Scalable and efficient provable data possession G Ateniese, R Di Pietro, LV Mancini, G Tsudik Proceedings of the 4th international conference on Security and privacy in …, 2008 | 1777 | 2008 |
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici International Journal of Security and Networks 10 (3), 137-150, 2015 | 556 | 2015 |
Random key-assignment for secure wireless sensor networks R Di Pietro, LV Mancini, A Mei Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 413 | 2003 |
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007 | 305 | 2007 |
Analyzing android encrypted network traffic to identify user actions M Conti, LV Mancini, R Spolaor, NV Verde IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015 | 298 | 2015 |
Distributed detection of clone attacks in wireless sensor networks M Conti, R Di Pietro, L Mancini, A Mei IEEE transactions on dependable and secure computing 8 (5), 685-698, 2010 | 245 | 2010 |
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks R Di Pietro, LV Mancini, YW Law, S Etalle, P Havinga 2003 International Conference on Parallel Processing Workshops, 2003 …, 2003 | 224 | 2003 |
Intrusion detection systems R Di Pietro, LV Mancini Springer Science & Business Media, 2008 | 210 | 2008 |
A graph-based formalism for RBAC M Koch, LV Mancini, F Parisi-Presicce ACM Transactions on Information and System Security (TISSEC) 5 (3), 332-365, 2002 | 176 | 2002 |
REMUS: A security-enhanced operating system M Bernaschi, E Gabrielli, LV Mancini ACM Transactions on Information and System Security (TISSEC) 5 (1), 36-61, 2002 | 168 | 2002 |
Catch me (if you can): Data survival in unattended sensor networks R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik 2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008 | 157 | 2008 |
Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems AA Bertossi, LV Mancini, F Rossini IEEE Transactions on Parallel and Distributed Systems 10 (9), 934-945, 1999 | 152 | 1999 |
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Proceedings of the first ACM conference on Wireless network security, 214-219, 2008 | 150 | 2008 |
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis M Conti, LV Mancini, R Spolaor, NV Verde Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 145 | 2015 |
Operating system enhancements to prevent the misuse of system calls M Bernaschi, E Gabrielli, LV Mancini Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 131 | 2000 |
Security and privacy issues of handheld and wearable wireless devices R Di Pietro, LV Mancini Communications of the ACM 46 (9), 74-79, 2003 | 115 | 2003 |
Redoubtable sensor networks R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-22, 2008 | 113 | 2008 |
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks RD Pietro, LV Mancini, A Mei Wireless Networks 12 (6), 709-721, 2006 | 111 | 2006 |
Secure dynamic fragment and replica allocation in large-scale distributed file systems A Mei, LV Mancini, S Jajodia IEEE Transactions on Parallel and Distributed systems 14 (9), 885-896, 2003 | 110 | 2003 |
Towards a formal model for security policies specification and validation in the selinux system G Zanin, LV Mancini Proceedings of the ninth ACM symposium on Access control models and …, 2004 | 105 | 2004 |