MADAM: a multi-level anomaly detector for android malware G Dini, F Martinelli, A Saracino, D Sgandurra International Conference on Mathematical Methods, Models, and Architectures …, 2012 | 550 | 2012 |
Madam: Effective and efficient behavior-based android malware detection and prevention A Saracino, D Sgandurra, G Dini, F Martinelli IEEE Transactions on Dependable and Secure Computing 15 (1), 83-97, 2016 | 489 | 2016 |
An algorithm for reconnecting wireless sensor network partitions G Dini, M Pelagatti, IM Savino European Conference on Wireless Sensor Networks, 253-267, 2008 | 102 | 2008 |
Considerations on security in zigbee networks G Dini, M Tiloca 2010 IEEE International Conference on Sensor Networks, ubiquitous, and …, 2010 | 99 | 2010 |
BRUSCHETTA: An IoT blockchain-based framework for certifying extra virgin olive oil supply chain A Arena, A Bianchini, P Perazzo, C Vallati, G Dini 2019 IEEE international conference on smart computing (SMARTCOMP), 173-179, 2019 | 94 | 2019 |
Enriched view synchrony: A programming paradigm for partitionable asynchronous distributed systems Ö Babaoglu, A Bartoli, G Dini IEEE Transactions on Computers 46 (6), 642-658, 1997 | 84 | 1997 |
Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network G Dini, AL Duca Ad Hoc Networks 10 (7), 1167-1178, 2012 | 78 | 2012 |
DIO suppression attack against routing in the Internet of Things P Perazzo, C Vallati, G Anastasi, G Dini IEEE Communications Letters 21 (11), 2524-2527, 2017 | 75 | 2017 |
Drone path planning for secure positioning and secure position verification P Perazzo, FB Sorbelli, M Conti, G Dini, CM Pinotti IEEE Transactions on Mobile Computing 16 (9), 2478-2493, 2016 | 75 | 2016 |
A secure communication suite for underwater acoustic sensor networks G Dini, A Lo Duca Sensors 12 (11), 15133-15158, 2012 | 75 | 2012 |
Risk analysis of Android applications: A user-centric solution G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra Future Generation Computer Systems 80, 505-518, 2018 | 67 | 2018 |
Consensus-based distributed intrusion detection for multi-robot systems A Fagiolini, M Pellinacci, G Valenti, G Dini, A Bicchi 2008 IEEE International Conference on Robotics and Automation, 120-127, 2008 | 65 | 2008 |
Secure cooperation of autonomous mobile sensors using an underwater acoustic network A Caiti, V Calabro, G Dini, AL Duca, A Munafo Sensors 12 (2), 1967-1989, 2012 | 64 | 2012 |
A secure and available electronic voting service for a large-scale distributed system G Dini Future Generation Computer Systems 19 (1), 69-85, 2003 | 63 | 2003 |
An efficient key revocation protocol for wireless sensor networks G Dini, IM Savino 2006 International Symposium on a World of Wireless, Mobile and Multimedia …, 2006 | 61 | 2006 |
IEEE 802.15. 4 and ZigBee as enabling technologies for low-power wireless systems with quality-of-service constraints S Tennina, A Koubâa, R Daidone, M Alves, P Jurčík, R Severino, M Tiloca, ... Springer Science & Business Media, 2013 | 59 | 2013 |
S2rp: a secure and scalable rekeying protocol for wireless sensor networks G Dini, IM Savino 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 457-466, 2006 | 57 | 2006 |
A survey on attribute-based encryption schemes suitable for the internet of things M Rasori, M La Manna, P Perazzo, G Dini IEEE Internet of Things Journal 9 (11), 8269-8290, 2022 | 56 | 2022 |
Decentralized intrusion detection for secure cooperative multi-agent systems A Fagiolini, G Valenti, L Pallottino, G Dini, A Bicchi 2007 46th IEEE Conference on Decision and Control, 1553-1558, 2007 | 54 | 2007 |
Graphical design of distributed applications through reusable components A Bartoli, P Corsini, G Dini, CA Prete IEEE Parallel & Distributed Technology: Systems & Applications 3 (1), 37-50, 1995 | 54 | 1995 |