vehicle-to-infrastructure communication.
Comput. Commun., 2008

RFID security and privacy: long-term research or short-term tinkering?
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Leveraging Lattices to Improve Role Mining.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Live Digital Forensic system for Windows networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A cost-driven approach to role engineering.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Gossip-based aggregate computation: computing faster with non address-oblivious schemes.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

Information Assurance in Critical Infrastructures via Wireless Sensor Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Robust RSA distributed signatures for large-scale long-lived ad hoc networks.
J. Comput. Secur., 2007

ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks.
Ad Hoc Networks, 2007

Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

Secure k-Connectivity Properties of Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Towards threat-adaptive dynamic fragment replication in large scale distributed systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Information Confinement, Privacy, and Security in RFID Systems.
Proceedings of the Computer Security, 2007

2006
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks.
Wirel. Networks, 2006

Efficient and Adaptive Threshold Signatures for Ad hoc networks.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN.
Proceedings of the IEEE International Conference on Systems, 2006

Sensor Networks that Are Provably Resilient.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Secure Cooperative Channel Establishment inWireless Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

A formal framework for the performance analysis of P2P networks protocols.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Addressing the shortcomings of one-way chains.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

A methodology for P2P file-sharing traffic detection.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005

2004
Security issues for wireless sensor networks.
PhD thesis, 2004

Key management for high bandwidth secure multicast.
J. Comput. Secur., 2004

Connectivity properties of secure wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS 2.
Proceedings of the Wireless On-Demand Network Systems, First IFIP TC6 Working Conference, 2004

BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

2003
Security and privacy issues of handheld and wearable wireless devices.
Commun. ACM, 2003

Providing secrecy in key management protocols for large wireless sensors networks.
Ad Hoc Networks, 2003

A Reliable Key Authentication Schema for Secure Multicast Communications.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

A Time Driven Methodology for Key Dimensioning in Multicast Communications.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Random key-assignment for secure Wireless Sensor Networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
Secure Selective Exclusion in Ad Hoc Wireless Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Efficient and secure keys management for wireless mobile communications.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002

Formal Specification for Fast Automatic IDS Training.
Proceedings of the Formal Aspects of Security, First International Conference, 2002


  Loading...