Mauro Conti
Mauro Conti Befattning: Gästprofessor Organisation: Institutionen för naturvetenskap och teknikE-post: bWF1cm8uY29udGk7b3J1LnNl
Telefon: Telefonnummer saknas
Rum: T2243
Forskargrupper
Publikationer
Artiklar i tidskrifter |
Konferensbidrag |
Artiklar i tidskrifter
- Luo, H. , Li, G. , Brighente, A. , Conti, M. , Xing, Y. , Hu, A. & Wang, X. (2025). Channel-Robust RF Fingerprint Identification for Multi-Antenna 5G User Equipments. IEEE Transactions on Information Forensics and Security, 20, 10761-10776. [BibTeX]
- Kumar, G. , Saha, R. , Conti, M. & Kim, T. (2025). DAWS: A Comprehensive Solution Against De-Anonymization Attacks in Blockchains. IEEE Transactions on Network and Service Management, 22 (5), 4747-4761. [BibTeX]
- Venturini, M. , Freda, F. , Miotto, E. , Conti, M. & Giaretta, A. (2025). Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. IEEE Transactions on Dependable and Secure Computing, 22 (4), 3449-3464. [BibTeX]
- Li, M. , Ding, H. , Chen, Y. , Qiao, Y. , Zhang, Z. , Zhu, L. & Conti, M. (2025). Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing. IEEE Transactions on Information Forensics and Security, 20, 9477-9491. [BibTeX]
- Kumar, G. , Saha, R. , Conti, M. & Kim, T. H. (2025). ZAKON: A decentralized framework for digital forensic admissibility and justification. Information Processing & Management, 62 (6). [BibTeX]
- Tavella, F. , Giaretta, A. , Conti, M. & Balasubramaniam, S. (2022). A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Computer Communications, 187, 59-70. [BibTeX]
- Pirayesh, J. , Giaretta, A. , Conti, M. & Keshavarzi, P. (2022). A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216. [BibTeX]
- Tavella, F. , Giaretta, A. , Dooley-Cullinane, T. M. , Conti, M. , Coffey, L. & Balasubramaniam, S. (2021). DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Transactions on Emerging Topics in Computing, 9 (3), 1566-1580. [BibTeX]
- Conti, M. , Dragoni, N. & Lesyk, V. (2016). A Survey of Man In The Middle Attacks. IEEE Communications Surveys and Tutorials, 18 (3), 2027-2051. [BibTeX]
- Giaretta, A. , Balasubramaniam, S. & Conti, M. (2016). Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Transactions on Information Forensics and Security, 11 (4), 665-676. [BibTeX]
Konferensbidrag
- Devgun, T. , Kumar, G. , Saha, R. , Brighente, A. & Conti, M. (2025). AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. I: ASIA CCS '25 Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. Konferensbidrag vid 20th Asia Conference on Computer and Communications Security (ASIA CCS '25), Hanoi, Vietnam, August 25-29, 2025. (ss. 955-970). Association for Computing Machinery (ACM). [BibTeX]
- Zhu, Y. , Chen, Z. , Yan, Q. , Wang, S. , Giaretta, A. , Li, E. , Peng, L. , Zhao, C. & et al. (2023). Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. I: Michele Zorzi; Meixia Tao; Walid Saad, ICC 2023 - IEEE International Conference on Communications. Konferensbidrag vid IEEE International Conference on Communications (ICC 2023), Rome, Italy, May 28 - June 1, 2023. (ss. 2338-2344). IEEE. [BibTeX]