CONTI, MAURO
CONTI, MAURO
Dipartimento di Matematica "Tullio Levi-Civita" - DM
Adapting the system to users based on implicit data: Ethical risks and possible solutions
2017 Spagnolli, Anna; Conti, Mauro; Guerra, Giorgia; Freeman, Jonathan; Kirsh, David; van Wynsberghe, Aimee
Analysis of security in modern container platforms
2017 Lauren, S.; Reza Memarian, M.; Conti, M.; Leppanen, V.
Anonymity in an electronic society: A survey
2016 Conti, Mauro; Gaspari, Fabio De; Mancini, Luigi Vincenzo .
Attestation-enabled Secure and Scalable Routing protocol for IoT Networks
2020 Conti, Mauro; Kaliyar, Pallavi; Rabbani, MD MASOOM; Ranise, Silvio
AutoSec: Secure Automotive Data Transmission Scheme for In-Vehicle Networks
2022 Limbasiya, T.; Ghosal, A.; Conti, M.
Contactless Authentication for Wearable Devices Using RFID
2022 Bellandi, V.; Ceravolo, P.; Conti, M.; Ehsanpour, M.
Cryptocurrency Wallets: Assessment and Security
2023 Nowroozi, E.; Seyedshoari, S.; Mekdad, Y.; Savas, E.; Conti, M.
Cyber Forensics for CPS
2021 Conti, Mauro; Turrin, Federico
Cyber Threat Intelligence
2018 Dehghantanha, A.; Conti, M.; Dargahi, T.
De-auth of the blue! transparent de-authentication using bluetooth low energy beacon
2020 Conti, M.; Tricomi, P. P.; Tsudik, G.
Detecting covert cryptomining using HPC
2020 Gangwal, A.; Piazzetta, S. G.; Lain, G.; Conti, M.
Distributed services attestation in IoT
2018 Conti, M.; Dushku, E.; Mancini, L. V.
DroidAnalyst: Synergic Framework for Static and Dynamic App Analysis
2015 Faruki, Parvez; Laxmi, Vijay; Gaur, Manoj; Bhandari, Shweta; Conti, Mauro
Efficient Classification of Android Malware in the wild using Robust Static Features
2016 Fereidooni, Hossein; Moonsamy, Veelasha; Conti, Mauro; Batina, Lejla
Forensics Analysis of Android Mobile VoIP Apps
2016 Dargahi, Tooska; Dehghantanha, Ali; Conti, Mauro
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study
2016 Dargahi, Tooska; Dehghantanha, Ali; Conti, Mauro
Investigating the possibility of data leakage in time of live VM migration
2018 Yasmin, R.; Memarian, M. R.; Hosseinzadeh, S.; Conti, M.; Leppanen, V.
Malware signature generation using locality sensitive hashing
2019 Naderi, H.; Puthuvath, Vinod; Conti, M.; Parsa, S.; Alaeiyan, M. H.
Privacy for LBSs: On Using a Footprint model to face the enemy
2014 Conti, Mauro; DI PIETRO, Roberto; Luciana, Marconi
Proof of Evolution: Leveraging blockchain mining for a cooperative execution of Genetic Algorithms
2020 Bizzaro, F.; Conti, M.; Pini, M. S.