Scalable and efficient provable data possession G Ateniese, R Di Pietro, LV Mancini, G Tsudik Proceedings of the 4th international conference on Security and privacy in …, 2008 | 1780 | 2008 |
Smart health: a context-aware health paradigm within smart cities A Solanas, C Patsakis, M Conti, I Vlachos, V Ramos, F Falcone, ... Communications Magazine, IEEE 52 (8), 74-81, 2014 | 739 | 2014 |
Secure virtualization for cloud computing F Lombardi, R Di Pietro Journal of network and computer applications 34 (4), 1113-1122, 2011 | 598 | 2011 |
The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi Proceedings of the 26th international conference on world wide web companion …, 2017 | 555 | 2017 |
Fame for sale: Efficient detection of fake Twitter followers S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi Decision Support Systems 80, 56-71, 2015 | 542 | 2015 |
Random key-assignment for secure wireless sensor networks R Di Pietro, LV Mancini, A Mei Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 413 | 2003 |
To docker or not to docker: A security perspective T Combe, A Martin, R Di Pietro IEEE Cloud Computing 3 (5), 54-62, 2016 | 378 | 2016 |
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007 | 305 | 2007 |
Boosting efficiency and security in proof of ownership for deduplication R Di Pietro, A Sorniotti Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 296 | 2012 |
Distributed detection of clone attacks in wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Dependable and Secure Computing, IEEE Transactions on 8 (5), 685-698, 2011 | 245 | 2011 |
Metaverse: Security and Privacy Issues R Di Pietro, S Cresci IEEE International Conference on Trust, Privacy and Security in Intelligent …, 2022 | 227 | 2022 |
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks R Di Pietro, LV Mancini, YW Law, S Etall, P Havinga Parallel Processing Workshops, 2003. Proceedings. 2003 International …, 2003 | 223 | 2003 |
DNA-inspired online behavioral modeling and its application to spambot detection S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi IEEE Intelligent Systems 31 (5), 58-64, 2016 | 220 | 2016 |
Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi IEEE Transactions on Dependable and Secure Computing 15 (4), 561-576, 2017 | 219 | 2017 |
Edge computing perspectives: Architectures, technologies, and open security issues M Caprolu, R Di Pietro, F Lombardi, S Raponi 2019 IEEE International Conference on Edge Computing (EDGE), 116-123, 2019 | 205 | 2019 |
Intrusion detection systems R Di Pietro, LV Mancini Springer Science & Business Media, 2008 | 205 | 2008 |
Security in wireless ad-hoc networks–a survey R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer Computer Communications 51, 1-20, 2014 | 202 | 2014 |
Docker ecosystem–vulnerability analysis A Martin, S Raponi, T Combe, R Di Pietro Computer Communications 122, 30-43, 2018 | 194 | 2018 |
A survey on computational propaganda detection GDS Martino, S Cresci, A Barrón-Cedeño, S Yu, R Di Pietro, P Nakov arXiv preprint arXiv:2007.08024, 2020 | 176 | 2020 |
Catch me (if you can): Data survival in unattended sensor networks R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE …, 2008 | 157 | 2008 |