Hybrid Static-Runtime Information Flow and Declassification Enforcement

Bruno P. S. Rocha , Mauro Conti , Sandro Etalle , Bruno Crispo
IEEE Transactions on Information Forensics and Security 8 ( 8) 1294 -1305

42
2013
AppHunter: Mobile Application Traffic Classification

Mayank Swarnkar , Neminath Hubballi , Nikhil Tripathi , Mauro Conti
ieee international conference on advanced networks and telecommunications systems 1 -6

1
2018
PILOT: Password and PIN information leakage from obfuscated typing videos

Kiran Balagani , Matteo Cardaioli , Mauro Conti , Paolo Gasti
Journal of Computer Security 27 ( 4) 405 -425

4
2019
Distributed data source verification in wireless sensor networks

Mauro Conti , Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei
Information Fusion 10 ( 4) 342 -353

13
2009
Time in privacy preserving LBSs: an overlooked dimension

Luciana Marconi , Roberto Di Pietro , Bruno Crispo , Mauro Conti
International Journal of Vehicular Technology 2011 ( 2011) 1 -12

1
2011
Who counterfeited my Viagra? probabilistic item removal detection via RFID tag cooperation

Mauro Conti , Roberto Di Pietro , Angelo Spognardi
Eurasip Journal on Wireless Communications and Networking 2011 ( 1) 1 -13

28
2011
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks

Reza Mohammadi , Reza Javidan , Mauro Conti
IEEE Transactions on Network and Service Management 14 ( 2) 487 -497

67
2017
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN

Prashant Kumar , Meenakshi Tripathi , Ajay Nehra , Mauro Conti
IEEE Transactions on Network and Service Management 15 ( 4) 1545 -1559

116
2018
BitProb: Probabilistic Bit Signatures for Accurate Application Identification

Neminath Hubballi , Mayank Swarnkar , Mauro Conti
IEEE Transactions on Network and Service Management 17 ( 3) 1730 -1741

1
2020
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller

Nagarathna Ravi , S. Mercy Shalinie , Chhagan lal , Mauro Conti
IEEE Transactions on Network and Service Management 18 ( 1) 745 -759

17
2021
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks

Gaurav Somani , Manoj Singh Gaur , Dheeraj Sanghi , Mauro Conti
IEEE Transactions on Dependable and Secure Computing 15 ( 6) 959 -973

62
2018
Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks

Meng Li , Yifei Chen , Shuli Zheng , Donghui Hu
IEEE Transactions on Dependable and Secure Computing ( 01) 1 -1

19
2020
Secure message delivery games for device-to-device communications

Emmanouil Panaousis , Tansu Alpcan , Hossein Fereidooni , Mauro Conti
decision and game theory for security 195 -215

14
2014
Secure Comparison Under Ideal/Real Simulation Paradigm

Zhenxiang Chen , Mauro Conti , Chuan Zhao , Shengnan Zhao
IEEE Access 6 31236 -31248

2018
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking

Moreno Ambrosin , Mauro Conti , Fabio De Gaspari , Radha Poovendran
IEEE ACM Transactions on Networking 25 ( 2) 1206 -1219

110
2017
A Survey on the Security of Stateful SDN Data Planes

Tooska Dargahi , Alberto Caponi , Moreno Ambrosin , Giuseppe Bianchi
IEEE Communications Surveys and Tutorials 19 ( 3) 1701 -1725

196
2017
A Survey on Security and Privacy Issues of Bitcoin

Mauro Conti , E. Sandeep Kumar , Chhagan Lal , Sushmita Ruj
IEEE Communications Surveys and Tutorials 20 ( 4) 3416 -3452

958
2018
Security and Privacy Analysis of National Science Foundation Future Internet Architectures

Moreno Ambrosin , Alberto Compagno , Mauro Conti , Cesar Ghali
IEEE Communications Surveys and Tutorials 20 ( 2) 1418 -1442

17
2018
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

Mauro Conti , Qian Qian Li , Alberto Maragno , Riccardo Spolaor
IEEE Communications Surveys and Tutorials 20 ( 4) 2658 -2713

95
2018