Year |
Citation |
Score |
2021 |
Ardagna CA, Conti M, Damiani E, Yu C. Editorial: Special issue on trusted Cloud-Edges computations Future Generation Computer Systems. 114: 661-664. DOI: 10.1016/J.Future.2020.08.041 |
0.304 |
|
2020 |
Alaeiyan MH, Dehghantanha A, Dargahi T, Conti M, Parsa S. A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks Acm Transactions On Cyber-Physical Systems. 4: 1-22. DOI: 10.1145/3351881 |
0.357 |
|
2020 |
Hubballi N, Swarnkar M, Conti M. BitProb: Probabilistic Bit Signatures for Accurate Application Identification Ieee Transactions On Network and Service Management. 17: 1730-1741. DOI: 10.1109/Tnsm.2020.2999856 |
0.315 |
|
2020 |
Anand S, Ding D, Gasti P, O'Neal M, Conti M, Balagani KS. DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures Ieee Transactions On Network and Service Management. 17: 201-212. DOI: 10.1109/Tnsm.2019.2936425 |
0.371 |
|
2020 |
Sturaro A, Silvestri S, Conti M, Das SK. A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems Ieee Transactions On Network Science and Engineering. 7: 817-831. DOI: 10.1109/Tnse.2018.2872034 |
0.373 |
|
2020 |
Li M, Hu D, Lal C, Conti M, Zhang Z. Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things Ieee Transactions On Industrial Informatics. 16: 6564-6574. DOI: 10.1109/Tii.2020.2974537 |
0.341 |
|
2020 |
Dushku E, Rabbani M, Conti M, Mancini LV, Ranise S. SARA: Secure Asynchronous Remote Attestation for IoT Systems Ieee Transactions On Information Forensics and Security. 15: 3123-3136. DOI: 10.1109/Tifs.2020.2983282 |
0.725 |
|
2020 |
Arora A, Peddoju SK, Conti M. PermPair : Android Malware Detection Using Permission Pairs Ieee Transactions On Information Forensics and Security. 15: 1968-1982. DOI: 10.1109/Tifs.2019.2950134 |
0.369 |
|
2020 |
Gangwal A, Conti M. Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel Ieee Transactions On Information Forensics and Security. 15: 1630-1639. DOI: 10.1109/Tifs.2019.2945171 |
0.343 |
|
2020 |
Saxena N, Conti M, Choo KR, Chaudhari NS. BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices Ieee Transactions On Information Forensics and Security. 15: 1470-1485. DOI: 10.1109/Tifs.2019.2940908 |
0.484 |
|
2020 |
Conti M, Gaspari FD, Mancini LV. A Novel Stealthy Attack to Gather SDN Configuration-Information Ieee Transactions On Emerging Topics in Computing. 8: 328-340. DOI: 10.1109/Tetc.2018.2806977 |
0.731 |
|
2020 |
Li M, Chen Y, Zheng S, Hu D, Lal C, Conti M. Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3017534 |
0.388 |
|
2020 |
Yu C, Gochhayat SP, Conti M, Lu C. Privacy Aware Data Deduplication for Side Channel in Cloud Storage Ieee Transactions On Cloud Computing. 8: 597-609. DOI: 10.1109/Tcc.2018.2794542 |
0.433 |
|
2020 |
Goyat R, Kumar G, Saha R, Conti M, Rai MK, Thomas R, Alazab M, Hoon-Kim T. Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3019074 |
0.389 |
|
2020 |
Ambrosin M, Conti M, Lazzeretti R, Rabbani M, Ranise S. Collective Remote Attestation at the Internet of Things Scale: State-of-the-art and Future Challenges Ieee Communications Surveys and Tutorials. 1-1. DOI: 10.1109/Comst.2020.3008879 |
0.743 |
|
2020 |
Conti M, Gangwal A, Hassan M, Lal C, Losiouk E. The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions Ieee Communications Surveys and Tutorials. 22: 2104-2129. DOI: 10.1109/Comst.2020.2994526 |
0.426 |
|
2020 |
Conti M, Kaliyar P, Lal C. A robust multicast communication protocol for Low power and Lossy networks Journal of Network and Computer Applications. 164: 102675. DOI: 10.1016/J.Jnca.2020.102675 |
0.443 |
|
2020 |
Wang S, Chen Z, Yan Q, Ji K, Peng L, Yang B, Conti M. Deep and broad URL feature mining for android malware detection Information Sciences. 513: 600-613. DOI: 10.1016/J.Ins.2019.11.008 |
0.381 |
|
2020 |
Ardagna CA, Conti M, Yu C. Special issue on Trusted Cloud-Edges Computations Future Generation Computer Systems. 112: 1180-1183. DOI: 10.1016/J.Future.2020.07.060 |
0.304 |
|
2020 |
Taheri R, Ghahramani M, Javidan R, Shojafar M, Pooranian Z, Conti M. Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features Future Generation Computer Systems. 105: 230-247. DOI: 10.1016/J.Future.2019.11.034 |
0.682 |
|
2020 |
Kaliyar P, Jaballah WB, Conti M, Lal C. LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks Computers & Security. 94: 101849. DOI: 10.1016/J.Cose.2020.101849 |
0.486 |
|
2020 |
Conti M, Lal C. Context-based Co-presence detection techniques: A survey Computers & Security. 88: 101652. DOI: 10.1016/J.Cose.2019.101652 |
0.418 |
|
2020 |
Halder S, Ghosal A, Conti M. Secure over-the-air software updates in connected vehicles: A survey Computer Networks. 178: 107343. DOI: 10.1016/J.Comnet.2020.107343 |
0.38 |
|
2020 |
Hassan M, Conti M, Lal C. NC based DAS-NDN: Network Coding for robust Dynamic Adaptive Streaming over NDN Computer Networks. 174: 107222. DOI: 10.1016/J.Comnet.2020.107222 |
0.432 |
|
2020 |
Jaballah WB, Conti M, Lal C. Security and design requirements for software-defined VANETs Computer Networks. 169: 107099. DOI: 10.1016/J.Comnet.2020.107099 |
0.464 |
|
2020 |
Ghosal A, Conti M. Security issues and challenges in V2X: A Survey Computer Networks. 169: 107093. DOI: 10.1016/J.Comnet.2019.107093 |
0.386 |
|
2020 |
Dave J, Faruki P, Laxmi V, Zemmari A, Gaur MS, Conti M. SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage Computer Communications. 154: 148-159. DOI: 10.1016/J.Comcom.2020.02.037 |
0.45 |
|
2020 |
Conti M, Kaliyar P, Rabbani MM, Ranise S. Attestation-enabled secure and scalable routing protocol for IoT networks Ad Hoc Networks. 98: 102054. DOI: 10.1016/j.adhoc.2019.102054 |
0.311 |
|
2020 |
Anand A, Conti M, Kaliyar P, Lal C. TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks Wireless Networks. 26: 2449-2463. DOI: 10.1007/S11276-019-01975-Y |
0.452 |
|
2020 |
Taheri R, Javidan R, Shojafar M, Vinod P, Conti M. Can machine learning model with static features be fooled: an adversarial machine learning approach Cluster Computing. DOI: 10.1007/S10586-020-03083-5 |
0.626 |
|
2020 |
El-Zawawy MA, Losiouk E, Conti M. Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps International Journal of Information Security. 1-20. DOI: 10.1007/S10207-020-00491-X |
0.337 |
|
2020 |
Taheri R, Javidan R, Shojafar M, Pooranian Z, Miri A, Conti M. On defending against label flipping attacks on malware detection systems Neural Computing and Applications. 1-20. DOI: 10.1007/S00521-020-04831-9 |
0.7 |
|
2019 |
Ding D, Conti M, Figueiredo R. Wide-Scale Internet Disconnection: Impact and Recovery on Social-Based P2P Overlays Ieee Transactions On Network Science and Engineering. 6: 734-747. DOI: 10.1109/Tnse.2018.2871980 |
0.375 |
|
2019 |
Kumar N, Aujla GS, Das AK, Conti M. ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System Ieee Transactions On Industrial Informatics. 15: 6572-6582. DOI: 10.1109/Tii.2019.2922697 |
0.447 |
|
2019 |
Tavella F, Giaretta A, Dooley-Cullinane TM, Conti M, Coffey L, Balasubramaniam S. DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks Ieee Transactions On Emerging Topics in Computing. 1-1. DOI: 10.1109/Tetc.2019.2932685 |
0.358 |
|
2019 |
Acs G, Conti M, Gasti P, Ghali C, Tsudik G, Wood CA. Privacy-Aware Caching in Information-Centric Networking Ieee Transactions On Dependable and Secure Computing. 16: 313-328. DOI: 10.1109/Tdsc.2017.2679711 |
0.447 |
|
2019 |
Choo KR, Conti M, Dehghantanha A. Special Issue on Big Data Applications in Cyber Security and Threat Intelligence – Part 2 Ieee Transactions On Big Data. 5: 423-424. DOI: 10.1109/Tbdata.2019.2933040 |
0.384 |
|
2019 |
Choo KR, Conti M, Dehghantanha A. Special Issue on Big Data Applications in Cyber Security and Threat Intelligence – Part 1 Ieee Transactions On Big Data. 5: 279-281. DOI: 10.1109/Tbdata.2019.2933039 |
0.394 |
|
2019 |
Conti M, Dushku E, Mancini LV. RADIS: Remote Attestation of Distributed IoT Services Arxiv: Cryptography and Security. 25-32. DOI: 10.1109/Sds.2019.8768670 |
0.716 |
|
2019 |
Rabbani M, Vliegen J, Winderickx J, Conti M, Mentens N. SHeLA: Scalable Heterogeneous Layered Attestation Ieee Internet of Things Journal. 6: 10240-10250. DOI: 10.1109/Jiot.2019.2936988 |
0.374 |
|
2019 |
Franqueira VNL, Inacio PRM, Mileva A, Conti M, Leppanen V, Lopes RHC. Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions Ieee Internet of Things Journal. 6: 6363-6367. DOI: 10.1109/Jiot.2019.2926635 |
0.44 |
|
2019 |
Ghosal A, Conti M. Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey Ieee Communications Surveys and Tutorials. 21: 2831-2848. DOI: 10.1109/Comst.2019.2907650 |
0.401 |
|
2019 |
Naranjo PGV, Pooranian Z, Shojafar M, Conti M, Buyya R. FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments Journal of Parallel and Distributed Computing. 132: 274-283. DOI: 10.1016/J.Jpdc.2018.07.003 |
0.728 |
|
2019 |
Gochhayat SP, Kaliyar P, Conti M, Tiwari P, Prasath VBS, Gupta D, Khanna A. LISA: Lightweight context-aware IoT service architecture Journal of Cleaner Production. 212: 1345-1356. DOI: 10.1016/J.Jclepro.2018.12.096 |
0.358 |
|
2019 |
Aghili SF, Mala H, Kaliyar P, Conti M. SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT Future Generation Computer Systems. 101: 621-634. DOI: 10.1016/J.Future.2019.07.004 |
0.446 |
|
2019 |
Bianchi G, Dargahi T, Caponi A, Conti M. Intelligent conditional collaborative private data sharing Future Generation Computer Systems. 96: 1-10. DOI: 10.1016/J.Future.2019.01.001 |
0.421 |
|
2019 |
Vinod P, Zemmari A, Conti M. A machine learning based approach to detect malicious android apps using discriminant system calls Future Generation Computer Systems. 94: 333-350. DOI: 10.1016/J.Future.2018.11.021 |
0.367 |
|
2019 |
Ding D, Conti M, Figueiredo R. SAND: Social-aware, network-failure resilient, and decentralized microblogging system Future Generation Computer Systems. 93: 637-650. DOI: 10.1016/J.Future.2018.11.007 |
0.408 |
|
2019 |
Odelu V, Saha S, Prasath R, Sadineni L, Conti M, Jo M. Efficient privacy preserving device authentication in WBANs for industrial e-health applications Computers & Security. 83: 300-312. DOI: 10.1016/J.Cose.2019.03.002 |
0.418 |
|
2019 |
Deokate B, Lal C, Trček D, Conti M. Mobility-aware cross-layer routing for peer-to-peer networks Computers & Electrical Engineering. 73: 209-226. DOI: 10.1016/J.Compeleceng.2018.11.014 |
0.407 |
|
2019 |
Conti M, Hassan M, Lal C. BlockAuth: BlockChain based distributed producer authentication in ICN Computer Networks. 164: 106888. DOI: 10.1016/J.Comnet.2019.106888 |
0.475 |
|
2019 |
Tajiki MM, Shojafar M, Akbari B, Salsano S, Conti M, Singhal M. Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN Computer Networks. 162: 106850. DOI: 10.1016/J.Comnet.2019.07.006 |
0.71 |
|
2019 |
Halder S, Ghosal A, Conti M. Efficient physical intrusion detection in Internet of Things: A Node deployment approach Computer Networks. 154: 28-46. DOI: 10.1016/J.Comnet.2019.02.019 |
0.393 |
|
2019 |
Dargahi T, Dehghantanha A, Bahrami PN, Conti M, Bianchi G, Benedetto L. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features Journal of Computer Virology and Hacking Techniques. 15: 277-305. DOI: 10.1007/S11416-019-00338-7 |
0.375 |
|
2019 |
Conti M, Lal C, Mohammadi R, Rawat U. Lightweight solutions to counter DDoS attacks in software defined networking Wireless Networks. 25: 2751-2768. DOI: 10.1007/S11276-019-01991-Y |
0.482 |
|
2019 |
Halder S, Ghosal A, Conti M. LiMCA: an optimal clustering algorithm for lifetime maximization of internet of things Wireless Networks. 25: 4459-4477. DOI: 10.1007/S11276-018-1741-0 |
0.374 |
|
2019 |
Maleki N, Rahmani AM, Conti M. MapReduce: an infrastructure review and research insights The Journal of Supercomputing. 75: 6934-7002. DOI: 10.1007/S11227-019-02907-5 |
0.346 |
|
2019 |
Saini A, Gaur MS, Laxmi V, Conti M. You click, I steal: analyzing and detecting click hijacking attacks in web pages International Journal of Information Security. 18: 481-504. DOI: 10.1007/S10207-018-0423-3 |
0.427 |
|
2019 |
Mohammadi R, Conti M, Lal C, Kulhari SC. SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking International Journal of Communication Systems. 32. DOI: 10.1002/Dac.4061 |
0.353 |
|
2019 |
Deepa K, Radhamani G, Vinod P, Shojafar M, Kumar N, Conti M. Identification of Android malware using refined system calls Concurrency and Computation: Practice and Experience. 31. DOI: 10.1002/Cpe.5311 |
0.653 |
|
2019 |
Conti M, Kaliyar P, Lal C. CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm Concurrency and Computation: Practice and Experience. 31. DOI: 10.1002/Cpe.4978 |
0.379 |
|
2019 |
Tajiki MM, Shojafar M, Akbari B, Salsano S, Conti M. Software defined service function chaining with failure consideration for fog computing Concurrency and Computation: Practice and Experience. 31. DOI: 10.1002/Cpe.4953 |
0.655 |
|
2018 |
Pooranian Z, Abawajy JH, Vinod P, Conti M. Scheduling Distributed Energy Resource Operation and Daily Power Consumption for a Smart Building to Optimize Economic and Environmental Parameters Energies. 11: 1-17. DOI: 10.3390/En11061348 |
0.308 |
|
2018 |
Fallah SN, Deo RC, Shojafar M, Conti M, Shamshirband S. Computational Intelligence Approaches for Energy Load Forecasting in Smart Energy Management Grids: State of the Art, Future Challenges, and Research Directions Energies. 11: 596. DOI: 10.3390/En11030596 |
0.656 |
|
2018 |
Acar A, Aksu H, Uluagac AS, Conti M. A Survey on Homomorphic Encryption Schemes: Theory and Implementation Acm Computing Surveys. 51: 79. DOI: 10.1145/3214303 |
0.408 |
|
2018 |
Odelu V, Das AK, Wazid M, Conti M. Provably Secure Authenticated Key Agreement Scheme for Smart Grid Ieee Transactions On Smart Grid. 9: 1-1. DOI: 10.1109/Tsg.2016.2602282 |
0.408 |
|
2018 |
Kumar P, Tripathi M, Nehra A, Conti M, Lal C. SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN Ieee Transactions On Network and Service Management. 15: 1545-1559. DOI: 10.1109/Tnsm.2018.2861741 |
0.386 |
|
2018 |
Spolaor R, Santo ED, Conti M. DELTA: Data Extraction and Logging Tool for Android Ieee Transactions On Mobile Computing. 17: 1289-1302. DOI: 10.1109/Tmc.2017.2762692 |
0.39 |
|
2018 |
Lee P, Yu C, Dargahi T, Conti M, Bianchi G. MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things Ieee Transactions On Information Forensics and Security. 13: 2031-2046. DOI: 10.1109/Tifs.2018.2805291 |
0.407 |
|
2018 |
Taylor VF, Spolaor R, Conti M, Martinovic I. Robust Smartphone App Identification via Encrypted Network Traffic Analysis Ieee Transactions On Information Forensics and Security. 13: 63-78. DOI: 10.1109/Tifs.2017.2737970 |
0.418 |
|
2018 |
Somani G, Gaur MS, Sanghi D, Conti M, Rajarajan M. Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks Ieee Transactions On Dependable and Secure Computing. 15: 959-973. DOI: 10.1109/Tdsc.2017.2763160 |
0.408 |
|
2018 |
Aksu H, Babun L, Conti M, Tolomei G, Uluagac AS. Advertising in the IoT Era: Vision and Challenges Ieee Communications Magazine. 56: 138-144. DOI: 10.1109/Mcom.2017.1700871 |
0.451 |
|
2018 |
Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks Ieee Internet of Things Journal. 5: 269-282. DOI: 10.1109/Jiot.2017.2780232 |
0.47 |
|
2018 |
Conti M, Li QQ, Maragno A, Spolaor R. The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis Ieee Communications Surveys and Tutorials. 20: 2658-2713. DOI: 10.1109/Comst.2018.2843533 |
0.426 |
|
2018 |
Conti M, Kumar ES, Lal C, Ruj S. A Survey on Security and Privacy Issues of Bitcoin Ieee Communications Surveys and Tutorials. 20: 3416-3452. DOI: 10.1109/Comst.2018.2842460 |
0.453 |
|
2018 |
Ambrosin M, Compagno A, Conti M, Ghali C, Tsudik G. Security and Privacy Analysis of National Science Foundation Future Internet Architectures Ieee Communications Surveys and Tutorials. 20: 1418-1442. DOI: 10.1109/Comst.2018.2798280 |
0.432 |
|
2018 |
Zhao C, Zhao S, Zhang B, Jia Z, Chen Z, Conti M. Secure Comparison Under Ideal/Real Simulation Paradigm Ieee Access. 6: 31236-31248. DOI: 10.1109/Access.2018.2837665 |
0.38 |
|
2018 |
Cascavilla G, Beato F, Burattin A, Conti M, Mancini LV. OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover “private” information in OSN profiles Online Social Networks and Media. 6: 58-68. DOI: 10.1016/J.Osnem.2018.04.003 |
0.381 |
|
2018 |
Conti M, Dehghantanha A, Franke K, Watson S. Internet of Things security and forensics: Challenges and opportunities Future Generation Computer Systems. 78: 544-546. DOI: 10.1016/J.Future.2017.07.060 |
0.455 |
|
2018 |
Conti M, Gangwal A, Ruj S. On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective Computers & Security. 79: 162-189. DOI: 10.1016/J.Cose.2018.08.008 |
0.353 |
|
2018 |
Conti M, Droms RE, Hassan M, Lal C. Fair-RTT-DAS: A robust and efficient dynamic adaptive streaming over ICN Computer Communications. 129: 209-225. DOI: 10.1016/J.Comcom.2018.07.033 |
0.41 |
|
2018 |
Jaballah WB, Conti M, Filè G, Mosbah M, Zemmari A. Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks Computer Communications. 119: 66-82. DOI: 10.1016/J.Comcom.2018.01.010 |
0.405 |
|
2018 |
Azmoodeh A, Dehghantanha A, Conti M, Choo KR. Detecting crypto-ransomware in IoT networks based on energy consumption footprint Journal of Ambient Intelligence and Humanized Computing. 9: 1141-1152. DOI: 10.1007/S12652-017-0558-5 |
0.406 |
|
2018 |
Lal C, Laxmi V, Gaur MS, Conti M. Enhancing QoE for video streaming in MANETs via multi-constraint routing Wireless Networks. 24: 235-256. DOI: 10.1007/S11276-016-1325-9 |
0.413 |
|
2018 |
Nazhad SHH, Shojafar M, Shamshirband S, Conti M. An efficient routing protocol for the QoS support of large-scale MANETs International Journal of Communication Systems. 31. DOI: 10.1002/Dac.3384 |
0.678 |
|
2017 |
Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment. Ieee Journal of Biomedical and Health Informatics. PMID 28682267 DOI: 10.1109/Jbhi.2017.2721545 |
0.328 |
|
2017 |
Naranjo PGV, Pooranian Z, Shamshirband S, Abawajy JH, Conti M. Fog over virtualized IoT: new opportunity for context-aware networked applications and a case study Applied Sciences. 7: 1325. DOI: 10.3390/App7121325 |
0.423 |
|
2017 |
Ambrosin M, Braca P, Conti M, Lazzeretti R. ODIN: O bfuscation-Based Privacy-Preserving Consensus Algorithm for D ecentralized I nformation Fusion in Smart Device N etworks Acm Transactions On Internet Technology. 18: 6. DOI: 10.1145/3137573 |
0.788 |
|
2017 |
Mohammadi R, Javidan R, Conti M. SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks Ieee Transactions On Network and Service Management. 14: 487-497. DOI: 10.1109/Tnsm.2017.2701549 |
0.402 |
|
2017 |
Ambrosin M, Conti M, Gaspari FD, Poovendran R. LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking Ieee Acm Transactions On Networking. 25: 1206-1219. DOI: 10.1109/Tnet.2016.2626287 |
0.416 |
|
2017 |
Perazzo P, Sorbelli FB, Conti M, Dini G, Pinotti CM. Drone Path Planning for Secure Positioning and Secure Position Verification Ieee Transactions On Mobile Computing. 16: 2478-2493. DOI: 10.1109/Tmc.2016.2627552 |
0.4 |
|
2017 |
Wang S, Yan Q, Chen Z, Yang B, Zhao C, Conti M. Detecting Android Malware Leveraging Text Semantics of Network Flows Ieee Transactions On Information Forensics and Security. 13: 1096-1109. DOI: 10.1109/Tifs.2017.2771228 |
0.403 |
|
2017 |
Somani G, Gaur MS, Sanghi D, Conti M, Rajarajan M, Buyya R. Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions Ieee Cloud Computing. 4: 22-32. DOI: 10.1109/Mcc.2017.14 |
0.423 |
|
2017 |
Lal C, Petroccia R, Pelekanakis K, Conti M, Alves J. Toward the Development of Secure Underwater Acoustic Networks Ieee Journal of Oceanic Engineering. 42: 1075-1087. DOI: 10.1109/Joe.2017.2716599 |
0.447 |
|
2017 |
Dargahi T, Caponi A, Ambrosin M, Bianchi G, Conti M. A Survey on the Security of Stateful SDN Data Planes Ieee Communications Surveys and Tutorials. 19: 1701-1725. DOI: 10.1109/Comst.2017.2689819 |
0.411 |
|
2017 |
Cascavilla G, Conti M, Schwartz DG, Yahav I. The insider on the outside: a novel system for the detection of information leakers in social networks European Journal of Information Systems. 27: 470-485. DOI: 10.1080/0960085X.2017.1387712 |
0.339 |
|
2017 |
Li Q, Gochhayat SP, Conti M, Liu F. EnergIoT: A solution to improve network lifetime of IoT devices Pervasive and Mobile Computing. 42: 124-133. DOI: 10.1016/J.Pmcj.2017.10.005 |
0.397 |
|
2017 |
Ardagna CA, Ariyapala K, Conti M, Pinotti CM, Stefa J. Anonymous end-to-end communications in adversarial mobile clouds Pervasive and Mobile Computing. 36: 57-67. DOI: 10.1016/J.Pmcj.2016.09.001 |
0.459 |
|
2017 |
Ali R, Pal AK, Kumari S, Karuppiah M, Conti M. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring Future Generation Computer Systems. 84: 200-215. DOI: 10.1016/J.Future.2017.06.018 |
0.431 |
|
2017 |
Bhandari S, Jaballah WB, Jain V, Laxmi V, Zemmari A, Gaur MS, Mosbah M, Conti M. Android inter-app communication threats and detection techniques Computers & Security. 70: 392-421. DOI: 10.1016/J.Cose.2017.07.002 |
0.393 |
|
2017 |
Idrees F, Rajarajan M, Conti M, Chen TM, Rahulamathavan Y. PIndroid: A novel Android malware detection system using ensemble learning methods Computers & Security. 68: 36-46. DOI: 10.1016/J.Cose.2017.03.011 |
0.359 |
|
2017 |
Somani G, Gaur MS, Sanghi D, Conti M, Rajarajan M. DDoS victim service containment to minimize the internal collateral damages in cloud computing Computers & Electrical Engineering. 59: 165-179. DOI: 10.1016/J.Compeleceng.2016.12.004 |
0.37 |
|
2017 |
Somani G, Gaur MS, Sanghi D, Conti M, Buyya R. DDoS attacks in cloud computing Computer Communications. 107: 30-48. DOI: 10.1016/J.Comcom.2017.03.010 |
0.413 |
|
2017 |
Somani G, Gaur MS, Sanghi D, Conti M, Buyya R. Service resizing for quick DDoS mitigation in cloud computing environment Annales Des TéLéCommunications. 72: 237-252. DOI: 10.1007/S12243-016-0552-5 |
0.387 |
|
2016 |
Teing YY, Dehghantanha A, Choo KR, Dargahi T, Conti M. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study. Journal of Forensic Sciences. PMID 27885663 DOI: 10.1111/1556-4029.13271 |
0.393 |
|
2016 |
Ariyapala K, Do HG, Anh HN, Ng WK, Conti M. A host and network based intrusion detection for android smartphones Proceedings - Ieee 30th International Conference On Advanced Information Networking and Applications Workshops, Waina 2016. 849-854. DOI: 10.1109/WAINA.2016.35 |
0.338 |
|
2016 |
Compagno A, Conti M, D'Amico AA, Dini G, Perazzo P, Taponecco L. Modeling Enlargement Attacks Against UWB Distance Bounding Protocols Ieee Transactions On Information Forensics and Security. 11: 1565-1577. DOI: 10.1109/Tifs.2016.2541613 |
0.402 |
|
2016 |
Giaretta A, Balasubramaniam S, Conti M. Security vulnerabilities and countermeasures for target localization in Bio-NanoThings communication networks Ieee Transactions On Information Forensics and Security. 11: 665-676. DOI: 10.1109/Tifs.2015.2505632 |
0.385 |
|
2016 |
Conti M, Mancini LV, Spolaor R, Verde NV. Analyzing Android Encrypted Network Traffic to Identify User Actions Ieee Transactions On Information Forensics and Security. 11: 114-125. DOI: 10.1109/Tifs.2015.2478741 |
0.759 |
|
2016 |
Ambrosin M, Anzanpour A, Conti M, Dargahi T, Moosavi SR, Rahmani AM, Liljeberg P. On the Feasibility of Attribute-Based Encryption on Internet of Things Devices Ieee Micro. 36: 25-35. DOI: 10.1109/Mm.2016.101 |
0.419 |
|
2016 |
Sturaro A, Silvestri S, Conti M, Das SK. Towards a realistic model for failure propagation in interdependent networks 2016 International Conference On Computing, Networking and Communications, Icnc 2016. DOI: 10.1109/Iccnc.2016.7440711 |
0.365 |
|
2016 |
Conti M, Dragoni N, Lesyk V. A Survey of Man In The Middle Attacks Ieee Communications Surveys and Tutorials. 18: 2027-2051. DOI: 10.1109/Comst.2016.2548426 |
0.439 |
|
2016 |
Saini A, Gaur MS, Laxmi V, Conti M. Colluding browser extension attack on user privacy and its implication for web browsers Computers & Security. 63: 14-28. DOI: 10.1016/J.Cose.2016.09.003 |
0.431 |
|
2015 |
Ambrosin M, Conti M, Dargahi T. On the feasibility of attribute-based encryption on smartphone devices Iot-Sys 2015 - Proceedings of the 2015 Workshop On Iot Challenges in Mobile and Industrial Systems. 49-54. DOI: 10.1145/2753476.2753482 |
0.306 |
|
2015 |
Ambrosin M, Conti M, De Gaspari F, Poovendran R. LineSwitch: Efficiently managing switch flow in Software-Defined Networking while effectively tackling DoS attacks Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 639-644. DOI: 10.1145/2714576.2714612 |
0.306 |
|
2015 |
Perazzo P, Ariyapala K, Conti M, Dini G. The verifier bee: A path planner for drone-based secure location verification Proceedings of the Wowmom 2015: a World of Wireless Mobile and Multimedia Networks. DOI: 10.1109/WoWMoM.2015.7158150 |
0.335 |
|
2015 |
Conti M, Cozza V, Petrocchi M, Spognardi A. TRAP: Using Targeted ads to unveil Google personal profiles 2015 Ieee International Workshop On Information Forensics and Security, Wifs 2015 - Proceedings. DOI: 10.1109/WIFS.2015.7368607 |
0.307 |
|
2015 |
Guarino S, Canlar ES, Conti M, Di Pietro R, Solanas A. Provable Storage Medium for Data Storage Outsourcing Ieee Transactions On Services Computing. 8: 985-997. DOI: 10.1109/Tsc.2014.2355229 |
0.403 |
|
2015 |
Conti M, Crispo B, Diodati D, Nurminen JK, Pinotti CM, Teemaa T. Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones Ieee Transactions On Parallel and Distributed Systems. 26: 2778-2790. DOI: 10.1109/Tpds.2014.2360693 |
0.713 |
|
2015 |
Naval S, Laxmi V, Rajarajan M, Gaur MS, Conti M. Employing Program Semantics for Malware Detection Ieee Transactions On Information Forensics and Security. 10: 2591-2604. DOI: 10.1109/Tifs.2015.2469253 |
0.372 |
|
2015 |
Ben Jaballah W, Conti M, Mosbah M, Palazzi CE. Impact of security threats in vehicular alert messaging systems 2015 Ieee International Conference On Communication Workshop, Iccw 2015. 2627-2632. DOI: 10.1109/ICCW.2015.7247575 |
0.326 |
|
2015 |
Compagno A, Conti M, Ghali C, Tsudik G. To NACK or not to NACK? Negative acknowledgments in information-centric networking Proceedings - International Conference On Computer Communications and Networks, Icccn. 2015. DOI: 10.1109/ICCCN.2015.7288477 |
0.351 |
|
2015 |
Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M. Android security: A survey of issues, malware penetration, and defenses Ieee Communications Surveys and Tutorials. 17: 998-1022. DOI: 10.1109/Comst.2014.2386139 |
0.447 |
|
2015 |
Ambrosin M, Hosseini H, Mandal K, Conti M, Poovendran R. Verifiable and privacy-preserving fine-grained data-collection for smart metering 2015 Ieee Conference On Communications and Networksecurity, Cns 2015. 655-658. DOI: 10.1109/CNS.2015.7346882 |
0.329 |
|
2015 |
Ariyapala K, Conti M, Pinotti CM. CaT: Evaluating cloud-aided TLS for smartphone energy efficiency 2015 Ieee Conference On Communications and Networksecurity, Cns 2015. 601-609. DOI: 10.1109/CNS.2015.7346874 |
0.351 |
|
2015 |
Somani G, Gaur MS, Sanghi D, Conti M. DDoS attacks in Cloud Computing: Collateral Damage to Non-targets Computer Networks. DOI: 10.1016/J.Comnet.2016.03.022 |
0.412 |
|
2015 |
Dargahi T, Ambrosin M, Conti M, Asokan N. ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs Computer Communications. DOI: 10.1016/J.Comcom.2016.03.002 |
0.384 |
|
2015 |
Li F, Rahulamathavan Y, Conti M, Rajarajan M. Robust access control framework for mobile cloud computing network Computer Communications. 68: 61-72. DOI: 10.1016/J.Comcom.2015.07.005 |
0.464 |
|
2015 |
Compagno A, Conti M, Gasti P, Mancini LV, Tsudik G. Violating consumer anonymity: Geo-locating nodes in named data networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9092: 243-262. DOI: 10.1007/978-3-319-28166-7_12 |
0.366 |
|
2015 |
Faruki P, Bhandari S, Laxmi V, Gaur M, Conti M. Droidanalyst: Synergic app framework for static and dynamic app analysis Studies in Computational Intelligence. 621: 519-552. DOI: 10.1007/978-3-319-26450-9_20 |
0.322 |
|
2014 |
Ardagna CA, Conti M, Leone M, Stefa J. An anonymous end-to-end communication protocol for mobile cloud environments Ieee Transactions On Services Computing. 7: 373-386. DOI: 10.1109/Tsc.2014.2304717 |
0.45 |
|
2014 |
Ben Jaballah W, Conti M, Mosbah M, Palazzi CE. Fast and secure multihop broadcast solutions for intervehicular communication Ieee Transactions On Intelligent Transportation Systems. 15: 433-450. DOI: 10.1109/Tits.2013.2277890 |
0.438 |
|
2014 |
Roy S, Conti M, Setia S, Jajodia S. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact Ieee Transactions On Information Forensics and Security. 9: 681-694. DOI: 10.1109/Tifs.2014.2307197 |
0.436 |
|
2014 |
Zhauniarovich Y, Russello G, Conti M, Crispo B, Fernandes E. MOSES: Supporting and Enforcing Security Profiles on Smartphones Ieee Transactions On Dependable and Secure Computing. 11: 211-223. DOI: 10.1109/Tdsc.2014.2300482 |
0.745 |
|
2014 |
Conti M, Di Pietro R, Spognardi A. Clone wars: Distributed detection of clone attacks in mobile WSNs Journal of Computer and System Sciences. 80: 654-669. DOI: 10.1016/J.Jcss.2013.06.017 |
0.467 |
|
2014 |
Ben Jaballah W, Conti M, Mosbah M, Palazzi CE. A secure alert messaging system for safe driving Computer Communications. 46: 29-42. DOI: 10.1016/J.Comcom.2014.03.010 |
0.445 |
|
2014 |
Panaousis E, Alpcan T, Fereidooni H, Conti M. Secure message delivery games for device-to-device communications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8840: 195-215. |
0.358 |
|
2013 |
Conti M, Hasani A, Crispo B. Virtual private social networks and a facebook implementation Acm Transactions On the Web. 7: 14. DOI: 10.1145/2516633.2516636 |
0.737 |
|
2013 |
Rocha BPS, Conti M, Etalle S, Crispo B. Hybrid Static-Runtime Information Flow and Declassification Enforcement Ieee Transactions On Information Forensics and Security. 8: 1294-1305. DOI: 10.1109/Tifs.2013.2267798 |
0.72 |
|
2013 |
Fernandes E, Crispo B, Conti M. FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment Ieee Transactions On Information Forensics and Security. 8: 1027-1037. DOI: 10.1109/Tifs.2013.2259818 |
0.421 |
|
2013 |
Conti M, Willemsen J, Crispo B. Providing source location privacy in wireless sensor networks: A survey Ieee Communications Surveys and Tutorials. 15: 1238-1280. DOI: 10.1109/Surv.2013.011413.00118 |
0.741 |
|
2013 |
Compagno A, Conti M, Gasti P, Tsudik G. Poseidon: Mitigating interest flooding DDoS attacks in named data networking Proceedings - Conference On Local Computer Networks, Lcn. 630-638. DOI: 10.1109/LCN.2013.6761300 |
0.366 |
|
2013 |
Acs G, Conti M, Gasti P, Ghali C, Tsudik G. Cache privacy in named-data networking Proceedings - International Conference On Distributed Computing Systems. 41-51. DOI: 10.1109/ICDCS.2013.12 |
0.337 |
|
2013 |
Canlar ES, Conti M, Crispo B, Pietro RD. Windows Mobile LiveSD Forensics Journal of Network and Computer Applications. 36: 677-684. DOI: 10.1016/J.Jnca.2012.12.024 |
0.72 |
|
2013 |
Conti M, Gasti P, Teoli M. A lightweight mechanism for detection of cache pollution attacks in Named Data Networking Computer Networks. 57: 3178-3191. DOI: 10.1016/J.Comnet.2013.07.034 |
0.46 |
|
2013 |
Zhang L, Zhang H, Conti M, Pietro R, Jajodia S, Mancini LV. Preserving privacy against external and internal threats in WSN data aggregation Telecommunication Systems. 52: 2163-2176. DOI: 10.1007/S11235-011-9539-8 |
0.722 |
|
2012 |
Conti M, Crispo B, Fernandes E, Zhauniarovich Y. CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android Ieee Transactions On Information Forensics and Security. 7: 1426-1438. DOI: 10.1109/Tifs.2012.2204249 |
0.722 |
|
2012 |
Roy S, Conti M, Setia S, Jajodia S. Secure Data Aggregation in Wireless Sensor Networks Ieee Transactions On Information Forensics and Security. 7: 1040-1052. DOI: 10.1109/Tifs.2012.2189568 |
0.417 |
|
2011 |
Conti M, Pietro RD, Spognardi A. Who counterfeited my Viagra? probabilistic item removal detection via RFID tag cooperation Eurasip Journal On Wireless Communications and Networking. 2011: 1-13. DOI: 10.1155/2011/575171 |
0.389 |
|
2011 |
Marconi L, Pietro RD, Crispo B, Conti M. Time in privacy preserving LBSs: an overlooked dimension International Journal of Vehicular Technology. 2011: 1-12. DOI: 10.1155/2011/486975 |
0.374 |
|
2011 |
Conti M, Pietro RD, Mancini LV, Mei A. Distributed Detection of Clone Attacks in Wireless Sensor Networks Ieee Transactions On Dependable and Secure Computing. 8: 685-698. DOI: 10.1109/Tdsc.2010.25 |
0.739 |
|
2011 |
Conti M, Pietro RD, Gabrielli A, Mancini LV. Secure topology maintenance and events collection in WSNs Security and Communication Networks. 4: 744-762. DOI: 10.1002/Sec.280 |
0.473 |
|
2010 |
Conti M, Pietro RD, Mancini LV, Spognardi A. eRIPP-FS: Enforcing privacy and security in RFID Security and Communication Networks. 3: 58-70. DOI: 10.1002/Sec.120 |
0.738 |
|
2009 |
Conti M, Pietro RD, Mancini LV, Mei A. Distributed data source verification in wireless sensor networks Information Fusion. 10: 342-353. DOI: 10.1016/J.Inffus.2009.01.002 |
0.742 |
|
2009 |
Conti M, Zhang L, Roy S, Pietro RD, Jajodia S, Mancini LV. Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks Security and Communication Networks. 2: 195-213. DOI: 10.1002/Sec.95 |
0.719 |
|
Show low-probability matches. |