Scalable and efficient provable data possession G Ateniese, R Di Pietro, LV Mancini, G Tsudik Proceedings of the 4th international conference on Security and privacy in …, 2008 | 1644 | 2008 |
Smart health: a context-aware health paradigm within smart cities A Solanas, C Patsakis, M Conti, I Vlachos, V Ramos, F Falcone, ... Communications Magazine, IEEE 52 (8), 74-81, 2014 | 663 | 2014 |
Secure virtualization for cloud computing F Lombardi, R Di Pietro Journal of network and computer applications 34 (4), 1113-1122, 2011 | 561 | 2011 |
Random key-assignment for secure wireless sensor networks R Di Pietro, LV Mancini, A Mei Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 408 | 2003 |
Fame for sale: Efficient detection of fake Twitter followers S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi Decision Support Systems 80, 56-71, 2015 | 400 | 2015 |
The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi Proceedings of the 26th international conference on world wide web companion …, 2017 | 399 | 2017 |
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007 | 301 | 2007 |
Boosting efficiency and security in proof of ownership for deduplication R Di Pietro, A Sorniotti Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 278 | 2012 |
To docker or not to docker: A security perspective T Combe, A Martin, R Di Pietro IEEE Cloud Computing 3 (5), 54-62, 2016 | 275 | 2016 |
Distributed detection of clone attacks in wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Dependable and Secure Computing, IEEE Transactions on 8 (5), 685-698, 2011 | 235 | 2011 |
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks R Di Pietro, LV Mancini, YW Law, S Etall, P Havinga Parallel Processing Workshops, 2003. Proceedings. 2003 International …, 2003 | 212 | 2003 |
Intrusion detection systems R Di Pietro, LV Mancini Springer Science & Business Media, 2008 | 190 | 2008 |
Security in wireless ad-hoc networks–a survey R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer Computer Communications 51, 1-20, 2014 | 188 | 2014 |
Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi IEEE Transactions on Dependable and Secure Computing 15 (4), 561-576, 2017 | 172 | 2017 |
DNA-inspired online behavioral modeling and its application to spambot detection S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi IEEE Intelligent Systems 31 (5), 58-64, 2016 | 154 | 2016 |
Catch me (if you can): Data survival in unattended sensor networks R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE …, 2008 | 154 | 2008 |
Edge computing perspectives: architectures, technologies, and open security issues M Caprolu, R Di Pietro, F Lombardi, S Raponi 2019 IEEE International Conference on Edge Computing (EDGE), 116-123, 2019 | 148 | 2019 |
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Proceedings of the first ACM conference on Wireless network security, 214-219, 2008 | 142 | 2008 |
Docker ecosystem–vulnerability analysis A Martin, S Raponi, T Combe, R Di Pietro Computer Communications 122, 30-43, 2018 | 140 | 2018 |
Redoubtable sensor networks R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-22, 2008 | 113 | 2008 |