Leveraging Blockchain to Enable Smart-Health Applications

Angelo Capossele , Andrea Gaglione , Michele Nati , Mauro Conti
2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI) 1 -6

8
2018
A Novel Architecture for Cyber-Physical Security in Industrial Control Networks

Giuseppe Bernieri , Mauro Conti , Federica Pascucci
2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI) 1 -6

2
2018
Colluding browser extension attack on user privacy and its implication for web browsers

Anil Saini , Manoj Singh Gaur , Vijay Laxmi , Mauro Conti
Computers & Security 63 14 -28

6
2016
PIndroid: A novel Android malware detection system using ensemble learning methods

Fauzia Idrees , Muttukrishnan Rajarajan , Mauro Conti , Thomas M. Chen
Computers & Security 68 36 -46

75
2017
TACAN: transmitter authentication through covert channels in controller area networks

Xuhang Ying , Giuseppe Bernieri , Mauro Conti , Radha Poovendran
international conference on cyber-physical systems 23 -34

18
2019
Detection of Information Leaks via Reflection in Android Apps

Jyoti Gajrani , Li Li , Vijay Laxmi , Meenakshi Tripathi
computer and communications security 911 -913

3
2017
Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP

Alberto Compagno , Mauro Conti , Daniele Lain , Gene Tsudik
computer and communications security 703 -715

29
2017
ALISI: a lightweight identification system based on Iroha

Giuseppe Bernieri , Mauro Conti , Matteo Sovilla , Federico Turrin
acm symposium on applied computing 271 -273

2020
Spatial bloom filter in named data networking: a memory efficient solution

Filippo Berto , Luca Calderoni , Mauro Conti , Eleonora Losiouk
acm symposium on applied computing 274 -277

1
2020
Secure underwater acoustic networks: Current and future research directions

Chhagan Lal , Roberto Petroccia , Mauro Conti , Joao Alves
2016 IEEE Third Underwater Communications and Networking Conference (UComms) 1 -5

48
2016
Remote Attestation as a Service for IoT

Mauro Conti , Edlira Dushku , Luigi V. Mancini , Masoom Rabbani
the internet of things 320 -325

2019
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis

Parvez Faruki , Shweta Bhandari , Vijay Laxmi , Manoj Gaur
Recent Advances in Computational Intelligence in Defense and Security 519 -552

14
2016
Eathentication: A Chewing-based Authentication Method

Mattia Carlucci , Stefano Cecconello , Mauro Conti , Piero Romare
communications and networking symposium 1 -9

2020
Provably Secure Authenticated Key Agreement Scheme for Smart Grid

Vanga Odelu , Ashok Kumar Das , Mohammad Wazid , Mauro Conti
IEEE Transactions on Smart Grid 9 ( 3) 1 -1

262
2018
SACHa: Self-Attestation of Configurable Hardware

Jo Vliegen , Md Masoom Rabbani , Mauro Conti , Nele Mentens
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE) 746 -751

2
2019
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact

Sankardas Roy , Mauro Conti , Sanjeev Setia , Sushil Jajodia
IEEE Transactions on Information Forensics and Security 9 ( 4) 681 -694

84
2014
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols

Alberto Compagno , Mauro Conti , Antonio Alberto D'Amico , Gianluca Dini
IEEE Transactions on Information Forensics and Security 11 ( 7) 1565 -1577

11
2016
Employing Program Semantics for Malware Detection

Smita Naval , Vijay Laxmi , Muttukrishnan Rajarajan , Manoj Singh Gaur
IEEE Transactions on Information Forensics and Security 10 ( 12) 2591 -2604

100
2015
Analyzing Android Encrypted Network Traffic to Identify User Actions

Luigi Vincenzo Mancini , Riccardo Spolaor , Nino Vincenzo Verde , Mauro Conti
IEEE Transactions on Information Forensics and Security 11 ( 1) 114 -125

252
2016
Secure Data Aggregation in Wireless Sensor Networks

Sankardas Roy , Mauro Conti , Sanjeev Setia , Sushil Jajodia
IEEE Transactions on Information Forensics and Security 7 ( 3) 1040 -1052

90
2012