" Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation M Conti, R Di Pietro, A Spognardi EURASIP Journal on Wireless Communications and Networking 2011, 1-13, 2011 | 5 | 2011 |
◾ Computing Technology for Trusted Cloud Security R Di Pietro, F Lombardi, M Signorini Cloud Computing Security, 357-370, 2016 | 2 | 2016 |
2011 Index IEEE Transactions on Dependable and Secure Computing Vol. 8 A Ademaj, A Al Shidhani, C Alberola-Lopez, Y Amir, MP Anastasopoulos, ... | | |
2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data-Committees J Bian, HCM France, M Colajanni, R Di Pietro, Y Dong, Y Guan, S Guo, ... | | |
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)| 978-1-6654-1623-8/21/$31.00© 2021 IEEE| DOI: 10.1109 … T Abdelgalil, P Aggarwal, SF Ahamed, ME Alim, A Ayachitula, ... | | |
A blockchain-based distributed Trust System for the Internet of Things R Di Pietro, X Salleras, M Signorini, E Waisbard | | |
A blockchain-based trust system for the internet of things R Di Pietro, X Salleras, M Signorini, E Waisbard Proceedings of the 23nd ACM on symposium on access control models and …, 2018 | 126 | 2018 |
A business-driven decomposition methodology for role mining A Colantonio, R Di Pietro, NV Verde Computers & Security 31 (7), 844-855, 2012 | 34 | 2012 |
A cost-driven approach to role engineering A Colantonio, R Di Pietro, A Ocello Proceedings of the 2008 ACM symposium on Applied computing, 2129-2136, 2008 | 96 | 2008 |
A Criticism to Society S Cresci, M Petrocchi, A Spognardi, M Tesconi, R Di Pietro | | 2014 |
A criticism to society (as seen by twitter analytics) S Cresci, M Petrocchi, A Spognardi, M Tesconi, R Di Pietro 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 36 | 2014 |
A dataset of barometric readings for enhancing security and privacy of IoT OA Ibrahim, G Oligeri, R Di Pietro Data in Brief 51, 109782, 2023 | 1 | 2023 |
A Fake Follower Story: improving fake accounts detection on Twitter S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi IIT-CNR, Tech. Rep. TR-03, 2014 | 30 | 2014 |
A Fake Follower Story: improving fake accounts detection on Twitter. IIT-CNR S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi Tech. Rep. TR-03, 2014 | 9 | 2014 |
A formal framework for the performance analysis of P2P networks protocols A Spognardi, R Di Pietro Proceedings 20th IEEE International Parallel & Distributed Processing …, 2006 | 16 | 2006 |
A formal framework to elicit roles with business meaning in RBAC systems A Colantonio, R Di Pietro, A Ocello, NV Verde Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 78 | 2009 |
A hole in the sky: de-anonymizing OpenSky receivers S Alhazbi, S Sciancalepore, R Di Pietro TR 2018-2, 2018 | 2 | 2018 |
A linear-time multivariate micro-aggregation for privacy protection in uniform very large data sets A Solanas, R Di Pietro Modeling Decisions for Artificial Intelligence: 5th International Conference …, 2008 | 15 | 2008 |
A Live Digital Forensic system for Windows networks LV Mancini, R Di Pietro, M Formica, AD Biagio, R Battistoni International Federation for Information Processing Digital Library 278 (1), 2010 | | 2010 |
A Live Digital Forensic system for Windows networks R Battistoni, A Biagio, R Di Pietro, M Formica, L Mancini Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 12 | 2008 |