Sabrina Sicari

Orcid: 0000-0002-6824-8075

According to our database1, Sabrina Sicari authored at least 63 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards rapid modeling and prototyping of indoor and outdoor monitoring applications.
Sustain. Comput. Informatics Syst., January, 2024

2023
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges.
Comput. Networks, November, 2023

2022
Analysis on functionalities and security features of Internet of Things related protocols.
Wirel. Networks, 2022

Securing the access control policies to the Internet of Things resources through permissioned blockchain.
Concurr. Comput. Pract. Exp., 2022

Insights into security and privacy towards fog computing evolution.
Comput. Secur., 2022

Security&privacy issues and challenges in NoSQL databases.
Comput. Networks, 2022

2021
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware.
Int. J. Inf. Sec., 2021

2020
Sticky Policies: A Survey.
IEEE Trans. Knowl. Data Eng., 2020

Smart certification: protecting the originality of the product in the eyewear sector.
Internet Technol. Lett., 2020

5G In the internet of things era: An overview on security and privacy challenges.
Comput. Networks, 2020

Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security.
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

Testing and Evaluating a Security-Aware Pub and Sub Protocol in a Fog-Driven IoT Environment.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

2019
How to evaluate an Internet of Things system: Models, case studies, and real developments.
Softw. Pract. Exp., 2019

Smart transport and logistics: A Node-RED implementation.
Internet Technol. Lett., 2019

Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the Internet of Nano-Things.
Comput. Networks, 2019

2018
S<sub>2</sub> DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks.
Wirel. Networks, 2018

Securing the smart home: A real case study.
Internet Technol. Lett., 2018

A risk assessment methodology for the Internet of Things.
Comput. Commun., 2018

REATO: REActing TO Denial of Service attacks in the Internet of Things.
Comput. Networks, 2018

Solving Interoperability within the Smart Building: A Real Test-Bed.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2017

Security towards the edge: Sticky policy enforcement for networked smart objects.
Inf. Syst., 2017

Dynamic Policies in Internet of Things: Enforcement and Synchronization.
IEEE Internet Things J., 2017

A secure ICN-IoT architecture.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

2016
A Comparative Study of Recent Wireless Sensor Network Simulators.
ACM Trans. Sens. Networks, 2016

A security-and quality-aware system architecture for Internet of Things.
Inf. Syst. Frontiers, 2016

A secure and quality-aware prototypical architecture for the Internet of Things.
Inf. Syst., 2016

AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things.
Inf. Syst., 2016

Security policy enforcement for networked smart objects.
Comput. Networks, 2016

Routing behavior across WSN simulators: The AODV case study.
Proceedings of the IEEE World Conference on Factory Communication Systems, 2016

Internet of Things: Security in the Keys.
Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2016

2015
Security, privacy and trust in Internet of Things: The road ahead.
Comput. Networks, 2015

Networked Smart Objects: Moving Data Processing Closer to the Source.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

GoNe: Dealing with node behavior.
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015

Secure OM2M Service Platform.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

2014
Security Games for Node Localization through Verifiable Multilateration.
IEEE Trans. Dependable Secur. Comput., 2014

IoT-aided robotics applications: Technological implications, target domains and open issues.
Comput. Commun., 2014

A NFP Model for Internet of Things applications.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

2013
DARE: evaluating Data Accuracy using node REputation.
Comput. Networks, 2013

SETA: A secure sharing of tasks in clustered wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

2012
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks.
J. Syst. Softw., 2012

Improving data quality using a cross layer protocol in wireless sensor networks.
Comput. Networks, 2012

Internet of things: Vision, applications and research challenges.
Ad Hoc Networks, 2012

Towards the Definition of a Framework for Service Development in the Agrofood Domain - A Conceptual Model.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Cross Layer Data Assessment in Wireless Sensor Networks.
Proceedings of the SENSORNETS 2012, 2012

2011
Mobile Networks and Applications (MONET) Special Issue on Sensor Systems and Software.
Mob. Networks Appl., 2011

Performance Evaluation of an Hybrid Mesh and Sensor Network.
Proceedings of the Global Communications Conference, 2011

2010
A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries
CoRR, 2010

SeDAP: Secure Data Aggregation Protocol in Privacy Aware Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010

Dealing with anonymity in wireless sensor networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Localization security in Wireless Sensor Networks as a non-cooperative game.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

A Localization Game in Wireless Sensor Networks.
Proceedings of the Decision and Game Theory for Security, 2010

2009
Secure aggregation in hybrid mesh/sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Assessing data quality by a cross-layer approach.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

On the impact of localization data in wireless sensor networks with malicious nodes.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

2008
Risk assessment in practice: A real case study.
Comput. Commun., 2008

Assessing the risk of intercepting VoIP calls.
Comput. Networks, 2008

Towards more secure systems: how to combine expert evaluations.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Introducing privacy in a hospital information system.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

2006
Assessing the risk of using vulnerable components.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Quality of Service in home network: VLAN zeroconfiguration network.
Int. J. Internet Protoc. Technol., 2006

Assessed quality of service and voice and data integration: A case study.
Comput. Commun., 2006

2005
Mobility and quality of service across heterogeneous wireless networks.
Comput. Networks, 2005


  Loading...