Mauro Conti
Mauro Conti
IEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW Seattle
Dirección de correo verificada de - Página principal
Citado por
Citado por
A survey on security and privacy issues of bitcoin
M Conti, ES Kumar, C Lal, S Ruj
IEEE communications surveys & tutorials 20 (4), 3416-3452, 2018
A survey on homomorphic encryption schemes: Theory and implementation
A Acar, H Aksu, AS Uluagac, M Conti
ACM Computing Surveys (Csur) 51 (4), 1-35, 2018
Smart health: A context-aware health paradigm within smart cities
A Solanas, C Patsakis, M Conti, IS Vlachos, V Ramos, F Falcone, ...
IEEE Communications Magazine 52 (8), 74-81, 2014
A Survey of Man In The Middle Attacks
M Conti, N Dragoni, V Lesyk
IEEE Communications Surveys & Tutorials, 2016
Android Security: A Survey of Issues, Malware Penetration and Defenses
P Faruki, A Bharmal, V Laxmi, V Ganmoor, M Gaur, M Conti, ...
IEEE Communications Surveys & Tutorials 17 (2), 2015
Internet of Things security and forensics: Challenges and opportunities
M Conti, A Dehghantanha, K Franke, S Watson
Future Generation Computer Systems 78, 544-546, 2018
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
Design of secure user authenticated key management protocol for generic IoT networks
M Wazid, AK Das, V Odelu, N Kumar, M Conti, M Jo
IEEE Internet of Things Journal 5 (1), 269-282, 2017
Crepe: Context-related policy enforcement for android
M Conti, VTN Nguyen, B Crispo
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
{FlowFence}: Practical data protection for emerging {IoT} application frameworks
E Fernandes, J Paupore, A Rahmati, D Simionato, M Conti, A Prakash
25th USENIX security symposium (USENIX Security 16), 531-548, 2016
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Computer communications 107, 30-48, 2017
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
Provably secure authenticated key agreement scheme for smart grid
V Odelu, AK Das, M Wazid, M Conti
IEEE Transactions on Smart Grid 9 (3), 1900-1910, 2016
Peek-a-boo: I see your smart home activities, even encrypted!
A Acar, H Fereidooni, T Abera, AK Sikder, M Miettinen, H Aksu, M Conti, ...
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KKR Choo
Journal of Ambient Intelligence and Humanized Computing 9, 1141-1152, 2018
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments
PGV Naranjo, Z Pooranian, M Shojafar, M Conti, R Buyya
Journal of parallel and distributed computing 132, 274-283, 2019
All you need is" love" evading hate speech detection
T Gröndahl, L Pajola, M Juuti, M Conti, N Asokan
Proceedings of the 11th ACM workshop on artificial intelligence and security …, 2018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20