Seguir
Mauro Conti
Mauro Conti
IEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW Seattle
Dirección de correo verificada de math.unipd.it - Página principal
Título
Citado por
Citado por
Año
A survey on security and privacy issues of bitcoin
M Conti, ES Kumar, C Lal, S Ruj
IEEE communications surveys & tutorials 20 (4), 3416-3452, 2018
11522018
A survey on homomorphic encryption schemes: Theory and implementation
A Acar, H Aksu, AS Uluagac, M Conti
ACM Computing Surveys (Csur) 51 (4), 1-35, 2018
11302018
Smart health: A context-aware health paradigm within smart cities
A Solanas, C Patsakis, M Conti, IS Vlachos, V Ramos, F Falcone, ...
IEEE Communications Magazine 52 (8), 74-81, 2014
7332014
A Survey of Man In The Middle Attacks
M Conti, N Dragoni, V Lesyk
IEEE Communications Surveys & Tutorials, 2016
7002016
Android Security: A Survey of Issues, Malware Penetration and Defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, M Gaur, M Conti, ...
IEEE Communications Surveys & Tutorials 17 (2), 2015
6992015
Internet of Things security and forensics: Challenges and opportunities
M Conti, A Dehghantanha, K Franke, S Watson
Future Generation Computer Systems 78, 544-546, 2018
6772018
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
4332013
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
3872017
Crepe: Context-related policy enforcement for android
M Conti, VTN Nguyen, B Crispo
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
3812011
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
3632017
{FlowFence}: Practical data protection for emerging {IoT} application frameworks
E Fernandes, J Paupore, A Rahmati, D Simionato, M Conti, A Prakash
25th USENIX security symposium (USENIX Security 16), 531-548, 2016
3622016
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Computer communications 107, 30-48, 2017
3582017
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
3472016
Provably secure authenticated key agreement scheme for smart grid
V Odelu, AK Das, M Wazid, M Conti
IEEE Transactions on Smart Grid 9 (3), 1900-1910, 2016
3332016
Peek-a-boo: I see your smart home activities, even encrypted!
A Acar, H Fereidooni, T Abera, AK Sikder, M Miettinen, H Aksu, M Conti, ...
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
3302020
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KKR Choo
Journal of Ambient Intelligence and Humanized Computing 9, 1141-1152, 2018
3152018
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
3052007
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
2952015
FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments
PGV Naranjo, Z Pooranian, M Shojafar, M Conti, R Buyya
Journal of parallel and distributed computing 132, 274-283, 2019
2752019
All you need is" love" evading hate speech detection
T Gröndahl, L Pajola, M Juuti, M Conti, N Asokan
Proceedings of the 11th ACM workshop on artificial intelligence and security …, 2018
2742018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20