Tamara Bonaci

According to our database1, Tamara Bonaci authored at least 14 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models.
ACM Trans. Cyber Phys. Syst., 2022

2020
Your signature is your password: Haptic Passwords on Mobile Devices.
CoRR, 2020

An Overview of Fingerprint-Based Authentication: Liveness Detection and Beyond.
CoRR, 2020

2018
Cyber-security in robotics and autonomous systems.
Robotics Auton. Syst., 2018

2015
Securing the Exocortex: A Twenty-First Century Cybernetics Challenge.
IEEE Technol. Soc. Mag., 2015

App Stores for the Brain : Privacy and Security in Brain-Computer Interfaces.
IEEE Technol. Soc. Mag., 2015

To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots.
CoRR, 2015

Haptic passwords.
Proceedings of the 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2015

Experimental analysis of denial-of-service attacks on teleoperated robotic systems.
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, 2015

2013
A convex optimization approach for clone detection in wireless sensor networks.
Pervasive Mob. Comput., 2013

2012
On potential security threats against rescue robotic systems.
Proceedings of the IEEE International Symposium on Safety, Security, and Rescue Robotics, 2012

2011
Distributed clone detection in wireless sensor networks: An optimization approach.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

2010
Node capture attacks in wireless sensor networks: A system theoretic approach.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010


  Loading...