Mauro Conti - Publications

Affiliations: 
2005-2009 Sapienza University of Rome, Roma, Lazio, Italy 
 2009-2011 Vrije Universiteit Amsterdam, Amsterdam, Netherlands 
 2011- University of Padova, Padova, Veneto, Italy 

155 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Ardagna CA, Conti M, Damiani E, Yu C. Editorial: Special issue on trusted Cloud-Edges computations Future Generation Computer Systems. 114: 661-664. DOI: 10.1016/J.Future.2020.08.041  0.304
2020 Alaeiyan MH, Dehghantanha A, Dargahi T, Conti M, Parsa S. A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks Acm Transactions On Cyber-Physical Systems. 4: 1-22. DOI: 10.1145/3351881  0.357
2020 Hubballi N, Swarnkar M, Conti M. BitProb: Probabilistic Bit Signatures for Accurate Application Identification Ieee Transactions On Network and Service Management. 17: 1730-1741. DOI: 10.1109/Tnsm.2020.2999856  0.315
2020 Anand S, Ding D, Gasti P, O'Neal M, Conti M, Balagani KS. DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures Ieee Transactions On Network and Service Management. 17: 201-212. DOI: 10.1109/Tnsm.2019.2936425  0.371
2020 Sturaro A, Silvestri S, Conti M, Das SK. A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems Ieee Transactions On Network Science and Engineering. 7: 817-831. DOI: 10.1109/Tnse.2018.2872034  0.373
2020 Li M, Hu D, Lal C, Conti M, Zhang Z. Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things Ieee Transactions On Industrial Informatics. 16: 6564-6574. DOI: 10.1109/Tii.2020.2974537  0.341
2020 Dushku E, Rabbani M, Conti M, Mancini LV, Ranise S. SARA: Secure Asynchronous Remote Attestation for IoT Systems Ieee Transactions On Information Forensics and Security. 15: 3123-3136. DOI: 10.1109/Tifs.2020.2983282  0.725
2020 Arora A, Peddoju SK, Conti M. PermPair : Android Malware Detection Using Permission Pairs Ieee Transactions On Information Forensics and Security. 15: 1968-1982. DOI: 10.1109/Tifs.2019.2950134  0.369
2020 Gangwal A, Conti M. Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel Ieee Transactions On Information Forensics and Security. 15: 1630-1639. DOI: 10.1109/Tifs.2019.2945171  0.343
2020 Saxena N, Conti M, Choo KR, Chaudhari NS. BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices Ieee Transactions On Information Forensics and Security. 15: 1470-1485. DOI: 10.1109/Tifs.2019.2940908  0.484
2020 Conti M, Gaspari FD, Mancini LV. A Novel Stealthy Attack to Gather SDN Configuration-Information Ieee Transactions On Emerging Topics in Computing. 8: 328-340. DOI: 10.1109/Tetc.2018.2806977  0.731
2020 Li M, Chen Y, Zheng S, Hu D, Lal C, Conti M. Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3017534  0.388
2020 Yu C, Gochhayat SP, Conti M, Lu C. Privacy Aware Data Deduplication for Side Channel in Cloud Storage Ieee Transactions On Cloud Computing. 8: 597-609. DOI: 10.1109/Tcc.2018.2794542  0.433
2020 Goyat R, Kumar G, Saha R, Conti M, Rai MK, Thomas R, Alazab M, Hoon-Kim T. Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3019074  0.389
2020 Ambrosin M, Conti M, Lazzeretti R, Rabbani M, Ranise S. Collective Remote Attestation at the Internet of Things Scale: State-of-the-art and Future Challenges Ieee Communications Surveys and Tutorials. 1-1. DOI: 10.1109/Comst.2020.3008879  0.743
2020 Conti M, Gangwal A, Hassan M, Lal C, Losiouk E. The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions Ieee Communications Surveys and Tutorials. 22: 2104-2129. DOI: 10.1109/Comst.2020.2994526  0.426
2020 Conti M, Kaliyar P, Lal C. A robust multicast communication protocol for Low power and Lossy networks Journal of Network and Computer Applications. 164: 102675. DOI: 10.1016/J.Jnca.2020.102675  0.443
2020 Wang S, Chen Z, Yan Q, Ji K, Peng L, Yang B, Conti M. Deep and broad URL feature mining for android malware detection Information Sciences. 513: 600-613. DOI: 10.1016/J.Ins.2019.11.008  0.381
2020 Ardagna CA, Conti M, Yu C. Special issue on Trusted Cloud-Edges Computations Future Generation Computer Systems. 112: 1180-1183. DOI: 10.1016/J.Future.2020.07.060  0.304
2020 Taheri R, Ghahramani M, Javidan R, Shojafar M, Pooranian Z, Conti M. Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features Future Generation Computer Systems. 105: 230-247. DOI: 10.1016/J.Future.2019.11.034  0.682
2020 Kaliyar P, Jaballah WB, Conti M, Lal C. LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks Computers & Security. 94: 101849. DOI: 10.1016/J.Cose.2020.101849  0.486
2020 Conti M, Lal C. Context-based Co-presence detection techniques: A survey Computers & Security. 88: 101652. DOI: 10.1016/J.Cose.2019.101652  0.418
2020 Halder S, Ghosal A, Conti M. Secure over-the-air software updates in connected vehicles: A survey Computer Networks. 178: 107343. DOI: 10.1016/J.Comnet.2020.107343  0.38
2020 Hassan M, Conti M, Lal C. NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN Computer Networks. 174: 107222. DOI: 10.1016/J.Comnet.2020.107222  0.432
2020 Jaballah WB, Conti M, Lal C. Security and design requirements for software-defined VANETs Computer Networks. 169: 107099. DOI: 10.1016/J.Comnet.2020.107099  0.464
2020 Ghosal A, Conti M. Security issues and challenges in V2X: A Survey Computer Networks. 169: 107093. DOI: 10.1016/J.Comnet.2019.107093  0.386
2020 Dave J, Faruki P, Laxmi V, Zemmari A, Gaur MS, Conti M. SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage Computer Communications. 154: 148-159. DOI: 10.1016/J.Comcom.2020.02.037  0.45
2020 Conti M, Kaliyar P, Rabbani MM, Ranise S. Attestation-enabled secure and scalable routing protocol for IoT networks Ad Hoc Networks. 98: 102054. DOI: 10.1016/j.adhoc.2019.102054  0.311
2020 Anand A, Conti M, Kaliyar P, Lal C. TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks Wireless Networks. 26: 2449-2463. DOI: 10.1007/S11276-019-01975-Y  0.452
2020 Taheri R, Javidan R, Shojafar M, Vinod P, Conti M. Can machine learning model with static features be fooled: an adversarial machine learning approach Cluster Computing. DOI: 10.1007/S10586-020-03083-5  0.626
2020 El-Zawawy MA, Losiouk E, Conti M. Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps International Journal of Information Security. 1-20. DOI: 10.1007/S10207-020-00491-X  0.337
2020 Taheri R, Javidan R, Shojafar M, Pooranian Z, Miri A, Conti M. On defending against label flipping attacks on malware detection systems Neural Computing and Applications. 1-20. DOI: 10.1007/S00521-020-04831-9  0.7
2019 Ding D, Conti M, Figueiredo R. Wide-Scale Internet Disconnection: Impact and Recovery on Social-Based P2P Overlays Ieee Transactions On Network Science and Engineering. 6: 734-747. DOI: 10.1109/Tnse.2018.2871980  0.375
2019 Kumar N, Aujla GS, Das AK, Conti M. ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System Ieee Transactions On Industrial Informatics. 15: 6572-6582. DOI: 10.1109/Tii.2019.2922697  0.447
2019 Tavella F, Giaretta A, Dooley-Cullinane TM, Conti M, Coffey L, Balasubramaniam S. DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks Ieee Transactions On Emerging Topics in Computing. 1-1. DOI: 10.1109/Tetc.2019.2932685  0.358
2019 Acs G, Conti M, Gasti P, Ghali C, Tsudik G, Wood CA. Privacy-Aware Caching in Information-Centric Networking Ieee Transactions On Dependable and Secure Computing. 16: 313-328. DOI: 10.1109/Tdsc.2017.2679711  0.447
2019 Choo KR, Conti M, Dehghantanha A. Special Issue on Big Data Applications in Cyber Security and Threat Intelligence – Part 2 Ieee Transactions On Big Data. 5: 423-424. DOI: 10.1109/Tbdata.2019.2933040  0.384
2019 Choo KR, Conti M, Dehghantanha A. Special Issue on Big Data Applications in Cyber Security and Threat Intelligence – Part 1 Ieee Transactions On Big Data. 5: 279-281. DOI: 10.1109/Tbdata.2019.2933039  0.394
2019 Conti M, Dushku E, Mancini LV. RADIS: Remote Attestation of Distributed IoT Services Arxiv: Cryptography and Security. 25-32. DOI: 10.1109/Sds.2019.8768670  0.716
2019 Rabbani M, Vliegen J, Winderickx J, Conti M, Mentens N. SHeLA: Scalable Heterogeneous Layered Attestation Ieee Internet of Things Journal. 6: 10240-10250. DOI: 10.1109/Jiot.2019.2936988  0.374
2019 Franqueira VNL, Inacio PRM, Mileva A, Conti M, Leppanen V, Lopes RHC. Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions Ieee Internet of Things Journal. 6: 6363-6367. DOI: 10.1109/Jiot.2019.2926635  0.44
2019 Ghosal A, Conti M. Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey Ieee Communications Surveys and Tutorials. 21: 2831-2848. DOI: 10.1109/Comst.2019.2907650  0.401
2019 Naranjo PGV, Pooranian Z, Shojafar M, Conti M, Buyya R. FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments Journal of Parallel and Distributed Computing. 132: 274-283. DOI: 10.1016/J.Jpdc.2018.07.003  0.728
2019 Gochhayat SP, Kaliyar P, Conti M, Tiwari P, Prasath VBS, Gupta D, Khanna A. LISA: Lightweight context-aware IoT service architecture Journal of Cleaner Production. 212: 1345-1356. DOI: 10.1016/J.Jclepro.2018.12.096  0.358
2019 Aghili SF, Mala H, Kaliyar P, Conti M. SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT Future Generation Computer Systems. 101: 621-634. DOI: 10.1016/J.Future.2019.07.004  0.446
2019 Bianchi G, Dargahi T, Caponi A, Conti M. Intelligent conditional collaborative private data sharing Future Generation Computer Systems. 96: 1-10. DOI: 10.1016/J.Future.2019.01.001  0.421
2019 Vinod P, Zemmari A, Conti M. A machine learning based approach to detect malicious android apps using discriminant system calls Future Generation Computer Systems. 94: 333-350. DOI: 10.1016/J.Future.2018.11.021  0.367
2019 Ding D, Conti M, Figueiredo R. SAND: Social-aware, network-failure resilient, and decentralized microblogging system Future Generation Computer Systems. 93: 637-650. DOI: 10.1016/J.Future.2018.11.007  0.408
2019 Odelu V, Saha S, Prasath R, Sadineni L, Conti M, Jo M. Efficient privacy preserving device authentication in WBANs for industrial e-health applications Computers & Security. 83: 300-312. DOI: 10.1016/J.Cose.2019.03.002  0.418
2019 Deokate B, Lal C, Trček D, Conti M. Mobility-aware cross-layer routing for peer-to-peer networks Computers & Electrical Engineering. 73: 209-226. DOI: 10.1016/J.Compeleceng.2018.11.014  0.407
2019 Conti M, Hassan M, Lal C. BlockAuth: BlockChain based distributed producer authentication in ICN Computer Networks. 164: 106888. DOI: 10.1016/J.Comnet.2019.106888  0.475
2019 Tajiki MM, Shojafar M, Akbari B, Salsano S, Conti M, Singhal M. Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN Computer Networks. 162: 106850. DOI: 10.1016/J.Comnet.2019.07.006  0.71
2019 Halder S, Ghosal A, Conti M. Efficient physical intrusion detection in Internet of Things: A Node deployment approach Computer Networks. 154: 28-46. DOI: 10.1016/J.Comnet.2019.02.019  0.393
2019 Dargahi T, Dehghantanha A, Bahrami PN, Conti M, Bianchi G, Benedetto L. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features Journal of Computer Virology and Hacking Techniques. 15: 277-305. DOI: 10.1007/S11416-019-00338-7  0.375
2019 Conti M, Lal C, Mohammadi R, Rawat U. Lightweight solutions to counter DDoS attacks in software defined networking Wireless Networks. 25: 2751-2768. DOI: 10.1007/S11276-019-01991-Y  0.482
2019 Halder S, Ghosal A, Conti M. LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things Wireless Networks. 25: 4459-4477. DOI: 10.1007/S11276-018-1741-0  0.374
2019 Maleki N, Rahmani AM, Conti M. MapReduce: an infrastructure review and research insights The Journal of Supercomputing. 75: 6934-7002. DOI: 10.1007/S11227-019-02907-5  0.346
2019 Saini A, Gaur MS, Laxmi V, Conti M. You click, I steal: analyzing and detecting click hijacking attacks in web pages International Journal of Information Security. 18: 481-504. DOI: 10.1007/S10207-018-0423-3  0.427
2019 Mohammadi R, Conti M, Lal C, Kulhari SC. SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking International Journal of Communication Systems. 32. DOI: 10.1002/Dac.4061  0.353
2019 Deepa K, Radhamani G, Vinod P, Shojafar M, Kumar N, Conti M. Identification of Android malware using refined system calls Concurrency and Computation: Practice and Experience. 31. DOI: 10.1002/Cpe.5311  0.653
2019 Conti M, Kaliyar P, Lal C. CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm Concurrency and Computation: Practice and Experience. 31. DOI: 10.1002/Cpe.4978  0.379
2019 Tajiki MM, Shojafar M, Akbari B, Salsano S, Conti M. Software defined service function chaining with failure consideration for fog computing Concurrency and Computation: Practice and Experience. 31. DOI: 10.1002/Cpe.4953  0.655
2018 Pooranian Z, Abawajy JH, Vinod P, Conti M. Scheduling Distributed Energy Resource Operation and Daily Power Consumption for a Smart Building to Optimize Economic and Environmental Parameters Energies. 11: 1-17. DOI: 10.3390/En11061348  0.308
2018 Fallah SN, Deo RC, Shojafar M, Conti M, Shamshirband S. Computational Intelligence Approaches for Energy Load Forecasting in Smart Energy Management Grids: State of the Art, Future Challenges, and Research Directions Energies. 11: 596. DOI: 10.3390/En11030596  0.656
2018 Acar A, Aksu H, Uluagac AS, Conti M. A Survey on Homomorphic Encryption Schemes: Theory and Implementation Acm Computing Surveys. 51: 79. DOI: 10.1145/3214303  0.408
2018 Odelu V, Das AK, Wazid M, Conti M. Provably Secure Authenticated Key Agreement Scheme for Smart Grid Ieee Transactions On Smart Grid. 9: 1-1. DOI: 10.1109/Tsg.2016.2602282  0.408
2018 Kumar P, Tripathi M, Nehra A, Conti M, Lal C. SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN Ieee Transactions On Network and Service Management. 15: 1545-1559. DOI: 10.1109/Tnsm.2018.2861741  0.386
2018 Spolaor R, Santo ED, Conti M. DELTA: Data Extraction and Logging Tool for Android Ieee Transactions On Mobile Computing. 17: 1289-1302. DOI: 10.1109/Tmc.2017.2762692  0.39
2018 Lee P, Yu C, Dargahi T, Conti M, Bianchi G. MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things Ieee Transactions On Information Forensics and Security. 13: 2031-2046. DOI: 10.1109/Tifs.2018.2805291  0.407
2018 Taylor VF, Spolaor R, Conti M, Martinovic I. Robust Smartphone App Identification via Encrypted Network Traffic Analysis Ieee Transactions On Information Forensics and Security. 13: 63-78. DOI: 10.1109/Tifs.2017.2737970  0.418
2018 Somani G, Gaur MS, Sanghi D, Conti M, Rajarajan M. Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks Ieee Transactions On Dependable and Secure Computing. 15: 959-973. DOI: 10.1109/Tdsc.2017.2763160  0.408
2018 Aksu H, Babun L, Conti M, Tolomei G, Uluagac AS. Advertising in the IoT Era: Vision and Challenges Ieee Communications Magazine. 56: 138-144. DOI: 10.1109/Mcom.2017.1700871  0.451
2018 Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks Ieee Internet of Things Journal. 5: 269-282. DOI: 10.1109/Jiot.2017.2780232  0.47
2018 Conti M, Li QQ, Maragno A, Spolaor R. The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis Ieee Communications Surveys and Tutorials. 20: 2658-2713. DOI: 10.1109/Comst.2018.2843533  0.426
2018 Conti M, Kumar ES, Lal C, Ruj S. A Survey on Security and Privacy Issues of Bitcoin Ieee Communications Surveys and Tutorials. 20: 3416-3452. DOI: 10.1109/Comst.2018.2842460  0.453
2018 Ambrosin M, Compagno A, Conti M, Ghali C, Tsudik G. Security and Privacy Analysis of National Science Foundation Future Internet Architectures Ieee Communications Surveys and Tutorials. 20: 1418-1442. DOI: 10.1109/Comst.2018.2798280  0.432
2018 Zhao C, Zhao S, Zhang B, Jia Z, Chen Z, Conti M. Secure Comparison Under Ideal/Real Simulation Paradigm Ieee Access. 6: 31236-31248. DOI: 10.1109/Access.2018.2837665  0.38
2018 Cascavilla G, Beato F, Burattin A, Conti M, Mancini LV. OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover “private” information in OSN profiles Online Social Networks and Media. 6: 58-68. DOI: 10.1016/J.Osnem.2018.04.003  0.381
2018 Conti M, Dehghantanha A, Franke K, Watson S. Internet of Things security and forensics: Challenges and opportunities Future Generation Computer Systems. 78: 544-546. DOI: 10.1016/J.Future.2017.07.060  0.455
2018 Conti M, Gangwal A, Ruj S. On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective Computers & Security. 79: 162-189. DOI: 10.1016/J.Cose.2018.08.008  0.353
2018 Conti M, Droms RE, Hassan M, Lal C. Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN Computer Communications. 129: 209-225. DOI: 10.1016/J.Comcom.2018.07.033  0.41
2018 Jaballah WB, Conti M, Filè G, Mosbah M, Zemmari A. Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks Computer Communications. 119: 66-82. DOI: 10.1016/J.Comcom.2018.01.010  0.405
2018 Azmoodeh A, Dehghantanha A, Conti M, Choo KR. Detecting crypto-ransomware in IoT networks based on energy consumption footprint Journal of Ambient Intelligence and Humanized Computing. 9: 1141-1152. DOI: 10.1007/S12652-017-0558-5  0.406
2018 Lal C, Laxmi V, Gaur MS, Conti M. Enhancing QoE for video streaming in MANETs via multi-constraint routing Wireless Networks. 24: 235-256. DOI: 10.1007/S11276-016-1325-9  0.413
2018 Nazhad SHH, Shojafar M, Shamshirband S, Conti M. An efficient routing protocol for the QoS support of large-scale MANETs International Journal of Communication Systems. 31. DOI: 10.1002/Dac.3384  0.678
2017 Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment. Ieee Journal of Biomedical and Health Informatics. PMID 28682267 DOI: 10.1109/Jbhi.2017.2721545  0.328
2017 Naranjo PGV, Pooranian Z, Shamshirband S, Abawajy JH, Conti M. Fog over virtualized IoT: new opportunity for context-aware networked applications and a case study Applied Sciences. 7: 1325. DOI: 10.3390/App7121325  0.423
2017 Ambrosin M, Braca P, Conti M, Lazzeretti R. ODIN: O bfuscation-Based Privacy-Preserving Consensus Algorithm for D ecentralized I nformation Fusion in Smart Device N etworks Acm Transactions On Internet Technology. 18: 6. DOI: 10.1145/3137573  0.788
2017 Mohammadi R, Javidan R, Conti M. SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks Ieee Transactions On Network and Service Management. 14: 487-497. DOI: 10.1109/Tnsm.2017.2701549  0.402
2017 Ambrosin M, Conti M, Gaspari FD, Poovendran R. LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking Ieee Acm Transactions On Networking. 25: 1206-1219. DOI: 10.1109/Tnet.2016.2626287  0.416
2017 Perazzo P, Sorbelli FB, Conti M, Dini G, Pinotti CM. Drone Path Planning for Secure Positioning and Secure Position Verification Ieee Transactions On Mobile Computing. 16: 2478-2493. DOI: 10.1109/Tmc.2016.2627552  0.4
2017 Wang S, Yan Q, Chen Z, Yang B, Zhao C, Conti M. Detecting Android Malware Leveraging Text Semantics of Network Flows Ieee Transactions On Information Forensics and Security. 13: 1096-1109. DOI: 10.1109/Tifs.2017.2771228  0.403
2017 Somani G, Gaur MS, Sanghi D, Conti M, Rajarajan M, Buyya R. Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions Ieee Cloud Computing. 4: 22-32. DOI: 10.1109/Mcc.2017.14  0.423
2017 Lal C, Petroccia R, Pelekanakis K, Conti M, Alves J. Toward the Development of Secure Underwater Acoustic Networks Ieee Journal of Oceanic Engineering. 42: 1075-1087. DOI: 10.1109/Joe.2017.2716599  0.447
2017 Dargahi T, Caponi A, Ambrosin M, Bianchi G, Conti M. A Survey on the Security of Stateful SDN Data Planes Ieee Communications Surveys and Tutorials. 19: 1701-1725. DOI: 10.1109/Comst.2017.2689819  0.411
2017 Cascavilla G, Conti M, Schwartz DG, Yahav I. The insider on the outside: a novel system for the detection of information leakers in social networks European Journal of Information Systems. 27: 470-485. DOI: 10.1080/0960085X.2017.1387712  0.339
2017 Li Q, Gochhayat SP, Conti M, Liu F. EnergIoT: A solution to improve network lifetime of IoT devices Pervasive and Mobile Computing. 42: 124-133. DOI: 10.1016/J.Pmcj.2017.10.005  0.397
2017 Ardagna CA, Ariyapala K, Conti M, Pinotti CM, Stefa J. Anonymous end-to-end communications in adversarial mobile clouds Pervasive and Mobile Computing. 36: 57-67. DOI: 10.1016/J.Pmcj.2016.09.001  0.459
2017 Ali R, Pal AK, Kumari S, Karuppiah M, Conti M. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring Future Generation Computer Systems. 84: 200-215. DOI: 10.1016/J.Future.2017.06.018  0.431
2017 Bhandari S, Jaballah WB, Jain V, Laxmi V, Zemmari A, Gaur MS, Mosbah M, Conti M. Android inter-app communication threats and detection techniques Computers & Security. 70: 392-421. DOI: 10.1016/J.Cose.2017.07.002  0.393
2017 Idrees F, Rajarajan M, Conti M, Chen TM, Rahulamathavan Y. PIndroid: A novel Android malware detection system using ensemble learning methods Computers & Security. 68: 36-46. DOI: 10.1016/J.Cose.2017.03.011  0.359
2017 Somani G, Gaur MS, Sanghi D, Conti M, Rajarajan M. DDoS victim service containment to minimize the internal collateral damages in cloud computing Computers & Electrical Engineering. 59: 165-179. DOI: 10.1016/J.Compeleceng.2016.12.004  0.37
2017 Somani G, Gaur MS, Sanghi D, Conti M, Buyya R. DDoS attacks in cloud computing Computer Communications. 107: 30-48. DOI: 10.1016/J.Comcom.2017.03.010  0.413
2017 Somani G, Gaur MS, Sanghi D, Conti M, Buyya R. Service resizing for quick DDoS mitigation in cloud computing environment Annales Des TéLéCommunications. 72: 237-252. DOI: 10.1007/S12243-016-0552-5  0.387
2016 Teing YY, Dehghantanha A, Choo KR, Dargahi T, Conti M. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study. Journal of Forensic Sciences. PMID 27885663 DOI: 10.1111/1556-4029.13271  0.393
2016 Ariyapala K, Do HG, Anh HN, Ng WK, Conti M. A host and network based intrusion detection for android smartphones Proceedings - Ieee 30th International Conference On Advanced Information Networking and Applications Workshops, Waina 2016. 849-854. DOI: 10.1109/WAINA.2016.35  0.338
2016 Compagno A, Conti M, D'Amico AA, Dini G, Perazzo P, Taponecco L. Modeling Enlargement Attacks Against UWB Distance Bounding Protocols Ieee Transactions On Information Forensics and Security. 11: 1565-1577. DOI: 10.1109/Tifs.2016.2541613  0.402
2016 Giaretta A, Balasubramaniam S, Conti M. Security vulnerabilities and countermeasures for target localization in Bio-NanoThings communication networks Ieee Transactions On Information Forensics and Security. 11: 665-676. DOI: 10.1109/Tifs.2015.2505632  0.385
2016 Conti M, Mancini LV, Spolaor R, Verde NV. Analyzing Android Encrypted Network Traffic to Identify User Actions Ieee Transactions On Information Forensics and Security. 11: 114-125. DOI: 10.1109/Tifs.2015.2478741  0.759
2016 Ambrosin M, Anzanpour A, Conti M, Dargahi T, Moosavi SR, Rahmani AM, Liljeberg P. On the Feasibility of Attribute-Based Encryption on Internet of Things Devices Ieee Micro. 36: 25-35. DOI: 10.1109/Mm.2016.101  0.419
2016 Sturaro A, Silvestri S, Conti M, Das SK. Towards a realistic model for failure propagation in interdependent networks 2016 International Conference On Computing, Networking and Communications, Icnc 2016. DOI: 10.1109/Iccnc.2016.7440711  0.365
2016 Conti M, Dragoni N, Lesyk V. A Survey of Man In The Middle Attacks Ieee Communications Surveys and Tutorials. 18: 2027-2051. DOI: 10.1109/Comst.2016.2548426  0.439
2016 Saini A, Gaur MS, Laxmi V, Conti M. Colluding browser extension attack on user privacy and its implication for web browsers Computers & Security. 63: 14-28. DOI: 10.1016/J.Cose.2016.09.003  0.431
2015 Ambrosin M, Conti M, Dargahi T. On the feasibility of attribute-based encryption on smartphone devices Iot-Sys 2015 - Proceedings of the 2015 Workshop On Iot Challenges in Mobile and Industrial Systems. 49-54. DOI: 10.1145/2753476.2753482  0.306
2015 Ambrosin M, Conti M, De Gaspari F, Poovendran R. LineSwitch: Efficiently managing switch flow in Software-Defined Networking while effectively tackling DoS attacks Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 639-644. DOI: 10.1145/2714576.2714612  0.306
2015 Perazzo P, Ariyapala K, Conti M, Dini G. The verifier bee: A path planner for drone-based secure location verification Proceedings of the Wowmom 2015: a World of Wireless Mobile and Multimedia Networks. DOI: 10.1109/WoWMoM.2015.7158150  0.335
2015 Conti M, Cozza V, Petrocchi M, Spognardi A. TRAP: Using Targeted ads to unveil Google personal profiles 2015 Ieee International Workshop On Information Forensics and Security, Wifs 2015 - Proceedings. DOI: 10.1109/WIFS.2015.7368607  0.307
2015 Guarino S, Canlar ES, Conti M, Di Pietro R, Solanas A. Provable Storage Medium for Data Storage Outsourcing Ieee Transactions On Services Computing. 8: 985-997. DOI: 10.1109/Tsc.2014.2355229  0.403
2015 Conti M, Crispo B, Diodati D, Nurminen JK, Pinotti CM, Teemaa T. Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones Ieee Transactions On Parallel and Distributed Systems. 26: 2778-2790. DOI: 10.1109/Tpds.2014.2360693  0.713
2015 Naval S, Laxmi V, Rajarajan M, Gaur MS, Conti M. Employing Program Semantics for Malware Detection Ieee Transactions On Information Forensics and Security. 10: 2591-2604. DOI: 10.1109/Tifs.2015.2469253  0.372
2015 Ben Jaballah W, Conti M, Mosbah M, Palazzi CE. Impact of security threats in vehicular alert messaging systems 2015 Ieee International Conference On Communication Workshop, Iccw 2015. 2627-2632. DOI: 10.1109/ICCW.2015.7247575  0.326
2015 Compagno A, Conti M, Ghali C, Tsudik G. To NACK or not to NACK? Negative acknowledgments in information-centric networking Proceedings - International Conference On Computer Communications and Networks, Icccn. 2015. DOI: 10.1109/ICCCN.2015.7288477  0.351
2015 Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M. Android security: A survey of issues, malware penetration, and defenses Ieee Communications Surveys and Tutorials. 17: 998-1022. DOI: 10.1109/Comst.2014.2386139  0.447
2015 Ambrosin M, Hosseini H, Mandal K, Conti M, Poovendran R. Verifiable and privacy-preserving fine-grained data-collection for smart metering 2015 Ieee Conference On Communications and Networksecurity, Cns 2015. 655-658. DOI: 10.1109/CNS.2015.7346882  0.329
2015 Ariyapala K, Conti M, Pinotti CM. CaT: Evaluating cloud-aided TLS for smartphone energy efficiency 2015 Ieee Conference On Communications and Networksecurity, Cns 2015. 601-609. DOI: 10.1109/CNS.2015.7346874  0.351
2015 Somani G, Gaur MS, Sanghi D, Conti M. DDoS attacks in Cloud Computing: Collateral Damage to Non-targets Computer Networks. DOI: 10.1016/J.Comnet.2016.03.022  0.412
2015 Dargahi T, Ambrosin M, Conti M, Asokan N. ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs Computer Communications. DOI: 10.1016/J.Comcom.2016.03.002  0.384
2015 Li F, Rahulamathavan Y, Conti M, Rajarajan M. Robust access control framework for mobile cloud computing network Computer Communications. 68: 61-72. DOI: 10.1016/J.Comcom.2015.07.005  0.464
2015 Compagno A, Conti M, Gasti P, Mancini LV, Tsudik G. Violating consumer anonymity: Geo-locating nodes in named data networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9092: 243-262. DOI: 10.1007/978-3-319-28166-7_12  0.366
2015 Faruki P, Bhandari S, Laxmi V, Gaur M, Conti M. Droidanalyst: Synergic app framework for static and dynamic app analysis Studies in Computational Intelligence. 621: 519-552. DOI: 10.1007/978-3-319-26450-9_20  0.322
2014 Ardagna CA, Conti M, Leone M, Stefa J. An anonymous end-to-end communication protocol for mobile cloud environments Ieee Transactions On Services Computing. 7: 373-386. DOI: 10.1109/Tsc.2014.2304717  0.45
2014 Ben Jaballah W, Conti M, Mosbah M, Palazzi CE. Fast and secure multihop broadcast solutions for intervehicular communication Ieee Transactions On Intelligent Transportation Systems. 15: 433-450. DOI: 10.1109/Tits.2013.2277890  0.438
2014 Roy S, Conti M, Setia S, Jajodia S. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact Ieee Transactions On Information Forensics and Security. 9: 681-694. DOI: 10.1109/Tifs.2014.2307197  0.436
2014 Zhauniarovich Y, Russello G, Conti M, Crispo B, Fernandes E. MOSES: Supporting and Enforcing Security Profiles on Smartphones Ieee Transactions On Dependable and Secure Computing. 11: 211-223. DOI: 10.1109/Tdsc.2014.2300482  0.745
2014 Conti M, Di Pietro R, Spognardi A. Clone wars: Distributed detection of clone attacks in mobile WSNs Journal of Computer and System Sciences. 80: 654-669. DOI: 10.1016/J.Jcss.2013.06.017  0.467
2014 Ben Jaballah W, Conti M, Mosbah M, Palazzi CE. A secure alert messaging system for safe driving Computer Communications. 46: 29-42. DOI: 10.1016/J.Comcom.2014.03.010  0.445
2014 Panaousis E, Alpcan T, Fereidooni H, Conti M. Secure message delivery games for device-to-device communications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8840: 195-215.  0.358
2013 Conti M, Hasani A, Crispo B. Virtual private social networks and a facebook implementation Acm Transactions On the Web. 7: 14. DOI: 10.1145/2516633.2516636  0.737
2013 Rocha BPS, Conti M, Etalle S, Crispo B. Hybrid Static-Runtime Information Flow and Declassification Enforcement Ieee Transactions On Information Forensics and Security. 8: 1294-1305. DOI: 10.1109/Tifs.2013.2267798  0.72
2013 Fernandes E, Crispo B, Conti M. FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment Ieee Transactions On Information Forensics and Security. 8: 1027-1037. DOI: 10.1109/Tifs.2013.2259818  0.421
2013 Conti M, Willemsen J, Crispo B. Providing source location privacy in wireless sensor networks: A survey Ieee Communications Surveys and Tutorials. 15: 1238-1280. DOI: 10.1109/Surv.2013.011413.00118  0.741
2013 Compagno A, Conti M, Gasti P, Tsudik G. Poseidon: Mitigating interest flooding DDoS attacks in named data networking Proceedings - Conference On Local Computer Networks, Lcn. 630-638. DOI: 10.1109/LCN.2013.6761300  0.366
2013 Acs G, Conti M, Gasti P, Ghali C, Tsudik G. Cache privacy in named-data networking Proceedings - International Conference On Distributed Computing Systems. 41-51. DOI: 10.1109/ICDCS.2013.12  0.337
2013 Canlar ES, Conti M, Crispo B, Pietro RD. Windows Mobile LiveSD Forensics Journal of Network and Computer Applications. 36: 677-684. DOI: 10.1016/J.Jnca.2012.12.024  0.72
2013 Conti M, Gasti P, Teoli M. A lightweight mechanism for detection of cache pollution attacks in Named Data Networking Computer Networks. 57: 3178-3191. DOI: 10.1016/J.Comnet.2013.07.034  0.46
2013 Zhang L, Zhang H, Conti M, Pietro R, Jajodia S, Mancini LV. Preserving privacy against external and internal threats in WSN data aggregation Telecommunication Systems. 52: 2163-2176. DOI: 10.1007/S11235-011-9539-8  0.722
2012 Conti M, Crispo B, Fernandes E, Zhauniarovich Y. CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android Ieee Transactions On Information Forensics and Security. 7: 1426-1438. DOI: 10.1109/Tifs.2012.2204249  0.722
2012 Roy S, Conti M, Setia S, Jajodia S. Secure Data Aggregation in Wireless Sensor Networks Ieee Transactions On Information Forensics and Security. 7: 1040-1052. DOI: 10.1109/Tifs.2012.2189568  0.417
2011 Conti M, Pietro RD, Spognardi A. Who counterfeited my Viagra? probabilistic item removal detection via RFID tag cooperation Eurasip Journal On Wireless Communications and Networking. 2011: 1-13. DOI: 10.1155/2011/575171  0.389
2011 Marconi L, Pietro RD, Crispo B, Conti M. Time in privacy preserving LBSs: an overlooked dimension International Journal of Vehicular Technology. 2011: 1-12. DOI: 10.1155/2011/486975  0.374
2011 Conti M, Pietro RD, Mancini LV, Mei A. Distributed Detection of Clone Attacks in Wireless Sensor Networks Ieee Transactions On Dependable and Secure Computing. 8: 685-698. DOI: 10.1109/Tdsc.2010.25  0.739
2011 Conti M, Pietro RD, Gabrielli A, Mancini LV. Secure topology maintenance and events collection in WSNs Security and Communication Networks. 4: 744-762. DOI: 10.1002/Sec.280  0.473
2010 Conti M, Pietro RD, Mancini LV, Spognardi A. eRIPP-FS: Enforcing privacy and security in RFID Security and Communication Networks. 3: 58-70. DOI: 10.1002/Sec.120  0.738
2009 Conti M, Pietro RD, Mancini LV, Mei A. Distributed data source verification in wireless sensor networks Information Fusion. 10: 342-353. DOI: 10.1016/J.Inffus.2009.01.002  0.742
2009 Conti M, Zhang L, Roy S, Pietro RD, Jajodia S, Mancini LV. Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks Security and Communication Networks. 2: 195-213. DOI: 10.1002/Sec.95  0.719
Show low-probability matches.