An innate immune system for the protection of computer networks

Andrea Visconti , Anastasia Pagnoni
Proceedings of the 4th international symposium on Information and communication technologies 63 -68

17
2005
High resolution Upper Ladinian/Lower Carnian bio-chronostratigraphic correlations from the western Tethys to North America

Alda Nicora , James F. Jenks , Riccardo Martin , Marco Balini
Bollettino Della Societa Geologica Italiana

2012
Crittografia: tra successi e fallimenti

Andrea Visconti
DigitCult - Scientific Journal on Digital Cultures 4 ( 3) 9 -14

2019
Why you cannot even hope to use Ore algebras in Cryptography

Andrea Visconti , Teo Mora , Michela Ceria
Applicable Algebra in Engineering, Communication and Computing 32 ( 3) 1 -16

2021
Effects of central tendency measures on term weighting in textual information retrieval

Andrea Visconti , Hooman Tahayori , Farzad Ghahramani
soft computing 25 ( 11) 7341 -7378

3
2021
Spam filtering model based on interval type-2 fuzzy set paradigm

Hooman Tahayori , Andrea Visconti , Giovanni Degli Antoni
2007 ITI 5th International Conference on Information and Communications Technology 147 -150

2007
Intrusion Detection via Artificial Immune System: a Performance-based Approach

Andrea Visconti , Nicoló Fusi , Hooman Tahayori
collaborative computing 268 125 -135

2
2008
A Survey on Blockchain Consensus with a Performance Comparison of PoW, PoS and Pure PoS

Cristian Lepore , Michela Ceria , Andrea Visconti , Udai Pratap Rao
Mathematics 8 ( 10) 1782

61
2020
What Users Should Know About Full Disk Encryption Based on LUKS

Simone Bossi , Andrea Visconti
cryptology and network security 9476 225 -237

14
2015
On the Weaknesses of PBKDF2

Andrea Visconti , Simone Bossi , Hany Ragab , Alexandro Calò
Cryptology and Network Security 9476 119 -126

13
2015
Concave type-2 fuzzy sets: properties and operations

Hooman Tahayori , Andrea G. B. Tettamanzi , Giovanni Degli Antoni , Andrea Visconti
Soft Computing 14 ( 7) 749 -756

27
2010
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2).

Andrea Visconti , Chiara Valentina Schiavo , René Peralta
Information Processing Letters 137 1 -5

6
2018
Augmented Interval Type-2 Fuzzy Set Methodologies for Email Granulation

Hooman Tahayori , Andrea Visconti , Giovanni Degli Antoni
soft computing 193 -198

3
2007
Polynomial multiplication over binary finite fields: new upper bounds

Alessandro De Piccoli , Andrea Visconti , Ottavio Giulio Rizzo
Journal of Cryptographic Engineering 10 ( 3) 197 -210

3
2020
Examining PBKDF2 security margin—Case study of LUKS

Andrea Visconti , Ondrej Mosnáček , Milan Brož , Vashek Matyáš
workshop on information security applications 46 ( 1) 296 -306

3
2019
Discovering varying patterns of Normal and interleaved ADLs in smart homes

Mahsa Raeiszadeh , Hooman Tahayori , Andrea Visconti
Applied Intelligence 49 ( 12) 4175 -4188

5
2019
Secure electronic bills of lading: blind counts and digital signatures

Anastasia Pagnoni , Andrea Visconti
Electronic Commerce Research 10 ( 3) 363 -388

8
2010
Measuring Performances of a White-Box Approach in the IoT Context

Daniele Giacomo Vittorio Albricci , Michela Ceria , Federico Cioschi , Nicolò Fornari
Symmetry 11 ( 8) 1000

2019
Differential fault attacks against AES tampering with the instruction flow

Silvia Mella , Filippo Melzani , Andrea Visconti
international conference on security and cryptography 439 -444

2014