Nome |
# |
null, file e0d6c927-1a7a-fcf8-e053-d805fe0aa794
|
644
|
Mobile underwater sensor networks for protection and security: field experience at the UAN11 experiment, file e0d6c92d-0479-fcf8-e053-d805fe0aa794
|
348
|
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention, file e0d6c930-a9c7-fcf8-e053-d805fe0aa794
|
305
|
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c92e-3465-fcf8-e053-d805fe0aa794
|
284
|
Verifying data secure flow in AUTOSAR models, file e0d6c930-7d1d-fcf8-e053-d805fe0aa794
|
231
|
Drone Path Planning for Secure Positioning and Secure Position Verification, file e0d6c930-ab2b-fcf8-e053-d805fe0aa794
|
170
|
Key propagation in wireless sensor networks, file e0d6c92c-1dca-fcf8-e053-d805fe0aa794
|
167
|
null, file e0d6c92c-1f3b-fcf8-e053-d805fe0aa794
|
161
|
SAPIENT: enabling real-time monitoring and control in the Future Communication Infrastructure of Air Traffic Management, file e0d6c92e-dde6-fcf8-e053-d805fe0aa794
|
156
|
null, file e0d6c92c-3d22-fcf8-e053-d805fe0aa794
|
154
|
JAMMY: a Distributed and Dynamic Solution against Selective Jamming Attack in TDMA WSNs, file e0d6c926-fe0e-fcf8-e053-d805fe0aa794
|
137
|
Verifying Data Secure Flow in AUTOSAR Models by Static Analysis, file e0d6c92a-5193-fcf8-e053-d805fe0aa794
|
126
|
null, file e0d6c92c-1de0-fcf8-e053-d805fe0aa794
|
126
|
Risk analysis of Android applications: A user-centric solution, file e0d6c930-c71d-fcf8-e053-d805fe0aa794
|
110
|
A lightweight and scalable attribute-based encryption system for smart cities, file e0d6c930-a67c-fcf8-e053-d805fe0aa794
|
106
|
SESAR EXPLORATORY RESEARCH SAPIENT PROJECT OVERVIEW, file e0d6c929-e0b0-fcf8-e053-d805fe0aa794
|
90
|
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-a769-fcf8-e053-d805fe0aa794
|
70
|
Distributed storage protection in wireless sensor networks, file e0d6c930-ac4a-fcf8-e053-d805fe0aa794
|
57
|
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-962a-fcf8-e053-d805fe0aa794
|
49
|
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification, file e0d6c930-9690-fcf8-e053-d805fe0aa794
|
49
|
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15.4e TSCH networks, file e0d6c930-9fe2-fcf8-e053-d805fe0aa794
|
47
|
BRUSCHETTA: An IoT blockchain-based framework for certifying extra virgin olive oil supply chain, file e0d6c930-a38d-fcf8-e053-d805fe0aa794
|
32
|
Localization with guaranteed bound on the position error using a drone, file e0d6c930-9205-fcf8-e053-d805fe0aa794
|
31
|
On Evaluating the Performance Impact of the IEEE 802.15.4 Security Sub-layer, file e0d6c92a-2469-fcf8-e053-d805fe0aa794
|
28
|
Protected pointers in wireless sensor networks, file e0d6c930-a44e-fcf8-e053-d805fe0aa794
|
23
|
On Designing Resilient Location-Privacy Obfuscators, file e0d6c930-acc6-fcf8-e053-d805fe0aa794
|
23
|
A uniformity-based approach to location privacy, file e0d6c930-7d32-fcf8-e053-d805fe0aa794
|
21
|
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols, file e0d6c930-b815-fcf8-e053-d805fe0aa794
|
21
|
An implementation and evaluation of the security features of RPL, file e0d6c931-0a80-fcf8-e053-d805fe0aa794
|
21
|
HUMsim: A Privacy-Oriented Human Mobility Simulator, file e0d6c930-2f40-fcf8-e053-d805fe0aa794
|
20
|
Indirect Revocable KP-ABE with Revocation Undoing Resistance, file e0d6c931-142a-fcf8-e053-d805fe0aa794
|
18
|
Password systems: design and implementation, file e0d6c930-ac47-fcf8-e053-d805fe0aa794
|
17
|
Virtual private ledgers: Embedding private distributed ledgers over a public blockchain by cryptography, file e0d6c930-64ea-fcf8-e053-d805fe0aa794
|
12
|
Assessing the Cost of Quantum Security for Automotive Over-the-Air Updates, file e0d6c931-7b0d-fcf8-e053-d805fe0aa794
|
12
|
On Improving SimBlock Blockchain Simulator, file e0d6c931-9da4-fcf8-e053-d805fe0aa794
|
12
|
On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding, file e0d6c930-8916-fcf8-e053-d805fe0aa794
|
11
|
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-c01a-fcf8-e053-d805fe0aa794
|
9
|
JAMMY: a Distributed and Dynamic Solution against Selective Jamming Attack in TDMA WSNs, file e0d6c930-c942-fcf8-e053-d805fe0aa794
|
9
|
Secure positioning in wireless sensor networks through enlargement miscontrol detection, file e0d6c930-ac7e-fcf8-e053-d805fe0aa794
|
8
|
null, file e0d6c926-407f-fcf8-e053-d805fe0aa794
|
7
|
Sensing the cities with social-aware unmanned aerial vehicles, file e0d6c92b-f132-fcf8-e053-d805fe0aa794
|
7
|
ABE-Cities: An attribute-based encryption system for smart cities, file e0d6c930-abad-fcf8-e053-d805fe0aa794
|
7
|
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols, file e0d6c930-6684-fcf8-e053-d805fe0aa794
|
6
|
An implementation and evaluation of the security features of RPL, file e0d6c930-6adf-fcf8-e053-d805fe0aa794
|
6
|
null, file e0d6c930-6ebd-fcf8-e053-d805fe0aa794
|
6
|
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15.4e TSCH networks, file e0d6c930-938b-fcf8-e053-d805fe0aa794
|
6
|
A low-cost UAV-based secure location verification method, file e0d6c930-95d2-fcf8-e053-d805fe0aa794
|
6
|
FABElous: An attribute-based scheme for industrial internet of things, file e0d6c930-9ef5-fcf8-e053-d805fe0aa794
|
6
|
Secure positioning in wireless sensor networks through enlargement miscontrol detection, file e0d6c930-bfd4-fcf8-e053-d805fe0aa794
|
6
|
Graphical Design of Distributed Applications through Reusable Components, file e0d6c926-17d7-fcf8-e053-d805fe0aa794
|
5
|
Distributed motion misbehavior detection in teams of heterogeneous aerial robots, file e0d6c930-c812-fcf8-e053-d805fe0aa794
|
5
|
null, file e0d6c926-3daf-fcf8-e053-d805fe0aa794
|
4
|
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware, file e0d6c92f-818e-fcf8-e053-d805fe0aa794
|
4
|
Secure positioning with non-ideal distance bounding protocols, file e0d6c930-95dc-fcf8-e053-d805fe0aa794
|
4
|
Group rekeying based on member join history, file e0d6c930-9de5-fcf8-e053-d805fe0aa794
|
4
|
null, file e0d6c926-1b53-fcf8-e053-d805fe0aa794
|
3
|
null, file e0d6c926-39e7-fcf8-e053-d805fe0aa794
|
3
|
null, file e0d6c926-4a5e-fcf8-e053-d805fe0aa794
|
3
|
On Designing Resilient Location-Privacy Obfuscators, file e0d6c927-4d26-fcf8-e053-d805fe0aa794
|
3
|
A uniformity-based approach to location privacy, file e0d6c930-7acf-fcf8-e053-d805fe0aa794
|
3
|
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks, file e0d6c930-9ef0-fcf8-e053-d805fe0aa794
|
3
|
Verifying data secure flow in AUTOSAR models, file e0d6c930-a4e5-fcf8-e053-d805fe0aa794
|
3
|
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention, file e0d6c930-bb01-fcf8-e053-d805fe0aa794
|
3
|
Drone Path Planning for Secure Positioning and Secure Position Verification, file e0d6c930-be20-fcf8-e053-d805fe0aa794
|
3
|
Performance evaluation of attribute-based encryption in automotive embedded platform for secure software over-the-air update, file 02ef6f37-0a6a-4cd2-8fae-97fcde04dd6e
|
2
|
The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification, file e0d6c927-51d3-fcf8-e053-d805fe0aa794
|
2
|
Using AUTOSAR high-level specifications for the synthesis of security components in automotive systems, file e0d6c92c-7239-fcf8-e053-d805fe0aa794
|
2
|
Secure positioning with non-ideal distance bounding protocols, file e0d6c92f-dde6-fcf8-e053-d805fe0aa794
|
2
|
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c92f-fa48-fcf8-e053-d805fe0aa794
|
2
|
Localization with guaranteed bound on the position error using a drone, file e0d6c930-9407-fcf8-e053-d805fe0aa794
|
2
|
ABE-Cities: An attribute-based encryption system for smart cities, file e0d6c930-b589-fcf8-e053-d805fe0aa794
|
2
|
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c930-bb63-fcf8-e053-d805fe0aa794
|
2
|
Risk analysis of Android applications: A user-centric solution, file e0d6c930-c93f-fcf8-e053-d805fe0aa794
|
2
|
Key propagation in wireless sensor networks, file e0d6c930-c940-fcf8-e053-d805fe0aa794
|
2
|
A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks, file e0d6c931-71e3-fcf8-e053-d805fe0aa794
|
2
|
Exploring circular shipbuilding: A systematic review on circular economy business models and supporting technologies, file 16f300ad-7ed5-49c1-a7b9-f2f1e33f8ac8
|
1
|
Le implicazioni organizzative di una strategia di cybersecurity, file 67ed7756-f9df-4e30-86e9-516e992727e4
|
1
|
Smart-working e BYOD: quali rischi? Il ruolo di cyber-awareness e cyber organizational culture, file 6dcedf15-940c-44b3-a8be-0b07d7ead1fc
|
1
|
An overview of Ulisse, a distributed single address space system, file e0d6c926-1f9a-fcf8-e053-d805fe0aa794
|
1
|
A Solution to the GTS-Based Selective Jamming Attack on IEEE 802.15.4 Networks, file e0d6c926-416b-fcf8-e053-d805fe0aa794
|
1
|
Analysis of security attacks in wireless sensor networks: From UPPAAL to Castalia, file e0d6c92f-76e0-fcf8-e053-d805fe0aa794
|
1
|
FABElous: An attribute-based scheme for industrial internet of things, file e0d6c930-74f6-fcf8-e053-d805fe0aa794
|
1
|
A lightweight and scalable attribute-based encryption system for smart cities, file e0d6c930-a67b-fcf8-e053-d805fe0aa794
|
1
|
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c930-a684-fcf8-e053-d805fe0aa794
|
1
|
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-a97f-fcf8-e053-d805fe0aa794
|
1
|
Distributed motion misbehavior detection in teams of heterogeneous aerial robots, file e0d6c930-c811-fcf8-e053-d805fe0aa794
|
1
|
SAPIENT: enabling real-time monitoring and control in the Future Communication Infrastructure of Air Traffic Management, file e0d6c931-6a55-fcf8-e053-d805fe0aa794
|
1
|
A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things, file e0d6c932-1fa8-fcf8-e053-d805fe0aa794
|
1
|
A Rational Mining Strategy for Proof-of-Work Consensus Algorithms, file e78b43e0-6d51-4164-a80e-19f16dea1b98
|
1
|
Totale |
4.067 |