BibTeX records: Mauro Conti

download as .bib file

@article{DBLP:journals/adhoc/BujariCFP19,
  author    = {Armir Bujari and
               Mauro Conti and
               Carla De Francesco and
               Claudio E. Palazzi},
  title     = {Fast multi-hop broadcast of alert messages in VANETs: An analytical
               model},
  journal   = {Ad Hoc Networks},
  volume    = {82},
  pages     = {126--133},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.adhoc.2018.07.024},
  doi       = {10.1016/j.adhoc.2018.07.024},
  timestamp = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/adhoc/BujariCFP19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/DeokateLTC19,
  author    = {Balu Deokate and
               Chhagan Lal and
               Denis Trcek and
               Mauro Conti},
  title     = {Mobility-aware cross-layer routing for peer-to-peer networks},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {73},
  pages     = {209--226},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.compeleceng.2018.11.014},
  doi       = {10.1016/j.compeleceng.2018.11.014},
  timestamp = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cee/DeokateLTC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HalderGC19,
  author    = {Subir Halder and
               Amrita Ghosal and
               Mauro Conti},
  title     = {Efficient physical intrusion detection in Internet of Things: {A}
               Node deployment approach},
  journal   = {Computer Networks},
  volume    = {154},
  pages     = {28--46},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.comnet.2019.02.019},
  doi       = {10.1016/j.comnet.2019.02.019},
  timestamp = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/HalderGC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ContiKL19,
  author    = {Mauro Conti and
               Pallavi Kaliyar and
               Chhagan Lal},
  title     = {{CENSOR:} Cloud-enabled secure IoT architecture over {SDN} paradigm},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {31},
  number    = {8},
  year      = {2019},
  url       = {https://doi.org/10.1002/cpe.4978},
  doi       = {10.1002/cpe.4978},
  timestamp = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/ContiKL19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/TajikiSASC19,
  author    = {Mohammad Mahdi Tajiki and
               Mohammad Shojafar and
               Behzad Akbari and
               Stefano Salsano and
               Mauro Conti},
  title     = {Software defined service function chaining with failure consideration
               for fog computing},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {31},
  number    = {8},
  year      = {2019},
  url       = {https://doi.org/10.1002/cpe.4953},
  doi       = {10.1002/cpe.4953},
  timestamp = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/TajikiSASC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DingCF19,
  author    = {Ding Ding and
               Mauro Conti and
               Renato Figueiredo},
  title     = {{SAND:} Social-aware, network-failure resilient, and decentralized
               microblogging system},
  journal   = {Future Generation Comp. Syst.},
  volume    = {93},
  pages     = {637--650},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.future.2018.11.007},
  doi       = {10.1016/j.future.2018.11.007},
  timestamp = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/DingCF19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/PZC19,
  author    = {Vinod P and
               Akka Zemmari and
               Mauro Conti},
  title     = {A machine learning based approach to detect malicious android apps
               using discriminant system calls},
  journal   = {Future Generation Comp. Syst.},
  volume    = {94},
  pages     = {333--350},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.future.2018.11.021},
  doi       = {10.1016/j.future.2018.11.021},
  timestamp = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/PZC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BuriroCC19,
  author    = {Attaullah Buriro and
               Bruno Crispo and
               Mauro Conti},
  title     = {AnswerAuth: {A} bimodal behavioral biometric-based user authentication
               scheme for smartphones},
  journal   = {J. Inf. Sec. Appl.},
  volume    = {44},
  pages     = {89--103},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.jisa.2018.11.008},
  doi       = {10.1016/j.jisa.2018.11.008},
  timestamp = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/istr/BuriroCC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/MehtaRGC19,
  author    = {Brijesh B. Mehta and
               Udai Pratap Rao and
               Ruchika Gupta and
               Mauro Conti},
  title     = {Towards privacy preserving unstructured big data publishing},
  journal   = {Journal of Intelligent and Fuzzy Systems},
  volume    = {36},
  number    = {4},
  pages     = {3471--3482},
  year      = {2019},
  url       = {https://doi.org/10.3233/JIFS-181231},
  doi       = {10.3233/JIFS-181231},
  timestamp = {Wed, 17 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jifs/MehtaRGC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AcsCGGTW19,
  author    = {Gergely {\'{A}}cs and
               Mauro Conti and
               Paolo Gasti and
               Cesar Ghali and
               Gene Tsudik and
               Christopher A. Wood},
  title     = {Privacy-Aware Caching in Information-Centric Networking},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {16},
  number    = {2},
  pages     = {313--328},
  year      = {2019},
  url       = {https://doi.org/10.1109/TDSC.2017.2679711},
  doi       = {10.1109/TDSC.2017.2679711},
  timestamp = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/AcsCGGTW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccps/YingBCP19,
  author    = {Xuhang Ying and
               Giuseppe Bernieri and
               Mauro Conti and
               Radha Poovendran},
  title     = {{TACAN:} transmitter authentication through covert channels in controller
               area networks},
  booktitle = {Proceedings of the 10th {ACM/IEEE} International Conference on Cyber-Physical
               Systems, {ICCPS} 2019, Montreal, QC, Canada, April 16-18, 2019},
  pages     = {23--34},
  year      = {2019},
  crossref  = {DBLP:conf/iccps/2019},
  url       = {https://doi.org/10.1145/3302509.3313783},
  doi       = {10.1145/3302509.3313783},
  timestamp = {Sun, 07 Apr 2019 16:25:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccps/YingBCP19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lnsn/KusenSC19,
  author    = {Ema Kusen and
               Mark Strembeck and
               Mauro Conti},
  title     = {Emotional Valence Shifts and User Behavior on Twitter, Facebook, and
               YouTube},
  booktitle = {Influence and Behavior Analysis in Social Networks and Social Media},
  pages     = {63--83},
  year      = {2019},
  crossref  = {DBLP:series/lnsn/2019ka},
  url       = {https://doi.org/10.1007/978-3-030-02592-2\_4},
  doi       = {10.1007/978-3-030-02592-2\_4},
  timestamp = {Mon, 17 Dec 2018 10:37:32 +0100},
  biburl    = {https://dblp.org/rec/bib/series/lnsn/KusenSC19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-10019,
  author    = {Mauro Conti and
               Ankit Gangwal and
               Michele Todero},
  title     = {Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages},
  journal   = {CoRR},
  volume    = {abs/1901.10019},
  year      = {2019},
  url       = {http://arxiv.org/abs/1901.10019},
  archivePrefix = {arXiv},
  eprint    = {1901.10019},
  timestamp = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1901-10019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-05231,
  author    = {Xuhang Ying and
               Giuseppe Bernieri and
               Mauro Conti and
               Radha Poovendran},
  title     = {{TACAN:} Transmitter Authentication through Covert Channels in Controller
               Area Networks},
  journal   = {CoRR},
  volume    = {abs/1903.05231},
  year      = {2019},
  url       = {http://arxiv.org/abs/1903.05231},
  archivePrefix = {arXiv},
  eprint    = {1903.05231},
  timestamp = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1903-05231},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-07446,
  author    = {Mauro Conti and
               Ankit Gangwal and
               Muhammad Hassan and
               Chhagan Lal and
               Eleonora Losiouk},
  title     = {The Road Ahead for Networking: {A} Survey on {ICN-IP} Coexistence
               Solutions},
  journal   = {CoRR},
  volume    = {abs/1903.07446},
  year      = {2019},
  url       = {http://arxiv.org/abs/1903.07446},
  archivePrefix = {arXiv},
  eprint    = {1903.07446},
  timestamp = {Mon, 01 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1903-07446},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-00188,
  author    = {Kiran S. Balagani and
               Matteo Cardaioli and
               Mauro Conti and
               Paolo Gasti and
               Martin Georgiev and
               Tristan Gurtler and
               Daniele Lain and
               Charissa Miller and
               Kendall Molas and
               Nikita Samarin and
               Eugen Saraci and
               Gene Tsudik and
               Lynn Wu},
  title     = {{PILOT:} Password and {PIN} Information Leakage from Obfuscated Typing
               Videos},
  journal   = {CoRR},
  volume    = {abs/1904.00188},
  year      = {2019},
  url       = {http://arxiv.org/abs/1904.00188},
  archivePrefix = {arXiv},
  eprint    = {1904.00188},
  timestamp = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1904-00188},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-00685,
  author    = {Subir Halder and
               Amrita Ghosal and
               Mauro Conti},
  title     = {Secure {OTA} Software Updates in Connected Vehicles: {A} survey},
  journal   = {CoRR},
  volume    = {abs/1904.00685},
  year      = {2019},
  url       = {http://arxiv.org/abs/1904.00685},
  archivePrefix = {arXiv},
  eprint    = {1904.00685},
  timestamp = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1904-00685},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-04542,
  author    = {Mauro Conti and
               Pallavi Kaliyar and
               Chhagan Lal},
  title     = {Reliable Group Communication Protocol for Internet of Things},
  journal   = {CoRR},
  volume    = {abs/1904.04542},
  year      = {2019},
  url       = {http://arxiv.org/abs/1904.04542},
  archivePrefix = {arXiv},
  eprint    = {1904.04542},
  timestamp = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1904-04542},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-04577,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Chhagan Lal},
  title     = {A Survey on Software-Defined VANETs: Benefits, Challenges, and Future
               Directions},
  journal   = {CoRR},
  volume    = {abs/1904.04577},
  year      = {2019},
  url       = {http://arxiv.org/abs/1904.04577},
  archivePrefix = {arXiv},
  eprint    = {1904.04577},
  timestamp = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1904-04577},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhaoZZJCC18,
  author    = {Chuan Zhao and
               Shengnan Zhao and
               Bo Zhang and
               Zhongtian Jia and
               Zhenxiang Chen and
               Mauro Conti},
  title     = {Secure Comparison Under Ideal/Real Simulation Paradigm},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {31236--31248},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2837665},
  doi       = {10.1109/ACCESS.2018.2837665},
  timestamp = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/access/ZhaoZZJCC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AksuBCTU18,
  author    = {Hidayet Aksu and
               Leonardo Babun and
               Mauro Conti and
               Gabriele Tolomei and
               A. Selcuk Uluagac},
  title     = {Advertising in the IoT Era: Vision and Challenges},
  journal   = {{IEEE} Communications Magazine},
  volume    = {56},
  number    = {11},
  pages     = {138--144},
  year      = {2018},
  url       = {https://doi.org/10.1109/MCOM.2017.1700871},
  doi       = {10.1109/MCOM.2017.1700871},
  timestamp = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cm/AksuBCTU18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/JaballahCFMZ18,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Gilberto Fil{\`{e}} and
               Mohamed Mosbah and
               Akka Zemmari},
  title     = {Whac-A-Mole: Smart node positioning in clone attack in wireless sensor
               networks},
  journal   = {Computer Communications},
  volume    = {119},
  pages     = {66--82},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.comcom.2018.01.010},
  doi       = {10.1016/j.comcom.2018.01.010},
  timestamp = {Mon, 26 Mar 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/JaballahCFMZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ContiDHL18,
  author    = {Mauro Conti and
               Ralph E. Droms and
               Muhammad Hassan and
               Chhagan Lal},
  title     = {Fair-RTT-DAS: {A} robust and efficient dynamic adaptive streaming
               over {ICN}},
  journal   = {Computer Communications},
  volume    = {129},
  pages     = {209--225},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.comcom.2018.07.033},
  doi       = {10.1016/j.comcom.2018.07.033},
  timestamp = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/ContiDHL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ContiGR18,
  author    = {Mauro Conti and
               Ankit Gangwal and
               Sushmita Ruj},
  title     = {On the economic significance of ransomware campaigns: {A} Bitcoin
               transactions perspective},
  journal   = {Computers {\&} Security},
  volume    = {79},
  pages     = {162--189},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.08.008},
  doi       = {10.1016/j.cose.2018.08.008},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/ContiGR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/AmbrosinCCGT18,
  author    = {Moreno Ambrosin and
               Alberto Compagno and
               Mauro Conti and
               Cesar Ghali and
               Gene Tsudik},
  title     = {Security and Privacy Analysis of National Science Foundation Future
               Internet Architectures},
  journal   = {{IEEE} Communications Surveys and Tutorials},
  volume    = {20},
  number    = {2},
  pages     = {1418--1442},
  year      = {2018},
  url       = {https://doi.org/10.1109/COMST.2018.2798280},
  doi       = {10.1109/COMST.2018.2798280},
  timestamp = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comsur/AmbrosinCCGT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ContiLMS18,
  author    = {Mauro Conti and
               QianQian Li and
               Alberto Maragno and
               Riccardo Spolaor},
  title     = {The Dark Side(-Channel) of Mobile Devices: {A} Survey on Network Traffic
               Analysis},
  journal   = {{IEEE} Communications Surveys and Tutorials},
  volume    = {20},
  number    = {4},
  pages     = {2658--2713},
  year      = {2018},
  url       = {https://doi.org/10.1109/COMST.2018.2843533},
  doi       = {10.1109/COMST.2018.2843533},
  timestamp = {Wed, 26 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comsur/ContiLMS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ContiELR18,
  author    = {Mauro Conti and
               Sandeep Kumar E and
               Chhagan Lal and
               Sushmita Ruj},
  title     = {A Survey on Security and Privacy Issues of Bitcoin},
  journal   = {{IEEE} Communications Surveys and Tutorials},
  volume    = {20},
  number    = {4},
  pages     = {3416--3452},
  year      = {2018},
  url       = {https://doi.org/10.1109/COMST.2018.2842460},
  doi       = {10.1109/COMST.2018.2842460},
  timestamp = {Wed, 26 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comsur/ContiELR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AcarAUC18,
  author    = {Abbas Acar and
               Hidayet Aksu and
               A. Selcuk Uluagac and
               Mauro Conti},
  title     = {A Survey on Homomorphic Encryption Schemes: Theory and Implementation},
  journal   = {{ACM} Comput. Surv.},
  volume    = {51},
  number    = {4},
  pages     = {79:1--79:35},
  year      = {2018},
  url       = {https://doi.org/10.1145/3214303},
  doi       = {10.1145/3214303},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/csur/AcarAUC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ContiDFW18,
  author    = {Mauro Conti and
               Ali Dehghantanha and
               Katrin Franke and
               Steve Watson},
  title     = {Internet of Things security and forensics: Challenges and opportunities},
  journal   = {Future Generation Comp. Syst.},
  volume    = {78},
  pages     = {544--546},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.future.2017.07.060},
  doi       = {10.1016/j.future.2017.07.060},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/ContiDFW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AliPKKC18,
  author    = {Rifaqat Ali and
               Arup Kumar Pal and
               Saru Kumari and
               Marimuthu Karuppiah and
               Mauro Conti},
  title     = {A secure user authentication and key-agreement scheme using wireless
               sensor networks for agriculture monitoring},
  journal   = {Future Generation Comp. Syst.},
  volume    = {84},
  pages     = {200--215},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.future.2017.06.018},
  doi       = {10.1016/j.future.2017.06.018},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/AliPKKC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/NazhadSSC18,
  author    = {Seyed Hossein Hosseini Nazhad and
               Mohammad Shojafar and
               Shahaboddin Shamshirband and
               Mauro Conti},
  title     = {An efficient routing protocol for the QoS support of large-scale MANETs},
  journal   = {Int. J. Communication Systems},
  volume    = {31},
  number    = {1},
  year      = {2018},
  url       = {https://doi.org/10.1002/dac.3384},
  doi       = {10.1002/dac.3384},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijcomsys/NazhadSSC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WazidDOKCJ18,
  author    = {Mohammad Wazid and
               Ashok Kumar Das and
               Vanga Odelu and
               Neeraj Kumar and
               Mauro Conti and
               Minho Jo},
  title     = {Design of Secure User Authenticated Key Management Protocol for Generic
               IoT Networks},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {5},
  number    = {1},
  pages     = {269--282},
  year      = {2018},
  url       = {https://doi.org/10.1109/JIOT.2017.2780232},
  doi       = {10.1109/JIOT.2017.2780232},
  timestamp = {Thu, 15 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iotj/WazidDOKCJ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/AzmoodehDCC18,
  author    = {Amin Azmoodeh and
               Ali Dehghantanha and
               Mauro Conti and
               Kim{-}Kwang Raymond Choo},
  title     = {Detecting crypto-ransomware in IoT networks based on energy consumption
               footprint},
  journal   = {J. Ambient Intelligence and Humanized Computing},
  volume    = {9},
  number    = {4},
  pages     = {1141--1152},
  year      = {2018},
  url       = {https://doi.org/10.1007/s12652-017-0558-5},
  doi       = {10.1007/s12652-017-0558-5},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jaihc/AzmoodehDCC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/osnm/CascavillaBBCM18,
  author    = {Giuseppe Cascavilla and
               Filipe Beato and
               Andrea Burattin and
               Mauro Conti and
               Luigi Vincenzo Mancini},
  title     = {{OSSINT} - Open Source Social Network Intelligence: An efficient and
               effective way to uncover "private" information in {OSN}
               profiles},
  journal   = {Online Social Networks and Media},
  volume    = {6},
  pages     = {58--68},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.osnem.2018.04.003},
  doi       = {10.1016/j.osnem.2018.04.003},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/osnm/CascavillaBBCM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SomaniGSCR18,
  author    = {Gaurav Somani and
               Manoj Singh Gaur and
               Dheeraj Sanghi and
               Mauro Conti and
               Muttukrishnan Rajarajan},
  title     = {Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {15},
  number    = {6},
  pages     = {959--973},
  year      = {2018},
  url       = {https://doi.org/10.1109/TDSC.2017.2763160},
  doi       = {10.1109/TDSC.2017.2763160},
  timestamp = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/SomaniGSCR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TaylorSCM18,
  author    = {Vincent F. Taylor and
               Riccardo Spolaor and
               Mauro Conti and
               Ivan Martinovic},
  title     = {Robust Smartphone App Identification via Encrypted Network Traffic
               Analysis},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {13},
  number    = {1},
  pages     = {63--78},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIFS.2017.2737970},
  doi       = {10.1109/TIFS.2017.2737970},
  timestamp = {Thu, 14 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/TaylorSCM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYCYZC18,
  author    = {Shanshan Wang and
               Qiben Yan and
               Zhenxiang Chen and
               Bo Yang and
               Chuan Zhao and
               Mauro Conti},
  title     = {Detecting Android Malware Leveraging Text Semantics of Network Flows},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {13},
  number    = {5},
  pages     = {1096--1109},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIFS.2017.2771228},
  doi       = {10.1109/TIFS.2017.2771228},
  timestamp = {Tue, 13 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/WangYCYZC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeeYDC018,
  author    = {Po{-}Yen Lee and
               Chia{-}Mu Yu and
               Tooska Dargahi and
               Mauro Conti and
               Giuseppe Bianchi},
  title     = {MDSClone: Multidimensional Scaling Aided Clone Detection in Internet
               of Things},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {13},
  number    = {8},
  pages     = {2031--2046},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIFS.2018.2805291},
  doi       = {10.1109/TIFS.2018.2805291},
  timestamp = {Sun, 06 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/LeeYDC018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/WazidDKCV18,
  author    = {Mohammad Wazid and
               Ashok Kumar Das and
               Neeraj Kumar and
               Mauro Conti and
               Athanasios V. Vasilakos},
  title     = {A Novel Authentication and Key Agreement Scheme for Implantable Medical
               Devices Deployment},
  journal   = {{IEEE} J. Biomedical and Health Informatics},
  volume    = {22},
  number    = {4},
  pages     = {1299--1309},
  year      = {2018},
  url       = {https://doi.org/10.1109/JBHI.2017.2721545},
  doi       = {10.1109/JBHI.2017.2721545},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/titb/WazidDKCV18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/SpolaorSC18,
  author    = {Riccardo Spolaor and
               Elia Dal Santo and
               Mauro Conti},
  title     = {{DELTA:} Data Extraction and Logging Tool for Android},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {17},
  number    = {6},
  pages     = {1289--1302},
  year      = {2018},
  url       = {https://doi.org/10.1109/TMC.2017.2762692},
  doi       = {10.1109/TMC.2017.2762692},
  timestamp = {Tue, 15 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tmc/SpolaorSC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/KumarTNCL18,
  author    = {Prashant Kumar and
               Meenakshi Tripathi and
               Ajay Nehra and
               Mauro Conti and
               Chhagan Lal},
  title     = {{SAFETY:} Early Detection and Mitigation of {TCP} {SYN} Flood Utilizing
               Entropy in {SDN}},
  journal   = {{IEEE} Trans. Network and Service Management},
  volume    = {15},
  number    = {4},
  pages     = {1545--1559},
  year      = {2018},
  url       = {https://doi.org/10.1109/TNSM.2018.2861741},
  doi       = {10.1109/TNSM.2018.2861741},
  timestamp = {Wed, 26 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tnsm/KumarTNCL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/OdeluDWC18,
  author    = {Vanga Odelu and
               Ashok Kumar Das and
               Mohammad Wazid and
               Mauro Conti},
  title     = {Provably Secure Authenticated Key Agreement Scheme for Smart Grid},
  journal   = {{IEEE} Trans. Smart Grid},
  volume    = {9},
  number    = {3},
  pages     = {1900--1910},
  year      = {2018},
  url       = {https://doi.org/10.1109/TSG.2016.2602282},
  doi       = {10.1109/TSG.2016.2602282},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tsg/OdeluDWC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LalLGC18,
  author    = {Chhagan Lal and
               Vijay Laxmi and
               Manoj Singh Gaur and
               Mauro Conti},
  title     = {Enhancing QoE for video streaming in MANETs via multi-constraint routing},
  journal   = {Wireless Networks},
  volume    = {24},
  number    = {1},
  pages     = {235--256},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11276-016-1325-9},
  doi       = {10.1007/s11276-016-1325-9},
  timestamp = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/winet/LalLGC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ContiDM18,
  author    = {Mauro Conti and
               Edlira Dushku and
               Luigi V. Mancini},
  title     = {Distributed Services Attestation in IoT},
  booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
               on the Occasion of His 70th Birthday},
  pages     = {261--273},
  year      = {2018},
  crossref  = {DBLP:conf/birthday/2018jajodia},
  url       = {https://doi.org/10.1007/978-3-030-04834-1\_14},
  doi       = {10.1007/978-3-030-04834-1\_14},
  timestamp = {Sun, 02 Dec 2018 12:11:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/birthday/ContiDM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/JaballahCP18,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Claudio E. Palazzi},
  title     = {The position cheating attack on inter-vehicular online gaming},
  booktitle = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference,
               {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018},
  pages     = {1--6},
  year      = {2018},
  crossref  = {DBLP:conf/ccnc/2018},
  url       = {https://doi.org/10.1109/CCNC.2018.8319160},
  doi       = {10.1109/CCNC.2018.8319160},
  timestamp = {Tue, 20 Mar 2018 14:22:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccnc/JaballahCP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrondahlPJCA18,
  author    = {Tommi Gr{\"{o}}ndahl and
               Luca Pajola and
               Mika Juuti and
               Mauro Conti and
               N. Asokan},
  title     = {All You Need is: Evading Hate Speech Detection},
  booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
               and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  pages     = {2--12},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018aisec},
  url       = {https://doi.org/10.1145/3270101.3270103},
  doi       = {10.1145/3270101.3270103},
  timestamp = {Wed, 09 Jan 2019 16:42:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GrondahlPJCA18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Conti18,
  author    = {Mauro Conti},
  title     = {Leaky {CPS:} Inferring Cyber Information from Physical Properties
               (and the other way around)},
  booktitle = {Proceedings of the 4th {ACM} Workshop on Cyber-Physical System Security,
               CPSS@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages     = {23--24},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018asiacpss},
  url       = {https://doi.org/10.1145/3198458.3198468},
  doi       = {10.1145/3198458.3198468},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Conti18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BelguithGCR18,
  author    = {Sana Belguith and
               Sarada Prasad Gochhayat and
               Mauro Conti and
               Giovanni Russello},
  title     = {Emergency Access Control Management Via Attribute Based Encrypted
               {QR} Codes},
  booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  pages     = {1--8},
  year      = {2018},
  crossref  = {DBLP:conf/cns/2018},
  url       = {https://doi.org/10.1109/CNS.2018.8433186},
  doi       = {10.1109/CNS.2018.8433186},
  timestamp = {Thu, 16 Aug 2018 12:45:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/BelguithGCR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ContiGGT18,
  author    = {Mauro Conti and
               Ankit Gangwal and
               Sarada Prasad Gochhayat and
               Gabriele Tolomei},
  title     = {Spot the Difference: Your Bucket is Leaking : {A} Novel Methodology
               to Expose {A/B} Testing Effortlessly},
  booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  pages     = {1--7},
  year      = {2018},
  crossref  = {DBLP:conf/cns/2018},
  url       = {https://doi.org/10.1109/CNS.2018.8433122},
  doi       = {10.1109/CNS.2018.8433122},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cns/ContiGGT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BalaganiCGGGLMM18,
  author    = {Kiran S. Balagani and
               Mauro Conti and
               Paolo Gasti and
               Martin Georgiev and
               Tristan Gurtler and
               Daniele Lain and
               Charissa Miller and
               Kendall Molas and
               Nikita Samarin and
               Eugen Saraci and
               Gene Tsudik and
               Lynn Wu},
  title     = {{SILK-TV:} Secret Information Leakage from Keystroke Timing Videos},
  booktitle = {Computer Security - 23rd European Symposium on Research in Computer
               Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
               Part {I}},
  pages     = {263--280},
  year      = {2018},
  crossref  = {DBLP:conf/esorics/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-99073-6\_13},
  doi       = {10.1007/978-3-319-99073-6\_13},
  timestamp = {Mon, 13 Aug 2018 14:33:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/BalaganiCGGGLMM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AmbrosinC0SS18,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Ahmad Ibrahim and
               Ahmad{-}Reza Sadeghi and
               Matthias Schunter},
  title     = {SCIoT: {A} Secure and sCalable End-to-End Management Framework for
               IoT Devices},
  booktitle = {Computer Security - 23rd European Symposium on Research in Computer
               Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
               Part {I}},
  pages     = {595--617},
  year      = {2018},
  crossref  = {DBLP:conf/esorics/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-99073-6\_29},
  doi       = {10.1007/978-3-319-99073-6\_29},
  timestamp = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/AmbrosinC0SS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/MalekiRC18,
  author    = {Neda Maleki and
               Amir Masoud Rahmani and
               Mauro Conti},
  title     = {{POSTER:} An Intelligent Framework to Parallelize Hadoop Phases},
  booktitle = {Poster Proceedings of the 27th International Symposium on High-Performance
               Parallel and Distributed Computing, {HPDC} 2018, Tempe, AZ, USA, June
               11-15, 2018},
  pages     = {1--2},
  year      = {2018},
  crossref  = {DBLP:conf/hpdc/2018p},
  url       = {https://doi.org/10.1145/3220192.3220193},
  doi       = {10.1145/3220192.3220193},
  timestamp = {Fri, 05 Apr 2019 12:37:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hpdc/MalekiRC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PooranianCYC18,
  author    = {Zahra Pooranian and
               Kang{-}Cheng Chen and
               Chia{-}Mu Yu and
               Mauro Conti},
  title     = {{RARE:} Defeating side channels based on data-deduplication in cloud
               storage},
  booktitle = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications
               Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19,
               2018},
  pages     = {444--449},
  year      = {2018},
  crossref  = {DBLP:conf/infocom/2018w},
  url       = {https://doi.org/10.1109/INFCOMW.2018.8406888},
  doi       = {10.1109/INFCOMW.2018.8406888},
  timestamp = {Wed, 11 Jul 2018 09:30:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/PooranianCYC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/WangCYJWYC18,
  author    = {Shanshan Wang and
               Zhenxiang Chen and
               Qiben Yan and
               Ke Ji and
               Lin Wang and
               Bo Yang and
               Mauro Conti},
  title     = {Deep and Broad Learning Based Detection of Android Malware via Network
               Traffic},
  booktitle = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
               2018, Banff, AB, Canada, June 4-6, 2018},
  pages     = {1--6},
  year      = {2018},
  crossref  = {DBLP:conf/iwqos/2018},
  url       = {https://doi.org/10.1109/IWQoS.2018.8624143},
  doi       = {10.1109/IWQoS.2018.8624143},
  timestamp = {Mon, 28 Jan 2019 08:24:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iwqos/WangCYJWYC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/CarofiglioCCGM18,
  author    = {Giovanna Carofiglio and
               Alberto Compagno and
               Mauro Conti and
               Fabio De Gaspari and
               Luca Muscariello},
  title     = {IaaS-Aided Access Control for Information-Centric IoT},
  booktitle = {43rd {IEEE} Conference on Local Computer Networks, {LCN} 2018, Chicago,
               IL, USA, October 1-4, 2018},
  pages     = {208--216},
  year      = {2018},
  crossref  = {DBLP:conf/lcn/2018},
  url       = {https://doi.org/10.1109/LCN.2018.8638228},
  doi       = {10.1109/LCN.2018.8638228},
  timestamp = {Fri, 15 Feb 2019 13:59:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/CarofiglioCCGM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/CompagnoCML18,
  author    = {Alberto Compagno and
               Mauro Conti and
               Stefano Munari and
               Riccardo Lazzeretti},
  title     = {{GATE} and {FENCE:} Geo-Blocking Protocols for Named Data Networking},
  booktitle = {43rd {IEEE} Conference on Local Computer Networks, {LCN} 2018, Chicago,
               IL, USA, October 1-4, 2018},
  pages     = {580--588},
  year      = {2018},
  crossref  = {DBLP:conf/lcn/2018},
  url       = {https://doi.org/10.1109/LCN.2018.8638053},
  doi       = {10.1109/LCN.2018.8638053},
  timestamp = {Fri, 15 Feb 2019 13:59:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/CompagnoCML18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiwac/RoyTCBRL18,
  author    = {Sankardas Roy and
               Daniele Tomasi and
               Mauro Conti and
               Shiva Bhusal and
               Arkajyoti Roy and
               Jiang Li},
  title     = {Optimizing Message Ferry Scheduling in a {DTN}},
  booktitle = {Proceedings of the 16th {ACM} International Symposium on Mobility
               Management and Wireless Access, MobiWac 2018, Montreal, QC, Canada,
               October 28 - November 02, 2018},
  pages     = {113--117},
  year      = {2018},
  crossref  = {DBLP:conf/mobiwac/2018},
  url       = {https://doi.org/10.1145/3265863.3265884},
  doi       = {10.1145/3265863.3265884},
  timestamp = {Mon, 10 Dec 2018 17:43:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobiwac/RoyTCBRL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BiondoCL18,
  author    = {Andrea Biondo and
               Mauro Conti and
               Daniele Lain},
  title     = {Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  year      = {2018},
  crossref  = {DBLP:conf/ndss/2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_05A-3\_Biondo\_paper.pdf},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/BiondoCL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtsi/BernieriCP18,
  author    = {Giuseppe Bernieri and
               Mauro Conti and
               Federica Pascucci},
  title     = {A Novel Architecture for Cyber-Physical Security in Industrial Control
               Networks},
  booktitle = {{IEEE} 4th International Forum on Research and Technology for Society
               and Industry, {RTSI} 2018, Palermo, Italy, September 10-13, 2018},
  pages     = {1--6},
  year      = {2018},
  crossref  = {DBLP:conf/rtsi/2018},
  url       = {https://doi.org/10.1109/RTSI.2018.8548438},
  doi       = {10.1109/RTSI.2018.8548438},
  timestamp = {Fri, 21 Dec 2018 12:31:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/rtsi/BernieriCP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtsi/CaposseleGNCLM18,
  author    = {Angelo Capossele and
               Andrea Gaglione and
               Michele Nati and
               Mauro Conti and
               Riccardo Lazzeretti and
               Paolo Missier},
  title     = {Leveraging Blockchain to Enable Smart-Health Applications},
  booktitle = {{IEEE} 4th International Forum on Research and Technology for Society
               and Industry, {RTSI} 2018, Palermo, Italy, September 10-13, 2018},
  pages     = {1--6},
  year      = {2018},
  crossref  = {DBLP:conf/rtsi/2018},
  url       = {https://doi.org/10.1109/RTSI.2018.8548357},
  doi       = {10.1109/RTSI.2018.8548357},
  timestamp = {Fri, 21 Dec 2018 12:31:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/rtsi/CaposseleGNCLM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangYCWSYC18,
  author    = {Shanshan Wang and
               Qiben Yan and
               Zhenxiang Chen and
               Lin Wang and
               Riccardo Spolaor and
               Bo Yang and
               Mauro Conti},
  title     = {Lexical Mining of Malicious URLs for Classifying Android Malware},
  booktitle = {Security and Privacy in Communication Networks - 14th International
               Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
               Part {I}},
  pages     = {248--263},
  year      = {2018},
  crossref  = {DBLP:conf/securecomm/2018-1},
  url       = {https://doi.org/10.1007/978-3-030-01701-9\_14},
  doi       = {10.1007/978-3-030-01701-9\_14},
  timestamp = {Fri, 11 Jan 2019 16:12:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/WangYCWSYC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BiondoCDFS18,
  author    = {Andrea Biondo and
               Mauro Conti and
               Lucas Davi and
               Tommaso Frassetto and
               Ahmad{-}Reza Sadeghi},
  title     = {The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel {SGX}},
  booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018.},
  pages     = {1213--1227},
  year      = {2018},
  crossref  = {DBLP:conf/uss/2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18/presentation/biondo},
  timestamp = {Mon, 20 Aug 2018 15:16:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/BiondoCDFS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/ContiKRR18,
  author    = {Mauro Conti and
               Pallavi Kaliyar and
               Md Masoom Rabbani and
               Silvio Ranise},
  title     = {{SPLIT:} {A} Secure and Scalable {RPL} routing protocol for Internet
               of Things},
  booktitle = {14th International Conference on Wireless and Mobile Computing, Networking
               and Communications, WiMob 2018, Limassol, Cyprus, October 15-17, 2018},
  pages     = {1--8},
  year      = {2018},
  crossref  = {DBLP:conf/wimob/2018},
  url       = {https://doi.org/10.1109/WiMOB.2018.8589115},
  doi       = {10.1109/WiMOB.2018.8589115},
  timestamp = {Fri, 04 Jan 2019 10:52:13 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wimob/ContiKRR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/ContiDHV18,
  author    = {Mauro Conti and
               Ralph E. Droms and
               Muhammad Hassan and
               Sebastiano Valle},
  title     = {QoE Degradation Attack in Dynamic Adaptive Streaming Over {ICN}},
  booktitle = {19th {IEEE} International Symposium on "A World of Wireless, Mobile
               and Multimedia Networks", WoWMoM 2018, Chania, Greece, June 12-15,
               2018},
  pages     = {1--9},
  year      = {2018},
  crossref  = {DBLP:conf/wowmom/2018},
  url       = {https://doi.org/10.1109/WoWMoM.2018.8449767},
  doi       = {10.1109/WoWMoM.2018.8449767},
  timestamp = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/ContiDHV18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-04774,
  author    = {Federico Tavella and
               Alberto Giaretta and
               Triona Marie Dooley{-}Cullinane and
               Mauro Conti and
               Lee Coffey and
               Sasitharan Balasubramaniam},
  title     = {{DNA} Molecular Storage System: Transferring Digitally Encoded Information
               through Bacterial Nanonetworks},
  journal   = {CoRR},
  volume    = {abs/1801.04774},
  year      = {2018},
  url       = {http://arxiv.org/abs/1801.04774},
  archivePrefix = {arXiv},
  eprint    = {1801.04774},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1801-04774},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-04102,
  author    = {Hidayet Aksu and
               Leonardo Babun and
               Mauro Conti and
               Gabriele Tolomei and
               A. Selcuk Uluagac},
  title     = {Advertising in the IoT Era: Vision and Challenges},
  journal   = {CoRR},
  volume    = {abs/1802.04102},
  year      = {2018},
  url       = {http://arxiv.org/abs/1802.04102},
  archivePrefix = {arXiv},
  eprint    = {1802.04102},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1802-04102},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-01341,
  author    = {Mauro Conti and
               Ankit Gangwal and
               Sushmita Ruj},
  title     = {On the Economic Significance of Ransomware Campaigns: {A} Bitcoin
               Transactions Perspective},
  journal   = {CoRR},
  volume    = {abs/1804.01341},
  year      = {2018},
  url       = {http://arxiv.org/abs/1804.01341},
  archivePrefix = {arXiv},
  eprint    = {1804.01341},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1804-01341},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-00121,
  author    = {Amrita Ghosal and
               Mauro Conti},
  title     = {Key Management Systems for Smart Grid Advanced Metering Infrastructure:
               {A} Survey},
  journal   = {CoRR},
  volume    = {abs/1806.00121},
  year      = {2018},
  url       = {http://arxiv.org/abs/1806.00121},
  archivePrefix = {arXiv},
  eprint    = {1806.00121},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1806-00121},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-05766,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Riccardo Lazzeretti and
               Md Masoom Rabbani and
               Silvio Ranise},
  title     = {{PADS:} Practical Attestation for Highly Dynamic Swarm Topologies},
  journal   = {CoRR},
  volume    = {abs/1806.05766},
  year      = {2018},
  url       = {http://arxiv.org/abs/1806.05766},
  archivePrefix = {arXiv},
  eprint    = {1806.05766},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1806-05766},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-00324,
  author    = {Mohammad Mahdi Tajiki and
               Mohammad Shojafar and
               Behzad Akbari and
               Stefano Salsano and
               Mauro Conti and
               Mukesh Singhal},
  title     = {Joint Failure Recovery, Fault Prevention, and Energy-efficient Resource
               Management for Real-time {SFC} in Fog-supported {SDN}},
  journal   = {CoRR},
  volume    = {abs/1807.00324},
  year      = {2018},
  url       = {http://arxiv.org/abs/1807.00324},
  archivePrefix = {arXiv},
  eprint    = {1807.00324},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1807-00324},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-08003,
  author    = {Flavio Toffalini and
               Andrea Biondo and
               Eleonora Losiouk and
               Jianying Zhou and
               Mauro Conti},
  title     = {{SCARR:} {A} Novel Scalable Runtime Remote Attestation},
  journal   = {CoRR},
  volume    = {abs/1807.08003},
  year      = {2018},
  url       = {http://arxiv.org/abs/1807.08003},
  archivePrefix = {arXiv},
  eprint    = {1807.08003},
  timestamp = {Mon, 01 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1807-08003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-10234,
  author    = {Mauro Conti and
               Edlira Dushku and
               Luigi V. Mancini},
  title     = {{RADIS:} Remote Attestation of Distributed IoT Services},
  journal   = {CoRR},
  volume    = {abs/1807.10234},
  year      = {2018},
  url       = {http://arxiv.org/abs/1807.10234},
  archivePrefix = {arXiv},
  eprint    = {1807.10234},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1807-10234},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-10438,
  author    = {Mauro Conti and
               Ali Dehghantanha and
               Katrin Franke and
               Steve Watson},
  title     = {Internet of Things Security and Forensics: Challenges and Opportunities},
  journal   = {CoRR},
  volume    = {abs/1807.10438},
  year      = {2018},
  url       = {http://arxiv.org/abs/1807.10438},
  archivePrefix = {arXiv},
  eprint    = {1807.10438},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1807-10438},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-01162,
  author    = {Mauro Conti and
               Ali Dehghantanha and
               Tooska Dargahi},
  title     = {Cyber Threat Intelligence : Challenges and Opportunities},
  journal   = {CoRR},
  volume    = {abs/1808.01162},
  year      = {2018},
  url       = {http://arxiv.org/abs/1808.01162},
  archivePrefix = {arXiv},
  eprint    = {1808.01162},
  timestamp = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1808-01162},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-02741,
  author    = {Abbas Acar and
               Hossein Fereidooni and
               Tigist Abera and
               Amit Kumar Sikder and
               Markus Miettinen and
               Hidayet Aksu and
               Mauro Conti and
               Ahmad{-}Reza Sadeghi and
               A. Selcuk Uluagac},
  title     = {Peek-a-Boo: {I} see your smart home activities, even encrypted!},
  journal   = {CoRR},
  volume    = {abs/1808.02741},
  year      = {2018},
  url       = {http://arxiv.org/abs/1808.02741},
  archivePrefix = {arXiv},
  eprint    = {1808.02741},
  timestamp = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1808-02741},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-03320,
  author    = {Mauro Conti and
               Chhagan Lal},
  title     = {A Survey on Context-based Co-presence Detection Techniques},
  journal   = {CoRR},
  volume    = {abs/1808.03320},
  year      = {2018},
  url       = {http://arxiv.org/abs/1808.03320},
  archivePrefix = {arXiv},
  eprint    = {1808.03320},
  timestamp = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1808-03320},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-09115,
  author    = {Tommi Gr{\"{o}}ndahl and
               Luca Pajola and
               Mika Juuti and
               Mauro Conti and
               N. Asokan},
  title     = {All You Need is "Love": Evading Hate-speech Detection},
  journal   = {CoRR},
  volume    = {abs/1808.09115},
  year      = {2018},
  url       = {http://arxiv.org/abs/1808.09115},
  archivePrefix = {arXiv},
  eprint    = {1808.09115},
  timestamp = {Mon, 03 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1808-09115},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-09035,
  author    = {Deepa K and
               Radhamani G and
               Vinod P and
               Mohammad Shojafar and
               Neeraj Kumar and
               Mauro Conti},
  title     = {FeatureAnalytics: An approach to derive relevant attributes for analyzing
               Android Malware},
  journal   = {CoRR},
  volume    = {abs/1809.09035},
  year      = {2018},
  url       = {http://arxiv.org/abs/1809.09035},
  archivePrefix = {arXiv},
  eprint    = {1809.09035},
  timestamp = {Mon, 15 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1809-09035},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/SomaniGSCB17,
  author    = {Gaurav Somani and
               Manoj Singh Gaur and
               Dheeraj Sanghi and
               Mauro Conti and
               Rajkumar Buyya},
  title     = {Service resizing for quick DDoS mitigation in cloud computing environment},
  journal   = {Annales des T{\'{e}}l{\'{e}}communications},
  volume    = {72},
  number    = {5-6},
  pages     = {237--252},
  year      = {2017},
  url       = {https://doi.org/10.1007/s12243-016-0552-5},
  doi       = {10.1007/s12243-016-0552-5},
  timestamp = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/adt/SomaniGSCB17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/SomaniGSCR17,
  author    = {Gaurav Somani and
               Manoj Singh Gaur and
               Dheeraj Sanghi and
               Mauro Conti and
               Muttukrishnan Rajarajan},
  title     = {DDoS victim service containment to minimize the internal collateral
               damages in cloud computing},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {59},
  pages     = {165--179},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.compeleceng.2016.12.004},
  doi       = {10.1016/j.compeleceng.2016.12.004},
  timestamp = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cee/SomaniGSCR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cloudcomp/SomaniGSCRB17,
  author    = {Gaurav Somani and
               Manoj Singh Gaur and
               Dheeraj Sanghi and
               Mauro Conti and
               Muttukrishnan Rajarajan and
               Rajkumar Buyya},
  title     = {Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future
               Directions},
  journal   = {{IEEE} Cloud Computing},
  volume    = {4},
  number    = {1},
  pages     = {22--32},
  year      = {2017},
  url       = {https://doi.org/10.1109/MCC.2017.14},
  doi       = {10.1109/MCC.2017.14},
  timestamp = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cloudcomp/SomaniGSCRB17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SomaniGSCB17,
  author    = {Gaurav Somani and
               Manoj Singh Gaur and
               Dheeraj Sanghi and
               Mauro Conti and
               Rajkumar Buyya},
  title     = {DDoS attacks in cloud computing: Issues, taxonomy, and future directions},
  journal   = {Computer Communications},
  volume    = {107},
  pages     = {30--48},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.comcom.2017.03.010},
  doi       = {10.1016/j.comcom.2017.03.010},
  timestamp = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/SomaniGSCB17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IdreesRCCR17,
  author    = {Fauzia Idrees and
               Muttukrishnan Rajarajan and
               Mauro Conti and
               Thomas M. Chen and
               Yogachandran Rahulamathavan},
  title     = {PIndroid: {A} novel Android malware detection system using ensemble
               learning methods},
  journal   = {Computers {\&} Security},
  volume    = {68},
  pages     = {36--46},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.cose.2017.03.011},
  doi       = {10.1016/j.cose.2017.03.011},
  timestamp = {Tue, 27 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/IdreesRCCR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhandariJJLZGMC17,
  author    = {Shweta Bhandari and
               Wafa Ben Jaballah and
               Vineeta Jain and
               Vijay Laxmi and
               Akka Zemmari and
               Manoj Singh Gaur and
               Mohamed Mosbah and
               Mauro Conti},
  title     = {Android inter-app communication threats and detection techniques},
  journal   = {Computers {\&} Security},
  volume    = {70},
  pages     = {392--421},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.cose.2017.07.002},
  doi       = {10.1016/j.cose.2017.07.002},
  timestamp = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/BhandariJJLZGMC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/DargahiCABC17,
  author    = {Tooska Dargahi and
               Alberto Caponi and
               Moreno Ambrosin and
               Giuseppe Bianchi and
               Mauro Conti},
  title     = {A Survey on the Security of Stateful {SDN} Data Planes},
  journal   = {{IEEE} Communications Surveys and Tutorials},
  volume    = {19},
  number    = {3},
  pages     = {1701--1725},
  year      = {2017},
  url       = {https://doi.org/10.1109/COMST.2017.2689819},
  doi       = {10.1109/COMST.2017.2689819},
  timestamp = {Mon, 26 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comsur/DargahiCABC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/ArdagnaACPS17,
  author    = {Claudio Agostino Ardagna and
               Kanishka Ariyapala and
               Mauro Conti and
               Cristina M. Pinotti and
               Julinda Stefa},
  title     = {Anonymous end-to-end communications in adversarial mobile clouds},
  journal   = {Pervasive and Mobile Computing},
  volume    = {36},
  pages     = {57--67},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.pmcj.2016.09.001},
  doi       = {10.1016/j.pmcj.2016.09.001},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/percom/ArdagnaACPS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/LiGCL17,
  author    = {QianQian Li and
               Sarada Prasad Gochhayat and
               Mauro Conti and
               FangAi Liu},
  title     = {EnergIoT: {A} solution to improve network lifetime of IoT devices},
  journal   = {Pervasive and Mobile Computing},
  volume    = {42},
  pages     = {124--133},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.pmcj.2017.10.005},
  doi       = {10.1016/j.pmcj.2017.10.005},
  timestamp = {Thu, 30 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/percom/LiGCL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/PerazzoSCDP17,
  author    = {Pericle Perazzo and
               Francesco Betti Sorbelli and
               Mauro Conti and
               Gianluca Dini and
               Cristina M. Pinotti},
  title     = {Drone Path Planning for Secure Positioning and Secure Position Verification},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {16},
  number    = {9},
  pages     = {2478--2493},
  year      = {2017},
  url       = {https://doi.org/10.1109/TMC.2016.2627552},
  doi       = {10.1109/TMC.2016.2627552},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tmc/PerazzoSCDP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/MohammadiJC17,
  author    = {Reza Mohammadi and
               Reza Javidan and
               Mauro Conti},
  title     = {{SLICOTS:} An SDN-Based Lightweight Countermeasure for {TCP} {SYN}
               Flooding Attacks},
  journal   = {{IEEE} Trans. Network and Service Management},
  volume    = {14},
  number    = {2},
  pages     = {487--497},
  year      = {2017},
  url       = {https://doi.org/10.1109/TNSM.2017.2701549},
  doi       = {10.1109/TNSM.2017.2701549},
  timestamp = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tnsm/MohammadiJC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/AmbrosinBCL17,
  author    = {Moreno Ambrosin and
               Paolo Braca and
               Mauro Conti and
               Riccardo Lazzeretti},
  title     = {{ODIN:} Obfuscation-Based Privacy-Preserving Consensus Algorithm for
               Decentralized Information Fusion in Smart Device Networks},
  journal   = {{ACM} Trans. Internet Techn.},
  volume    = {18},
  number    = {1},
  pages     = {6:1--6:22},
  year      = {2017},
  url       = {https://doi.org/10.1145/3137573},
  doi       = {10.1145/3137573},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/toit/AmbrosinBCL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/AmbrosinCGP17,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Fabio De Gaspari and
               Radha Poovendran},
  title     = {LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined
               Networking},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {25},
  number    = {2},
  pages     = {1206--1219},
  year      = {2017},
  url       = {https://doi.org/10.1109/TNET.2016.2626287},
  doi       = {10.1109/TNET.2016.2626287},
  timestamp = {Thu, 21 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/AmbrosinCGP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MonaroSLCGS17,
  author    = {Merylin Monaro and
               Riccardo Spolaor and
               QianQian Li and
               Mauro Conti and
               Luciano Gamberini and
               Giuseppe Sartori},
  title     = {Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics},
  booktitle = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  pages     = {60:1--60:6},
  year      = {2017},
  crossref  = {DBLP:conf/IEEEares/2017},
  url       = {https://doi.org/10.1145/3098954.3104047},
  doi       = {10.1145/3098954.3104047},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/MonaroSLCGS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ContiKL17,
  author    = {Mauro Conti and
               Pallavi Kaliyar and
               Chhagan Lal},
  title     = {{REMI:} {A} Reliable and Secure Multicast Routing Protocol for IoT
               Networks},
  booktitle = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  pages     = {84:1--84:8},
  year      = {2017},
  crossref  = {DBLP:conf/IEEEares/2017},
  url       = {https://doi.org/10.1145/3098954.3106070},
  doi       = {10.1145/3098954.3106070},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/ContiKL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SpolaorAMCP17,
  author    = {Riccardo Spolaor and
               Laila Abudahi and
               Veelasha Moonsamy and
               Mauro Conti and
               Radha Poovendran},
  title     = {No Free Charge Theorem: {A} Covert Channel via {USB} Charging Cable
               on Mobile Devices},
  booktitle = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  pages     = {83--102},
  year      = {2017},
  crossref  = {DBLP:conf/acns/2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1\_5},
  doi       = {10.1007/978-3-319-61204-1\_5},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/SpolaorAMCP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/KusenSCC17,
  author    = {Ema Kusen and
               Mark Strembeck and
               Giuseppe Cascavilla and
               Mauro Conti},
  title     = {On the Influence of Emotional Valence Shifts on the Spread of Information
               in Social Networks},
  booktitle = {Proceedings of the 2017 {IEEE/ACM} International Conference on Advances
               in Social Networks Analysis and Mining 2017, Sydney, Australia, July
               31 - August 03, 2017},
  pages     = {321--324},
  year      = {2017},
  crossref  = {DBLP:conf/asunam/2017},
  url       = {https://doi.org/10.1145/3110025.3110031},
  doi       = {10.1145/3110025.3110031},
  timestamp = {Tue, 06 Nov 2018 16:57:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asunam/KusenSCC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/GajraniTLGCR17,
  author    = {Jyoti Gajrani and
               Meenakshi Tripathi and
               Vijay Laxmi and
               Manoj Singh Gaur and
               Mauro Conti and
               Muttukrishnan Rajarajan},
  title     = {sPECTRA: {A} precise framEwork for analyzing CrypTographic vulneRabilities
               in Android apps},
  booktitle = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference,
               {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017},
  pages     = {854--860},
  year      = {2017},
  crossref  = {DBLP:conf/ccnc/2017},
  url       = {https://doi.org/10.1109/CCNC.2017.7983245},
  doi       = {10.1109/CCNC.2017.7983245},
  timestamp = {Fri, 21 Jul 2017 15:01:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccnc/GajraniTLGCR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CompagnoCLT17,
  author    = {Alberto Compagno and
               Mauro Conti and
               Daniele Lain and
               Gene Tsudik},
  title     = {Don't Skype {\&} Type!: Acoustic Eavesdropping in Voice-Over-IP},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {703--715},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017asia},
  url       = {https://doi.org/10.1145/3052973.3053005},
  doi       = {10.1145/3052973.3053005},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CompagnoCLT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GajraniLLTGC17,
  author    = {Jyoti Gajrani and
               Li Li and
               Vijay Laxmi and
               Meenakshi Tripathi and
               Manoj Singh Gaur and
               Mauro Conti},
  title     = {Detection of Information Leaks via Reflection in Android Apps},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {911--913},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017asia},
  url       = {https://doi.org/10.1145/3052973.3055162},
  doi       = {10.1145/3052973.3055162},
  timestamp = {Thu, 20 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GajraniLLTGC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/ContiNHPM17,
  author    = {Mauro Conti and
               Giorgio Di Natale and
               Annelie Heuser and
               Thomas P{\"{o}}ppelmann and
               Nele Mentens},
  title     = {Do we need a holistic approach for the design of secure IoT systems?},
  booktitle = {Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy,
               May 15-17, 2017},
  pages     = {425--430},
  year      = {2017},
  crossref  = {DBLP:conf/cf/2017},
  url       = {https://doi.org/10.1145/3075564.3079070},
  doi       = {10.1145/3075564.3079070},
  timestamp = {Tue, 06 Nov 2018 11:07:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cf/ContiNHPM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chase/FereidooniFMSC17,
  author    = {Hossein Fereidooni and
               Tommaso Frassetto and
               Markus Miettinen and
               Ahmad{-}Reza Sadeghi and
               Mauro Conti},
  title     = {Fitness Trackers: Fit for Health but Unfit for Security and Privacy},
  booktitle = {Proceedings of the Second {IEEE/ACM} International Conference on Connected
               Health: Applications, Systems and Engineering Technologies, {CHASE}
               2017, Philadelphia, PA, USA, July 17-19, 2017},
  pages     = {19--24},
  year      = {2017},
  crossref  = {DBLP:conf/chase/2017},
  url       = {https://doi.org/10.1109/CHASE.2017.54},
  doi       = {10.1109/CHASE.2017.54},
  timestamp = {Mon, 23 Apr 2018 11:22:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chase/FereidooniFMSC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/GajraniLTGSZMC17,
  author    = {Jyoti Gajrani and
               Vijay Laxmi and
               Meenakshi Tripathi and
               Manoj Singh Gaur and
               Daya Ram Sharma and
               Akka Zemmari and
               Mohamed Mosbah and
               Mauro Conti},
  title     = {Unraveling Reflection Induced Sensitive Leaks in Android Apps},
  booktitle = {Risks and Security of Internet and Systems - 12th International Conference,
               CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected
               Papers},
  pages     = {49--65},
  year      = {2017},
  crossref  = {DBLP:conf/crisis/2017},
  url       = {https://doi.org/10.1007/978-3-319-76687-4\_4},
  doi       = {10.1007/978-3-319-76687-4\_4},
  timestamp = {Sat, 17 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/GajraniLTGSZMC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BordoniCS17,
  author    = {Lorenzo Bordoni and
               Mauro Conti and
               Riccardo Spolaor},
  title     = {Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for
               Android},
  booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {I}},
  pages     = {278--296},
  year      = {2017},
  crossref  = {DBLP:conf/esorics/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-66402-6\_17},
  doi       = {10.1007/978-3-319-66402-6\_17},
  timestamp = {Fri, 01 Sep 2017 14:18:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/BordoniCS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/KusenCFCS17,
  author    = {Ema Kusen and
               Giuseppe Cascavilla and
               Kathrin Figl and
               Mauro Conti and
               Mark Strembeck},
  title     = {Identifying Emotions in Social Media: Comparison of Word-Emotion Lexicons},
  booktitle = {5th International Conference on Future Internet of Things and Cloud
               Workshops, FiCloud Workshops 2017, Prague, Czech Republic, August
               21-23, 2017},
  pages     = {132--137},
  year      = {2017},
  crossref  = {DBLP:conf/ficloud/2017w},
  url       = {https://doi.org/10.1109/FiCloudW.2017.75},
  doi       = {10.1109/FiCloudW.2017.75},
  timestamp = {Tue, 19 Mar 2019 17:14:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ficloud/KusenCFCS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/ContiGM17,
  author    = {Mauro Conti and
               Fabio De Gaspari and
               Luigi V. Mancini},
  title     = {Know Your Enemy: Stealth Configuration-Information Gathering in {SDN}},
  booktitle = {Green, Pervasive, and Cloud Computing - 12th International Conference,
               {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings},
  pages     = {386--401},
  year      = {2017},
  crossref  = {DBLP:conf/gpc/2017},
  url       = {https://doi.org/10.1007/978-3-319-57186-7\_29},
  doi       = {10.1007/978-3-319-57186-7\_29},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gpc/ContiGM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/FavarettoSCF17,
  author    = {Maddalena Favaretto and
               Riccardo Spolaor and
               Mauro Conti and
               Marco Ferrante},
  title     = {You Surf so Strange Today: Anomaly Detection in Web Services via {HMM}
               and {CTMC}},
  booktitle = {Green, Pervasive, and Cloud Computing - 12th International Conference,
               {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings},
  pages     = {426--440},
  year      = {2017},
  crossref  = {DBLP:conf/gpc/2017},
  url       = {https://doi.org/10.1007/978-3-319-57186-7\_32},
  doi       = {10.1007/978-3-319-57186-7\_32},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/gpc/FavarettoSCF17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccp2/LiMCLL17,
  author    = {QianQian Li and
               Reza Mohammadi and
               Mauro Conti and
               ChuanHuang Li and
               XiaoLin Li},
  title     = {GolfEngine: Network management system for software defined networking},
  booktitle = {13th {IEEE} International Conference on Intelligent Computer Communication
               and Processing, {ICCP} 2017, Cluj-Napoca, Romania, September 7-9,
               2017},
  pages     = {239--246},
  year      = {2017},
  crossref  = {DBLP:conf/iccp2/2017},
  url       = {https://doi.org/10.1109/ICCP.2017.8117010},
  doi       = {10.1109/ICCP.2017.8117010},
  timestamp = {Fri, 15 Dec 2017 12:49:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iccp2/LiMCLL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/PirroCL17,
  author    = {Matteo Di Pirro and
               Mauro Conti and
               Riccardo Lazzeretti},
  title     = {Ensuring information security by using Haskell's advanced type system},
  booktitle = {International Carnahan Conference on Security Technology, {ICCST}
               2017, Madrid, Spain, October 23-26, 2017},
  pages     = {1--6},
  year      = {2017},
  crossref  = {DBLP:conf/iccst/2017},
  url       = {https://doi.org/10.1109/CCST.2017.8167844},
  doi       = {10.1109/CCST.2017.8167844},
  timestamp = {Tue, 06 Feb 2018 12:36:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iccst/PirroCL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ContiLMT17,
  author    = {Mauro Conti and
               Giulio Lovisotto and
               Ivan Martinovic and
               Gene Tsudik},
  title     = {{FADEWICH:} Fast Deauthentication Over the Wireless Channel},
  booktitle = {37th {IEEE} International Conference on Distributed Computing Systems,
               {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages     = {2294--2301},
  year      = {2017},
  crossref  = {DBLP:conf/icdcs/2017},
  url       = {https://doi.org/10.1109/ICDCS.2017.296},
  doi       = {10.1109/ICDCS.2017.296},
  timestamp = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/ContiLMT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CozzaTCK17,
  author    = {Vittoria Cozza and
               Zisis Tsiatsikas and
               Mauro Conti and
               Georgios Kambourakis},
  title     = {Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy
               in Online Services},
  booktitle = {Proceedings of the 3rd International Conference on Information Systems
               Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
               2017.},
  pages     = {431--438},
  year      = {2017},
  crossref  = {DBLP:conf/icissp/2017},
  url       = {https://doi.org/10.5220/0006207204310438},
  doi       = {10.5220/0006207204310438},
  timestamp = {Thu, 18 May 2017 14:22:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icissp/CozzaTCK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnsc/GangwalCG17,
  author    = {Ankit Gangwal and
               Mauro Conti and
               Manoj Singh Gaur},
  title     = {Panorama: Real-time bird's eye view of an OpenFlow network},
  booktitle = {14th {IEEE} International Conference on Networking, Sensing and Control,
               {ICNSC} 2017, Calabria, Italy, May 16-18, 2017},
  pages     = {204--209},
  year      = {2017},
  crossref  = {DBLP:conf/icnsc/2017},
  url       = {https://doi.org/10.1109/ICNSC.2017.8000092},
  doi       = {10.1109/ICNSC.2017.8000092},
  timestamp = {Thu, 04 Jan 2018 08:18:52 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icnsc/GangwalCG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangYCYZC17,
  author    = {Shanshan Wang and
               Qiben Yan and
               Zhenxiang Chen and
               Bo Yang and
               Chuan Zhao and
               Mauro Conti},
  title     = {TextDroid: Semantics-based detection of mobile malware using network
               flows},
  booktitle = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
               Workshops, Atlanta, GA, USA, May 1-4, 2017},
  pages     = {18--23},
  year      = {2017},
  crossref  = {DBLP:conf/infocom/2017w},
  url       = {https://doi.org/10.1109/INFCOMW.2017.8116346},
  doi       = {10.1109/INFCOMW.2017.8116346},
  timestamp = {Thu, 30 Nov 2017 16:47:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/WangYCYZC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/PooranianSNCC17,
  author    = {Zahra Pooranian and
               Mohammad Shojafar and
               Paola Gabriela Vinueza Naranjo and
               Luca Chiaraviglio and
               Mauro Conti},
  title     = {A Novel Distributed Fog-Based Networked Architecture to Preserve Energy
               in Fog Data Centers},
  booktitle = {14th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems,
               {MASS} 2017, Orlando, FL, USA, October 22-25, 2017},
  pages     = {604--609},
  year      = {2017},
  crossref  = {DBLP:conf/mass/2017},
  url       = {https://doi.org/10.1109/MASS.2017.33},
  doi       = {10.1109/MASS.2017.33},
  timestamp = {Fri, 01 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mass/PooranianSNCC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/ContiG17,
  author    = {Mauro Conti and
               Ankit Gangwal},
  title     = {Blocking intrusions at border using software defined-internet exchange
               point {(SD-IXP)}},
  booktitle = {2017 {IEEE} Conference on Network Function Virtualization and Software
               Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017},
  pages     = {1--6},
  year      = {2017},
  crossref  = {DBLP:conf/nfvsdn/2017},
  url       = {https://doi.org/10.1109/NFV-SDN.2017.8169838},
  doi       = {10.1109/NFV-SDN.2017.8169838},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nfvsdn/ContiG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/MohammadiJKCL17,
  author    = {Reza Mohammadi and
               Reza Javidan and
               Manijeh Keshtgari and
               Mauro Conti and
               Chhagan Lal},
  title     = {Practical extensions to countermeasure DoS attacks in software defined
               networking},
  booktitle = {2017 {IEEE} Conference on Network Function Virtualization and Software
               Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017},
  pages     = {1--6},
  year      = {2017},
  crossref  = {DBLP:conf/nfvsdn/2017},
  url       = {https://doi.org/10.1109/NFV-SDN.2017.8169839},
  doi       = {10.1109/NFV-SDN.2017.8169839},
  timestamp = {Tue, 12 Dec 2017 14:43:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nfvsdn/MohammadiJKCL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FereidooniCSPMS17,
  author    = {Hossein Fereidooni and
               Jiska Classen and
               Tom Spink and
               Paul Patras and
               Markus Miettinen and
               Ahmad{-}Reza Sadeghi and
               Matthias Hollick and
               Mauro Conti},
  title     = {Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing
               Fitbit},
  booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International
               Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  pages     = {48--69},
  year      = {2017},
  crossref  = {DBLP:conf/raid/2017},
  url       = {https://doi.org/10.1007/978-3-319-66332-6\_3},
  doi       = {10.1007/978-3-319-66332-6\_3},
  timestamp = {Wed, 18 Oct 2017 19:32:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/FereidooniCSPMS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ContiLLLQ17,
  author    = {Mauro Conti and
               Daniele Lain and
               Riccardo Lazzeretti and
               Giulio Lovisotto and
               Walter Quattrociocchi},
  title     = {It's always April fools' day!: On the difficulty of social network
               misinformation classification via propagation features},
  booktitle = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
               2017, Rennes, France, December 4-7, 2017},
  pages     = {1--6},
  year      = {2017},
  crossref  = {DBLP:conf/wifs/2017},
  url       = {https://doi.org/10.1109/WIFS.2017.8267653},
  doi       = {10.1109/WIFS.2017.8267653},
  timestamp = {Tue, 30 Jan 2018 12:23:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/ContiLLLQ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/BrunatiCT17,
  author    = {Matteo Brunati and
               Mauro Conti and
               Alessandro Tezza},
  title     = {{SNIFFO:} Security of networks and intelligence for field operations},
  booktitle = {13th {IEEE} International Conference on Wireless and Mobile Computing,
               Networking and Communications, WiMob 2017, Rome, Italy, October 9-11,
               2017},
  pages     = {1--8},
  year      = {2017},
  crossref  = {DBLP:conf/wimob/2017},
  url       = {https://doi.org/10.1109/WiMOB.2017.8115785},
  doi       = {10.1109/WiMOB.2017.8115785},
  timestamp = {Fri, 01 Dec 2017 09:24:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wimob/BrunatiCT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/ContiGG17,
  author    = {Mauro Conti and
               Ankit Gangwal and
               Manoj Singh Gaur},
  title     = {A comprehensive and effective mechanism for DDoS detection in {SDN}},
  booktitle = {13th {IEEE} International Conference on Wireless and Mobile Computing,
               Networking and Communications, WiMob 2017, Rome, Italy, October 9-11,
               2017},
  pages     = {1--8},
  year      = {2017},
  crossref  = {DBLP:conf/wimob/2017},
  url       = {https://doi.org/10.1109/WiMOB.2017.8115796},
  doi       = {10.1109/WiMOB.2017.8115796},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wimob/ContiGG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmbrosinCLRR17,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Riccardo Lazzeretti and
               Md Masoom Rabbani and
               Silvio Ranise},
  title     = {Toward secure and efficient attestation for highly dynamic swarms:
               poster},
  booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  pages     = {281--282},
  year      = {2017},
  crossref  = {DBLP:conf/wisec/2017},
  url       = {https://doi.org/10.1145/3098243.3106026},
  doi       = {10.1145/3098243.3106026},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/AmbrosinCLRR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmbrosinCCL17,
  author    = {Moreno Ambrosin and
               Stefano Cecconello and
               Mauro Conti and
               Daniele Lain},
  title     = {A roaming-based denial of service attack on {LTE} networks: poster},
  booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  pages     = {283--284},
  year      = {2017},
  crossref  = {DBLP:conf/wisec/2017},
  url       = {https://doi.org/10.1145/3098243.3106027},
  doi       = {10.1145/3098243.3106027},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/AmbrosinCCL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/LaurenMCL17,
  author    = {Samuel Laur{\'{e}}n and
               Mohammad Reza Memarian and
               Mauro Conti and
               Ville Lepp{\"{a}}nen},
  title     = {Analysis of Security in Modern Container Platforms},
  booktitle = {Research Advances in Cloud Computing},
  pages     = {351--369},
  year      = {2017},
  crossref  = {DBLP:books/sp/CSB2017},
  url       = {https://doi.org/10.1007/978-981-10-5026-8\_14},
  doi       = {10.1007/978-981-10-5026-8\_14},
  timestamp = {Wed, 03 Apr 2019 15:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/17/LaurenMCL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/MemarianFILC17,
  author    = {Mohammad Reza Memarian and
               Diogo Fernandes and
               Pedro R. M. In{\'{a}}cio and
               Ville Lepp{\"{a}}nen and
               Mauro Conti},
  title     = {Applications of Trusted Computing in Cloud Context},
  booktitle = {Research Advances in Cloud Computing},
  pages     = {449--465},
  year      = {2017},
  crossref  = {DBLP:books/sp/CSB2017},
  url       = {https://doi.org/10.1007/978-981-10-5026-8\_18},
  doi       = {10.1007/978-981-10-5026-8\_18},
  timestamp = {Wed, 03 Apr 2019 15:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/17/MemarianFILC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2017,
  editor    = {Guevara Noubir and
               Mauro Conti and
               Sneha Kumar Kasera},
  title     = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3098243},
  doi       = {10.1145/3098243},
  isbn      = {978-1-4503-5084-6},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiLLLQ17,
  author    = {Mauro Conti and
               Daniele Lain and
               Riccardo Lazzeretti and
               Giulio Lovisotto and
               Walter Quattrociocchi},
  title     = {It's Always April Fools' Day! On the Difficulty of Social Network
               Misinformation Classification via Propagation Features},
  journal   = {CoRR},
  volume    = {abs/1701.04221},
  year      = {2017},
  url       = {http://arxiv.org/abs/1701.04221},
  archivePrefix = {arXiv},
  eprint    = {1701.04221},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiLLLQ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AcarAUC17,
  author    = {Abbas Acar and
               Hidayet Aksu and
               A. Selcuk Uluagac and
               Mauro Conti},
  title     = {A Survey on Homomorphic Encryption Schemes: Theory and Implementation},
  journal   = {CoRR},
  volume    = {abs/1704.03578},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.03578},
  archivePrefix = {arXiv},
  eprint    = {1704.03578},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AcarAUC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TaylorSCM17,
  author    = {Vincent F. Taylor and
               Riccardo Spolaor and
               Mauro Conti and
               Ivan Martinovic},
  title     = {Robust Smartphone App Identification Via Encrypted Network Traffic
               Analysis},
  journal   = {CoRR},
  volume    = {abs/1704.06099},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.06099},
  archivePrefix = {arXiv},
  eprint    = {1704.06099},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/TaylorSCM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiELR17,
  author    = {Mauro Conti and
               Sandeep Kumar E and
               Chhagan Lal and
               Sushmita Ruj},
  title     = {A Survey on Security and Privacy Issues of Bitcoin},
  journal   = {CoRR},
  volume    = {abs/1706.00916},
  year      = {2017},
  url       = {http://arxiv.org/abs/1706.00916},
  archivePrefix = {arXiv},
  eprint    = {1706.00916},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiELR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FereidooniCSPMS17,
  author    = {Hossein Fereidooni and
               Jiska Classen and
               Tom Spink and
               Paul Patras and
               Markus Miettinen and
               Ahmad{-}Reza Sadeghi and
               Matthias Hollick and
               Mauro Conti},
  title     = {Breaking Fitness Records without Moving: Reverse Engineering and Spoofing
               Fitbit},
  journal   = {CoRR},
  volume    = {abs/1706.09165},
  year      = {2017},
  url       = {http://arxiv.org/abs/1706.09165},
  archivePrefix = {arXiv},
  eprint    = {1706.09165},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/FereidooniCSPMS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-03766,
  author    = {Mauro Conti and
               QianQian Li and
               Alberto Maragno and
               Riccardo Spolaor},
  title     = {The Dark Side(-Channel) of Mobile Devices: {A} Survey on Network Traffic
               Analysis},
  journal   = {CoRR},
  volume    = {abs/1708.03766},
  year      = {2017},
  url       = {http://arxiv.org/abs/1708.03766},
  archivePrefix = {arXiv},
  eprint    = {1708.03766},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1708-03766},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04417,
  author    = {Tooska Dargahi and
               Ali Dehghantanha and
               Mauro Conti},
  title     = {Investigating Storage as a Service Cloud Platform: pCloud as a Case
               Study},
  journal   = {CoRR},
  volume    = {abs/1709.04417},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.04417},
  archivePrefix = {arXiv},
  eprint    = {1709.04417},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-04417},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-05296,
  author    = {Tooska Dargahi and
               Ali Dehghantanha and
               Mauro Conti},
  title     = {Forensics Analysis of Android Mobile VoIP Apps},
  journal   = {CoRR},
  volume    = {abs/1709.05296},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.05296},
  archivePrefix = {arXiv},
  eprint    = {1709.05296},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-05296},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-01801,
  author    = {Paola Gabriela Vinueza Naranjo and
               Zahra Pooranian and
               Mohammad Shojafar and
               Mauro Conti and
               Rajkumar Buyya},
  title     = {{FOCAN:} {A} Fog-supported Smart City Network Architecture for Management
               of Applications in the Internet of Everything Environments},
  journal   = {CoRR},
  volume    = {abs/1710.01801},
  year      = {2017},
  url       = {http://arxiv.org/abs/1710.01801},
  archivePrefix = {arXiv},
  eprint    = {1710.01801},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1710-01801},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/JaballahCMP16,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Mohamed Mosbah and
               Claudio E. Palazzi},
  title     = {The impact of malicious nodes positioning on vehicular alert messaging
               system},
  journal   = {Ad Hoc Networks},
  volume    = {52},
  pages     = {3--16},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.adhoc.2016.08.008},
  doi       = {10.1016/j.adhoc.2016.08.008},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/adhoc/JaballahCMP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SomaniGSC16,
  author    = {Gaurav Somani and
               Manoj Singh Gaur and
               Dheeraj Sanghi and
               Mauro Conti},
  title     = {DDoS attacks in cloud computing: Collateral damage to non-targets},
  journal   = {Computer Networks},
  volume    = {109},
  pages     = {157--171},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.comnet.2016.03.022},
  doi       = {10.1016/j.comnet.2016.03.022},
  timestamp = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cn/SomaniGSC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DargahiACA16,
  author    = {Tooska Dargahi and
               Moreno Ambrosin and
               Mauro Conti and
               N. Asokan},
  title     = {{ABAKA:} {A} novel attribute-based k-anonymous collaborative solution
               for LBSs},
  journal   = {Computer Communications},
  volume    = {85},
  pages     = {1--13},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.comcom.2016.03.002},
  doi       = {10.1016/j.comcom.2016.03.002},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/DargahiACA16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SainiGLC16,
  author    = {Anil Saini and
               Manoj Singh Gaur and
               Vijay Laxmi and
               Mauro Conti},
  title     = {Colluding browser extension attack on user privacy and its implication
               for web browsers},
  journal   = {Computers {\&} Security},
  volume    = {63},
  pages     = {14--28},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.cose.2016.09.003},
  doi       = {10.1016/j.cose.2016.09.003},
  timestamp = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/SainiGLC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ContiDL16,
  author    = {Mauro Conti and
               Nicola Dragoni and
               Viktor Lesyk},
  title     = {A Survey of Man In The Middle Attacks},
  journal   = {{IEEE} Communications Surveys and Tutorials},
  volume    = {18},
  number    = {3},
  pages     = {2027--2051},
  year      = {2016},
  url       = {https://doi.org/10.1109/COMST.2016.2548426},
  doi       = {10.1109/COMST.2016.2548426},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comsur/ContiDL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/AmbrosinACDMRL16,
  author    = {Moreno Ambrosin and
               Arman Anzanpour and
               Mauro Conti and
               Tooska Dargahi and
               Sanaz Rahimi Moosavi and
               Amir{-}Mohammad Rahmani and
               Pasi Liljeberg},
  title     = {On the Feasibility of Attribute-Based Encryption on Internet of Things
               Devices},
  journal   = {{IEEE} Micro},
  volume    = {36},
  number    = {6},
  pages     = {25--35},
  year      = {2016},
  url       = {https://doi.org/10.1109/MM.2016.101},
  doi       = {10.1109/MM.2016.101},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/micro/AmbrosinACDMRL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ContiCFHKLLPS16,
  author    = {Mauro Conti and
               Stephen Crane and
               Tommaso Frassetto and
               Andrei Homescu and
               Georg Koppen and
               Per Larsen and
               Christopher Liebchen and
               Mike Perry and
               Ahmad{-}Reza Sadeghi},
  title     = {Selfrando: Securing the Tor Browser against De-anonymization Exploits},
  journal   = {PoPETs},
  volume    = {2016},
  number    = {4},
  pages     = {454--469},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0050},
  doi       = {10.1515/popets-2016-0050},
  timestamp = {Wed, 20 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/ContiCFHKLLPS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ContiMSV16,
  author    = {Mauro Conti and
               Luigi Vincenzo Mancini and
               Riccardo Spolaor and
               Nino Vincenzo Verde},
  title     = {Analyzing Android Encrypted Network Traffic to Identify User Actions},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {1},
  pages     = {114--125},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2015.2478741},
  doi       = {10.1109/TIFS.2015.2478741},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/ContiMSV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GiarettaBC16,
  author    = {Alberto Giaretta and
               Sasitharan Balasubramaniam and
               Mauro Conti},
  title     = {Security Vulnerabilities and Countermeasures for Target Localization
               in Bio-NanoThings Communication Networks},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {4},
  pages     = {665--676},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2015.2505632},
  doi       = {10.1109/TIFS.2015.2505632},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/GiarettaBC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CompagnoCDDPT16,
  author    = {Alberto Compagno and
               Mauro Conti and
               Antonio Alberto D'Amico and
               Gianluca Dini and
               Pericle Perazzo and
               Lorenzo Taponecco},
  title     = {Modeling Enlargement Attacks Against {UWB} Distance Bounding Protocols},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {11},
  number    = {7},
  pages     = {1565--1577},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIFS.2016.2541613},
  doi       = {10.1109/TIFS.2016.2541613},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/CompagnoCDDPT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmicn/CompagnoCD16,
  author    = {Alberto Compagno and
               Mauro Conti and
               Ralph E. Droms},
  title     = {OnboardICNg: a Secure Protocol for On-boarding IoT Devices in {ICN}},
  booktitle = {Proceedings of the 3rd {ACM} Conference on Information-Centric Networking,
               {ICN} '16, Kyoto, Japan, September 26-28, 2016},
  pages     = {166--175},
  year      = {2016},
  crossref  = {DBLP:conf/acmicn/2016},
  url       = {https://doi.org/10.1145/2984356.2984374},
  doi       = {10.1145/2984356.2984374},
  timestamp = {Tue, 06 Nov 2018 16:58:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acmicn/CompagnoCD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ContiGS16,
  author    = {Mauro Conti and
               Claudio Guarisco and
               Riccardo Spolaor},
  title     = {CAPTCHaStar! {A} Novel {CAPTCHA} Based on Interactive Shape Discovery},
  booktitle = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  pages     = {611--628},
  year      = {2016},
  crossref  = {DBLP:conf/acns/2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5\_33},
  doi       = {10.1007/978-3-319-39555-5\_33},
  timestamp = {Fri, 02 Nov 2018 09:42:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/ContiGS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/AriyapalaDANC16,
  author    = {Kanishka Ariyapala and
               Hoang Giang Do and
               Huynh Ngoc Anh and
               Wee Keong Ng and
               Mauro Conti},
  title     = {A Host and Network Based Intrusion Detection for Android Smartphones},
  booktitle = {30th International Conference on Advanced Information Networking and
               Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland,
               March 23-25, 2016},
  pages     = {849--854},
  year      = {2016},
  crossref  = {DBLP:conf/aina/2016w},
  url       = {https://doi.org/10.1109/WAINA.2016.35},
  doi       = {10.1109/WAINA.2016.35},
  timestamp = {Wed, 04 Jul 2018 16:30:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/AriyapalaDANC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/SinhaBFGLC16,
  author    = {Lovely Sinha and
               Shweta Bhandari and
               Parvez Faruki and
               Manoj Singh Gaur and
               Vijay Laxmi and
               Mauro Conti},
  title     = {FlowMine: Android app analysis via data flow},
  booktitle = {13th {IEEE} Annual Consumer Communications {\&} Networking Conference,
               {CCNC} 2016, Las Vegas, NV, USA, January 9-12, 2016},
  pages     = {435--441},
  year      = {2016},
  crossref  = {DBLP:conf/ccnc/2016},
  url       = {https://doi.org/10.1109/CCNC.2016.7444819},
  doi       = {10.1109/CCNC.2016.7444819},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccnc/SinhaBFGLC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ContiNRS16,
  author    = {Mauro Conti and
               Michele Nati and
               Enrico Rotundo and
               Riccardo Spolaor},
  title     = {Mind The Plug! Laptop-User Recognition Through Power Consumption},
  booktitle = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy,
               Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016},
  pages     = {37--44},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016iotpts},
  url       = {https://doi.org/10.1145/2899007.2899009},
  doi       = {10.1145/2899007.2899009},
  timestamp = {Tue, 06 Nov 2018 11:07:30 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ContiNRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmbrosinCINSS16,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Ahmad Ibrahim and
               Gregory Neven and
               Ahmad{-}Reza Sadeghi and
               Matthias Schunter},
  title     = {{SANA:} Secure and Scalable Aggregate Network Attestation},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {731--742},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2978335},
  doi       = {10.1145/2976749.2978335},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AmbrosinCINSS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AmbrosinHMCP16,
  author    = {Moreno Ambrosin and
               Hossein Hosseini and
               Kalikinkar Mandal and
               Mauro Conti and
               Radha Poovendran},
  title     = {Despicable me(ter): Anonymous and fine-grained metering data reporting
               with dishonest meters},
  booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
               2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages     = {163--171},
  year      = {2016},
  crossref  = {DBLP:conf/cns/2016},
  url       = {https://doi.org/10.1109/CNS.2016.7860482},
  doi       = {10.1109/CNS.2016.7860482},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cns/AmbrosinHMCP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/StanciuSCG16,
  author    = {Valeriu{-}Daniel Stanciu and
               Riccardo Spolaor and
               Mauro Conti and
               Cristiano Giuffrida},
  title     = {On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against
               Statistical Attacks},
  booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
               9-11, 2016},
  pages     = {105--112},
  year      = {2016},
  crossref  = {DBLP:conf/codaspy/2016},
  url       = {https://doi.org/10.1145/2857705.2857748},
  doi       = {10.1145/2857705.2857748},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/StanciuSCG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/FarukiZGLC16,
  author    = {Parvez Faruki and
               Akka Zemmari and
               Manoj Singh Gaur and
               Vijay Laxmi and
               Mauro Conti},
  title     = {MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via
               Machine Learning Classifiers},
  booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks Workshops, {DSN} Workshops 2016, Toulouse, France, June
               28 - July 1, 2016},
  pages     = {60--65},
  year      = {2016},
  crossref  = {DBLP:conf/dsn/2016w},
  url       = {https://doi.org/10.1109/DSN-W.2016.33},
  doi       = {10.1109/DSN-W.2016.33},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/FarukiZGLC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/TaylorSCM16,
  author    = {Vincent F. Taylor and
               Riccardo Spolaor and
               Mauro Conti and
               Ivan Martinovic},
  title     = {AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted
               Network Traffic},
  booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages     = {439--454},
  year      = {2016},
  crossref  = {DBLP:conf/eurosp/2016},
  url       = {https://doi.org/10.1109/EuroSP.2016.40},
  doi       = {10.1109/EuroSP.2016.40},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/TaylorSCM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/GangwalGGLC16,
  author    = {Ankit Gangwal and
               Megha Gupta and
               Manoj Singh Gaur and
               Vijay Laxmi and
               Mauro Conti},
  title     = {{ELBA:} Efficient Layer Based Routing Algorithm in {SDN}},
  booktitle = {25th International Conference on Computer Communication and Networks,
               {ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016},
  pages     = {1--7},
  year      = {2016},
  crossref  = {DBLP:conf/icccn/2016},
  url       = {https://doi.org/10.1109/ICCCN.2016.7568515},
  doi       = {10.1109/ICCCN.2016.7568515},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccn/GangwalGGLC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/SturaroSCD16,
  author    = {Agostino Sturaro and
               Simone Silvestri and
               Mauro Conti and
               Sajal K. Das},
  title     = {Towards a realistic model for failure propagation in interdependent
               networks},
  booktitle = {2016 International Conference on Computing, Networking and Communications,
               {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016},
  pages     = {1--7},
  year      = {2016},
  crossref  = {DBLP:conf/iccnc/2016},
  url       = {https://doi.org/10.1109/ICCNC.2016.7440711},
  doi       = {10.1109/ICCNC.2016.7440711},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iccnc/SturaroSCD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/AmbrosinCGD16,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Fabio De Gaspari and
               Nishanth Devarajan},
  title     = {Amplified Distributed Denial of Service Attack in Software Defined
               Networking},
  booktitle = {8th {IFIP} International Conference on New Technologies, Mobility
               and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages     = {1--4},
  year      = {2016},
  crossref  = {DBLP:conf/ntms/2016},
  url       = {https://doi.org/10.1109/NTMS.2016.7792432},
  doi       = {10.1109/NTMS.2016.7792432},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ntms/AmbrosinCGD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/FereidooniCYS16,
  author    = {Hossein Fereidooni and
               Mauro Conti and
               Danfeng Yao and
               Alessandro Sperduti},
  title     = {{ANASTASIA:} ANdroid mAlware detection using STatic analySIs of Applications},
  booktitle = {8th {IFIP} International Conference on New Technologies, Mobility
               and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages     = {1--5},
  year      = {2016},
  crossref  = {DBLP:conf/ntms/2016},
  url       = {https://doi.org/10.1109/NTMS.2016.7792435},
  doi       = {10.1109/NTMS.2016.7792435},
  timestamp = {Thu, 22 Jun 2017 16:10:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ntms/FereidooniCYS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/symbiotic/SpagnolliCGFKW16,
  author    = {Anna Spagnolli and
               Mauro Conti and
               Giorgia Guerra and
               Jonathan Freeman and
               David Kirsh and
               Aimee van Wynsberghe},
  title     = {Adapting the System to Users Based on Implicit Data: Ethical Risks
               and Possible Solutions},
  booktitle = {Symbiotic Interaction - 5th International Workshop, Symbiotic 2016,
               Padua, Italy, September 29-30, 2016, Revised Selected Papers},
  pages     = {5--22},
  year      = {2016},
  crossref  = {DBLP:conf/symbiotic/2016},
  url       = {https://doi.org/10.1007/978-3-319-57753-1\_2},
  doi       = {10.1007/978-3-319-57753-1\_2},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/symbiotic/SpagnolliCGFKW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/SforzinMCB16,
  author    = {Alessandro Sforzin and
               F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and
               Mauro Conti and
               Jens{-}Matthias Bohli},
  title     = {RPiDS: Raspberry Pi {IDS} - {A} Fruitful Intrusion Detection System
               for IoT},
  booktitle = {2016 Intl {IEEE} Conferences on Ubiquitous Intelligence {\&} Computing,
               Advanced and Trusted Computing, Scalable Computing and Communications,
               Cloud and Big Data Computing, Internet of People, and Smart World
               Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France,
               July 18-21, 2016},
  pages     = {440--448},
  year      = {2016},
  crossref  = {DBLP:conf/uic/2016},
  url       = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0080},
  doi       = {10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0080},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uic/SforzinMCB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FernandesPRSCP16,
  author    = {Earlence Fernandes and
               Justin Paupore and
               Amir Rahmati and
               Daniel Simionato and
               Mauro Conti and
               Atul Prakash},
  title     = {FlowFence: Practical Data Protection for Emerging IoT Application
               Frameworks},
  booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016.},
  pages     = {531--548},
  year      = {2016},
  crossref  = {DBLP:conf/uss/2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/fernandes},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/FernandesPRSCP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmbrosinCINSS16,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Ahmad Ibrahim and
               Gregory Neven and
               Ahmad{-}Reza Sadeghi and
               Matthias Schunter},
  title     = {{POSTER:} Toward a Secure and Scalable Attestation},
  booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
               in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
               July 18-22, 2016},
  pages     = {229--230},
  year      = {2016},
  crossref  = {DBLP:conf/wisec/2016},
  url       = {https://doi.org/10.1145/2939918.2942425},
  doi       = {10.1145/2939918.2942425},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/AmbrosinCINSS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/ContiGM16,
  author    = {Mauro Conti and
               Fabio De Gaspari and
               Luigi Vincenzo Mancini},
  title     = {Anonymity in an Electronic Society: {A} Survey},
  booktitle = {Cyber Deception, Building the Scientific Foundation},
  pages     = {285--314},
  year      = {2016},
  crossref  = {DBLP:books/sp/JSSW2016},
  url       = {https://doi.org/10.1007/978-3-319-32699-3\_12},
  doi       = {10.1007/978-3-319-32699-3\_12},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/ContiGM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/FarukiBLGC16,
  author    = {Parvez Faruki and
               Shweta Bhandari and
               Vijay Laxmi and
               Manoj Singh Gaur and
               Mauro Conti},
  title     = {DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis},
  booktitle = {Recent Advances in Computational Intelligence in Defense and Security},
  pages     = {519--552},
  year      = {2016},
  crossref  = {DBLP:series/sci/2016-621},
  url       = {https://doi.org/10.1007/978-3-319-26450-9\_20},
  doi       = {10.1007/978-3-319-26450-9\_20},
  timestamp = {Fri, 02 Nov 2018 09:26:55 +0100},
  biburl    = {https://dblp.org/rec/bib/series/sci/FarukiBLGC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2016,
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5},
  doi       = {10.1007/978-3-319-49806-5},
  isbn      = {978-3-319-49805-8},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiGM16,
  author    = {Mauro Conti and
               Fabio De Gaspari and
               Luigi V. Mancini},
  title     = {Know Your Enemy: Stealth Configuration-Information Gathering in {SDN}},
  journal   = {CoRR},
  volume    = {abs/1608.04766},
  year      = {2016},
  url       = {http://arxiv.org/abs/1608.04766},
  archivePrefix = {arXiv},
  eprint    = {1608.04766},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiGM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SpolaorAMCP16,
  author    = {Riccardo Spolaor and
               Laila Abudahi and
               Veelasha Moonsamy and
               Mauro Conti and
               Radha Poovendran},
  title     = {No Free Charge Theorem: a Covert Channel via {USB} Charging Cable
               on Mobile Devices},
  journal   = {CoRR},
  volume    = {abs/1609.02750},
  year      = {2016},
  url       = {http://arxiv.org/abs/1609.02750},
  archivePrefix = {arXiv},
  eprint    = {1609.02750},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/SpolaorAMCP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiSS16,
  author    = {Mauro Conti and
               Elia Dal Santo and
               Riccardo Spolaor},
  title     = {{DELTA:} Data Extraction and Logging Tool for Android},
  journal   = {CoRR},
  volume    = {abs/1609.02769},
  year      = {2016},
  url       = {http://arxiv.org/abs/1609.02769},
  archivePrefix = {arXiv},
  eprint    = {1609.02769},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiSS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CompagnoCLT16,
  author    = {Alberto Compagno and
               Mauro Conti and
               Daniele Lain and
               Gene Tsudik},
  title     = {Don't Skype {\&} Type! Acoustic Eavesdropping in Voice-Over-IP},
  journal   = {CoRR},
  volume    = {abs/1609.09359},
  year      = {2016},
  url       = {http://arxiv.org/abs/1609.09359},
  archivePrefix = {arXiv},
  eprint    = {1609.09359},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CompagnoCLT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AmbrosinCCGT16,
  author    = {Moreno Ambrosin and
               Alberto Compagno and
               Mauro Conti and
               Cesar Ghali and
               Gene Tsudik},
  title     = {Security and Privacy Analysis of {NSF} Future Internet Architectures},
  journal   = {CoRR},
  volume    = {abs/1610.00355},
  year      = {2016},
  url       = {http://arxiv.org/abs/1610.00355},
  archivePrefix = {arXiv},
  eprint    = {1610.00355},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AmbrosinCCGT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AmbrosinBCL16,
  author    = {Moreno Ambrosin and
               Paolo Braca and
               Mauro Conti and
               Riccardo Lazzeretti},
  title     = {{ODIN:} Obfuscation-based privacy preserving consensus algorithm for
               Decentralized Information fusion in smart device Networks},
  journal   = {CoRR},
  volume    = {abs/1610.06694},
  year      = {2016},
  url       = {http://arxiv.org/abs/1610.06694},
  archivePrefix = {arXiv},
  eprint    = {1610.06694},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AmbrosinBCL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CascavillaBBCM16,
  author    = {Giuseppe Cascavilla and
               Filipe Beato and
               Andrea Burattin and
               Mauro Conti and
               Luigi Vincenzo Mancini},
  title     = {{OSSINT} - Open Source Social Network Intelligence An efficient and
               effective way to uncover "private" information in {OSN}
               profiles},
  journal   = {CoRR},
  volume    = {abs/1611.06737},
  year      = {2016},
  url       = {http://arxiv.org/abs/1611.06737},
  archivePrefix = {arXiv},
  eprint    = {1611.06737},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CascavillaBBCM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AmbrosinACDMRL16,
  author    = {Moreno Ambrosin and
               Arman Anzanpour and
               Mauro Conti and
               Tooska Dargahi and
               Sanaz Rahimi Moosavi and
               Amir{-}Mohammad Rahmani and
               Pasi Liljeberg},
  title     = {On the Feasibility of Attribute-Based Encryption on Internet of Things
               Devices},
  journal   = {CoRR},
  volume    = {abs/1611.08098},
  year      = {2016},
  url       = {http://arxiv.org/abs/1611.08098},
  archivePrefix = {arXiv},
  eprint    = {1611.08098},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AmbrosinACDMRL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BhandariJJLZGC16,
  author    = {Shweta Bhandari and
               Wafa Ben Jaballah and
               Vineeta Jain and
               Vijay Laxmi and
               Akka Zemmari and
               Manoj Singh Gaur and
               Mauro Conti},
  title     = {Android App Collusion Threat and Mitigation Techniques},
  journal   = {CoRR},
  volume    = {abs/1611.10076},
  year      = {2016},
  url       = {http://arxiv.org/abs/1611.10076},
  archivePrefix = {arXiv},
  eprint    = {1611.10076},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/BhandariJJLZGC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FarukiFLCG16,
  author    = {Parvez Faruki and
               Hossein Fereidooni and
               Vijay Laxmi and
               Mauro Conti and
               Manoj Singh Gaur},
  title     = {Android Code Protection via Obfuscation Techniques: Past, Present
               and Future Directions},
  journal   = {CoRR},
  volume    = {abs/1611.10231},
  year      = {2016},
  url       = {http://arxiv.org/abs/1611.10231},
  archivePrefix = {arXiv},
  eprint    = {1611.10231},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/FarukiFLCG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiLMT16,
  author    = {Mauro Conti and
               Giulio Lovisotto and
               Ivan Martinovic and
               Gene Tsudik},
  title     = {{FADEWICH:} Fast Deauthentication over the Wireless Channel},
  journal   = {CoRR},
  volume    = {abs/1612.08593},
  year      = {2016},
  url       = {http://arxiv.org/abs/1612.08593},
  archivePrefix = {arXiv},
  eprint    = {1612.08593},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiLMT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Conti15,
  author    = {Mauro Conti},
  title     = {Secure Wireless Sensor Networks - Threats and Solutions},
  series    = {Advances in Information Security},
  volume    = {65},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-1-4939-3460-7},
  doi       = {10.1007/978-1-4939-3460-7},
  isbn      = {978-1-4939-3458-4},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/ais/Conti15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiRCR15,
  author    = {Fei Li and
               Yogachandran Rahulamathavan and
               Mauro Conti and
               Muttukrishnan Rajarajan},
  title     = {Robust access control framework for mobile cloud computing network},
  journal   = {Computer Communications},
  volume    = {68},
  pages     = {61--72},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.comcom.2015.07.005},
  doi       = {10.1016/j.comcom.2015.07.005},
  timestamp = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/LiRCR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/FarukiBLGGCR15,
  author    = {Parvez Faruki and
               Ammar Bharmal and
               Vijay Laxmi and
               Vijay Ganmoor and
               Manoj Singh Gaur and
               Mauro Conti and
               Muttukrishnan Rajarajan},
  title     = {Android Security: {A} Survey of Issues, Malware Penetration, and Defenses},
  journal   = {{IEEE} Communications Surveys and Tutorials},
  volume    = {17},
  number    = {2},
  pages     = {998--1022},
  year      = {2015},
  url       = {https://doi.org/10.1109/COMST.2014.2386139},
  doi       = {10.1109/COMST.2014.2386139},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comsur/FarukiBLGGCR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NavalLRGC15,
  author    = {Smita Naval and
               Vijay Laxmi and
               Muttukrishnan Rajarajan and
               Manoj Singh Gaur and
               Mauro Conti},
  title     = {Employing Program Semantics for Malware Detection},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {10},
  number    = {12},
  pages     = {2591--2604},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIFS.2015.2469253},
  doi       = {10.1109/TIFS.2015.2469253},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/NavalLRGC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ContiCDNPT15,
  author    = {Mauro Conti and
               Bruno Crispo and
               Daniele Diodati and
               Jukka K. Nurminen and
               Cristina M. Pinotti and
               Taavi Teemaa},
  title     = {Leveraging Parallel Communications for Minimizing Energy Consumption
               on Smartphones},
  journal   = {{IEEE} Trans. Parallel Distrib. Syst.},
  volume    = {26},
  number    = {10},
  pages     = {2778--2790},
  year      = {2015},
  url       = {https://doi.org/10.1109/TPDS.2014.2360693},
  doi       = {10.1109/TPDS.2014.2360693},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tpds/ContiCDNPT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/GuarinoCCPS15,
  author    = {Stefano Guarino and
               Ey{\"{u}}p S. Canlar and
               Mauro Conti and
               Roberto Di Pietro and
               Agusti Solanas},
  title     = {Provable Storage Medium for Data Storage Outsourcing},
  journal   = {{IEEE} Trans. Services Computing},
  volume    = {8},
  number    = {6},
  pages     = {985--997},
  year      = {2015},
  url       = {https://doi.org/10.1109/TSC.2014.2355229},
  doi       = {10.1109/TSC.2014.2355229},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tsc/GuarinoCCPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CompagnoCGMT15,
  author    = {Alberto Compagno and
               Mauro Conti and
               Paolo Gasti and
               Luigi Vincenzo Mancini and
               Gene Tsudik},
  title     = {Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking},
  booktitle = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  pages     = {243--262},
  year      = {2015},
  crossref  = {DBLP:conf/acns/2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7\_12},
  doi       = {10.1007/978-3-319-28166-7\_12},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/CompagnoCGMT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/CascavillaCSY15,
  author    = {Giuseppe Cascavilla and
               Mauro Conti and
               David G. Schwartz and
               Inbal Yahav},
  title     = {Revealing Censored Information Through Comments and Commenters in
               Online Social Networks},
  booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
               in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
               August 25 - 28, 2015},
  pages     = {675--680},
  year      = {2015},
  crossref  = {DBLP:conf/asunam/2015},
  url       = {https://doi.org/10.1145/2808797.2809290},
  doi       = {10.1145/2808797.2809290},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asunam/CascavillaCSY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmbrosinCGP15,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Fabio De Gaspari and
               Radha Poovendran},
  title     = {LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking
               while Effectively Tackling DoS Attacks},
  booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
               2015},
  pages     = {639--644},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015asia},
  url       = {https://doi.org/10.1145/2714576.2714612},
  doi       = {10.1145/2714576.2714612},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AmbrosinCGP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ContiCDFLNLQS15,
  author    = {Mauro Conti and
               Stephen Crane and
               Lucas Davi and
               Michael Franz and
               Per Larsen and
               Marco Negro and
               Christopher Liebchen and
               Mohaned Qunaibit and
               Ahmad{-}Reza Sadeghi},
  title     = {Losing Control: On the Effectiveness of Control-Flow Integrity under
               Stack Attacks},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {952--963},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2813671},
  doi       = {10.1145/2810103.2813671},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ContiCDFLNLQS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/HosseinzadehHCL15,
  author    = {Shohreh Hosseinzadeh and
               Sami Hyrynsalmi and
               Mauro Conti and
               Ville Lepp{\"{a}}nen},
  title     = {Security and Privacy in Cloud Computing via Obfuscation and Diversification:
               {A} Survey},
  booktitle = {7th {IEEE} International Conference on Cloud Computing Technology
               and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December
               3, 2015},
  pages     = {529--535},
  year      = {2015},
  crossref  = {DBLP:conf/cloudcom/2015},
  url       = {https://doi.org/10.1109/CloudCom.2015.29},
  doi       = {10.1109/CloudCom.2015.29},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cloudcom/HosseinzadehHCL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CompagnoCLLM15,
  author    = {Alberto Compagno and
               Mauro Conti and
               Daniele Lain and
               Giulio Lovisotto and
               Luigi Vincenzo Mancini},
  title     = {Boten {ELISA:} {A} novel approach for botnet C{\&}C in Online
               Social Networks},
  booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  pages     = {74--82},
  year      = {2015},
  crossref  = {DBLP:conf/cns/2015},
  url       = {https://doi.org/10.1109/CNS.2015.7346813},
  doi       = {10.1109/CNS.2015.7346813},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/CompagnoCLLM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AriyapalaCP15,
  author    = {Kanishka Ariyapala and
               Mauro Conti and
               Cristina M. Pinotti},
  title     = {CaT: Evaluating cloud-aided {TLS} for smartphone energy efficiency},
  booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  pages     = {601--609},
  year      = {2015},
  crossref  = {DBLP:conf/cns/2015},
  url       = {https://doi.org/10.1109/CNS.2015.7346874},
  doi       = {10.1109/CNS.2015.7346874},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/AriyapalaCP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AmbrosinHMCP15,
  author    = {Moreno Ambrosin and
               Hossein Hosseini and
               Kalikinkar Mandal and
               Mauro Conti and
               Radha Poovendran},
  title     = {Verifiable and privacy-preserving fine-grained data-collection for
               smart metering},
  booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  pages     = {655--658},
  year      = {2015},
  crossref  = {DBLP:conf/cns/2015},
  url       = {https://doi.org/10.1109/CNS.2015.7346882},
  doi       = {10.1109/CNS.2015.7346882},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/AmbrosinHMCP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiDC15,
  author    = {QianQian Li and
               Ding Ding and
               Mauro Conti},
  title     = {Brain-Computer Interface applications: Security and privacy challenges},
  booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  pages     = {663--666},
  year      = {2015},
  crossref  = {DBLP:conf/cns/2015},
  url       = {https://doi.org/10.1109/CNS.2015.7346884},
  doi       = {10.1109/CNS.2015.7346884},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/LiDC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ContiMSV15,
  author    = {Mauro Conti and
               Luigi V. Mancini and
               Riccardo Spolaor and
               Nino Vincenzo Verde},
  title     = {Can't You Hear Me Knocking: Identification of User Actions on Android
               Apps via Traffic Analysis},
  booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security
               and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages     = {297--304},
  year      = {2015},
  crossref  = {DBLP:conf/codaspy/2015},
  url       = {https://doi.org/10.1145/2699026.2699119},
  doi       = {10.1145/2699026.2699119},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/ContiMSV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/HosseinzadehLRH15,
  author    = {Shohreh Hosseinzadeh and
               Samuel Laur{\'{e}}n and
               Sampsa Rauti and
               Sami Hyrynsalmi and
               Mauro Conti and
               Ville Lepp{\"{a}}nen},
  title     = {Obfuscation and Diversification for Securing Cloud Computing},
  booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
               BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  pages     = {179--202},
  year      = {2015},
  crossref  = {DBLP:conf/epsec/2015},
  url       = {https://doi.org/10.1007/978-3-319-54380-2\_8},
  doi       = {10.1007/978-3-319-54380-2\_8},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/epsec/HosseinzadehLRH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/BurattinCT15,
  author    = {Andrea Burattin and
               Mauro Conti and
               Daniele Turato},
  title     = {Toward an Anonymous Process Mining},
  booktitle = {3rd International Conference on Future Internet of Things and Cloud,
               FiCloud 2015, Rome, Italy, August 24-26, 2015},
  pages     = {58--63},
  year      = {2015},
  crossref  = {DBLP:conf/ficloud/2015},
  url       = {https://doi.org/10.1109/FiCloud.2015.9},
  doi       = {10.1109/FiCloud.2015.9},
  timestamp = {Tue, 19 Mar 2019 16:23:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ficloud/BurattinCT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/JaballahCMP15,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Mohamed Mosbah and
               Claudio E. Palazzi},
  title     = {Impact of security threats in vehicular alert messaging systems},
  booktitle = {{IEEE} International Conference on Communication, {ICC} 2015, London,
               United Kingdom, June 8-12, 2015, Workshop Proceedings},
  pages     = {2627--2632},
  year      = {2015},
  crossref  = {DBLP:conf/icc/2015w},
  url       = {https://doi.org/10.1109/ICCW.2015.7247575},
  doi       = {10.1109/ICCW.2015.7247575},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/JaballahCMP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ihci/RabbaniKNC15,
  author    = {Mahdi Rabbani and
               Reza Khoshkangini and
               H. S. Nagendraswamy and
               Mauro Conti},
  title     = {Hand Drawn Optical Circuit Recognition},
  booktitle = {Proceeding of the Seventh International Conference on Intelligent
               Human Computer Interaction, {IHCI} 2015, Allahabad, India, 14-16 December
               2015.},
  pages     = {41--48},
  year      = {2015},
  crossref  = {DBLP:conf/ihci/2015},
  url       = {https://doi.org/10.1016/j.procs.2016.04.064},
  doi       = {10.1016/j.procs.2016.04.064},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ihci/RabbaniKNC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/AmbrosinCD15,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Tooska Dargahi},
  title     = {On the Feasibility of Attribute-Based Encryption on Smartphone Devices},
  booktitle = {Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial
               Systems, IoT-Sys@MobiSys 2015, Florence, Italy, May 18, 2015},
  pages     = {49--54},
  year      = {2015},
  crossref  = {DBLP:conf/mobisys/2015iot-sys},
  url       = {https://doi.org/10.1145/2753476.2753482},
  doi       = {10.1145/2753476.2753482},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/AmbrosinCD15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/GajraniSTLGC15,
  author    = {Jyoti Gajrani and
               Jitendra Sarswat and
               Meenakshi Tripathi and
               Vijay Laxmi and
               Manoj Singh Gaur and
               Mauro Conti},
  title     = {A robust dynamic analysis system preventing SandBox detection by Android
               malware},
  booktitle = {Proceedings of the 8th International Conference on Security of Information
               and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10,
               2015},
  pages     = {290--295},
  year      = {2015},
  crossref  = {DBLP:conf/sin/2015},
  url       = {https://doi.org/10.1145/2799979.2800004},
  doi       = {10.1145/2799979.2800004},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/GajraniSTLGC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MineraudLBCT15,
  author    = {Julien Mineraud and
               Federico Lancerin and
               Sasitharan Balasubramaniam and
               Mauro Conti and
               Sasu Tarkoma},
  title     = {You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing
               Environmental Data},
  booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
               2015, Volume 1},
  pages     = {523--530},
  year      = {2015},
  crossref  = {DBLP:conf/trustcom/2015-1},
  url       = {https://doi.org/10.1109/Trustcom.2015.415},
  doi       = {10.1109/Trustcom.2015.415},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/MineraudLBCT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MemarianCL15,
  author    = {Mohammad Reza Memarian and
               Mauro Conti and
               Ville Lepp{\"{a}}nen},
  title     = {EyeCloud: {A} BotCloud Detection System},
  booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
               2015, Volume 1},
  pages     = {1067--1072},
  year      = {2015},
  crossref  = {DBLP:conf/trustcom/2015-1},
  url       = {https://doi.org/10.1109/Trustcom.2015.484},
  doi       = {10.1109/Trustcom.2015.484},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/MemarianCL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ContiCPS15,
  author    = {Mauro Conti and
               Vittoria Cozza and
               Marinella Petrocchi and
               Angelo Spognardi},
  title     = {{TRAP:} Using Targeted ads to unveil Google personal profiles},
  booktitle = {2015 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages     = {1--6},
  year      = {2015},
  crossref  = {DBLP:conf/wifs/2015},
  url       = {https://doi.org/10.1109/WIFS.2015.7368607},
  doi       = {10.1109/WIFS.2015.7368607},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/ContiCPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/DingCF15,
  author    = {Ding Ding and
               Mauro Conti and
               Renato Figueiredo},
  title     = {Impact of country-scale Internet disconnection on structured and social
               {P2P} overlays},
  booktitle = {16th {IEEE} International Symposium on {A} World of Wireless, Mobile
               and Multimedia Networks, WoWMoM 2015, Boston, MA, USA, June 14-17,
               2015},
  pages     = {1--9},
  year      = {2015},
  crossref  = {DBLP:conf/wowmom/2015},
  url       = {https://doi.org/10.1109/WoWMoM.2015.7158168},
  doi       = {10.1109/WoWMoM.2015.7158168},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/DingCF15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/PerazzoACD15,
  author    = {Pericle Perazzo and
               Kanishka Ariyapala and
               Mauro Conti and
               Gianluca Dini},
  title     = {The verifier bee: {A} path planner for drone-based secure location
               verification},
  booktitle = {16th {IEEE} International Symposium on {A} World of Wireless, Mobile
               and Multimedia Networks, WoWMoM 2015, Boston, MA, USA, June 14-17,
               2015},
  pages     = {1--9},
  year      = {2015},
  crossref  = {DBLP:conf/wowmom/2015},
  url       = {https://doi.org/10.1109/WoWMoM.2015.7158150},
  doi       = {10.1109/WoWMoM.2015.7158150},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/PerazzoACD15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/ContiPM15,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luciana Marconi},
  title     = {Privacy for LBSs: On Using a Footprint Model to Face the Enemy},
  booktitle = {Advanced Research in Data Privacy},
  pages     = {169--195},
  year      = {2015},
  crossref  = {DBLP:series/sci/2015-567},
  url       = {https://doi.org/10.1007/978-3-319-09885-2\_10},
  doi       = {10.1007/978-3-319-09885-2\_10},
  timestamp = {Fri, 09 Jun 2017 11:04:39 +0200},
  biburl    = {https://dblp.org/rec/bib/series/sci/ContiPM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2015,
  editor    = {Mauro Conti and
               Matthias Schunter and
               Ioannis G. Askoxylakis},
  title     = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
               2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9229},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-22846-4},
  doi       = {10.1007/978-3-319-22846-4},
  isbn      = {978-3-319-22845-7},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AmbrosinCGP15,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Fabio De Gaspari and
               Radha Poovendran},
  title     = {LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking
               while Effectively Tackling DoS Attacks},
  journal   = {CoRR},
  volume    = {abs/1502.02234},
  year      = {2015},
  url       = {http://arxiv.org/abs/1502.02234},
  archivePrefix = {arXiv},
  eprint    = {1502.02234},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AmbrosinCGP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiGS15,
  author    = {Mauro Conti and
               Claudio Guarisco and
               Riccardo Spolaor},
  title     = {CAPTCHaStar! {A} novel {CAPTCHA} based on interactive shape discovery},
  journal   = {CoRR},
  volume    = {abs/1503.00561},
  year      = {2015},
  url       = {http://arxiv.org/abs/1503.00561},
  archivePrefix = {arXiv},
  eprint    = {1503.00561},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiGS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CompagnoCGT15,
  author    = {Alberto Compagno and
               Mauro Conti and
               Cesar Ghali and
               Gene Tsudik},
  title     = {To {NACK} or not to NACK? Negative Acknowledgments in Information-Centric
               Networking},
  journal   = {CoRR},
  volume    = {abs/1503.02123},
  year      = {2015},
  url       = {http://arxiv.org/abs/1503.02123},
  archivePrefix = {arXiv},
  eprint    = {1503.02123},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CompagnoCGT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AmbrosinCD15,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Tooska Dargahi},
  title     = {On the Feasibility of Attribute-Based Encryption on Smartphone Devices},
  journal   = {CoRR},
  volume    = {abs/1504.00619},
  year      = {2015},
  url       = {http://arxiv.org/abs/1504.00619},
  archivePrefix = {arXiv},
  eprint    = {1504.00619},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AmbrosinCD15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiCPS15,
  author    = {Mauro Conti and
               Vittoria Cozza and
               Marinella Petrocchi and
               Angelo Spognardi},
  title     = {{TRAP:} using TaRgeted Ads to unveil Google personal Profiles},
  journal   = {CoRR},
  volume    = {abs/1510.04031},
  year      = {2015},
  url       = {http://arxiv.org/abs/1510.04031},
  archivePrefix = {arXiv},
  eprint    = {1510.04031},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiCPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SturaroSCD15,
  author    = {Agostino Sturaro and
               Simone Silvestri and
               Mauro Conti and
               Sajal K. Das},
  title     = {Towards a Realistic Model for Failure Propagation in Interdependent
               Networks},
  journal   = {CoRR},
  volume    = {abs/1510.08380},
  year      = {2015},
  url       = {http://arxiv.org/abs/1510.08380},
  archivePrefix = {arXiv},
  eprint    = {1510.08380},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/SturaroSCD15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SomaniGSCB15,
  author    = {Gaurav Somani and
               Manoj Singh Gaur and
               Dheeraj Sanghi and
               Mauro Conti and
               Rajkumar Buyya},
  title     = {DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions},
  journal   = {CoRR},
  volume    = {abs/1512.08187},
  year      = {2015},
  url       = {http://arxiv.org/abs/1512.08187},
  archivePrefix = {arXiv},
  eprint    = {1512.08187},
  timestamp = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/SomaniGSCB15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/SolanasPCVRFPPPPM14,
  author    = {Agusti Solanas and
               Constantinos Patsakis and
               Mauro Conti and
               Ioannis S. Vlachos and
               Victoria Ramos and
               Francisco Falcone and
               Octavian Postolache and
               Pablo A. P{\'{e}}rez{-}Mart{\'{\i}}nez and
               Roberto Di Pietro and
               Despina N. Perrea and
               Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}}},
  title     = {Smart health: {A} context-aware health paradigm within smart cities},
  journal   = {{IEEE} Communications Magazine},
  volume    = {52},
  number    = {8},
  pages     = {74--81},
  year      = {2014},
  url       = {https://doi.org/10.1109/MCOM.2014.6871673},
  doi       = {10.1109/MCOM.2014.6871673},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cm/SolanasPCVRFPPPPM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/JaballahCMP14,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Mohamed Mosbah and
               Claudio E. Palazzi},
  title     = {A secure alert messaging system for safe driving},
  journal   = {Computer Communications},
  volume    = {46},
  pages     = {29--42},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.comcom.2014.03.010},
  doi       = {10.1016/j.comcom.2014.03.010},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/JaballahCMP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ContiPS14,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Angelo Spognardi},
  title     = {Clone wars: Distributed detection of clone attacks in mobile WSNs},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {80},
  number    = {3},
  pages     = {654--669},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.jcss.2013.06.017},
  doi       = {10.1016/j.jcss.2013.06.017},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcss/ContiPS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhauniarovichRCCF14,
  author    = {Yury Zhauniarovich and
               Giovanni Russello and
               Mauro Conti and
               Bruno Crispo and
               Earlence Fernandes},
  title     = {{MOSES:} Supporting and Enforcing Security Profiles on Smartphones},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {211--223},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2014.2300482},
  doi       = {10.1109/TDSC.2014.2300482},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/ZhauniarovichRCCF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RoyCSJ14,
  author    = {Sankardas Roy and
               Mauro Conti and
               Sanjeev Setia and
               Sushil Jajodia},
  title     = {Secure Data Aggregation in Wireless Sensor Networks: Filtering out
               the Attacker's Impact},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {9},
  number    = {4},
  pages     = {681--694},
  year      = {2014},
  url       = {https://doi.org/10.1109/TIFS.2014.2307197},
  doi       = {10.1109/TIFS.2014.2307197},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/RoyCSJ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/JaballahCMP14,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Mohamed Mosbah and
               Claudio E. Palazzi},
  title     = {Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication},
  journal   = {{IEEE} Trans. Intelligent Transportation Systems},
  volume    = {15},
  number    = {1},
  pages     = {433--450},
  year      = {2014},
  url       = {https://doi.org/10.1109/TITS.2013.2277890},
  doi       = {10.1109/TITS.2013.2277890},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tits/JaballahCMP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ArdagnaCLS14,
  author    = {Claudio Agostino Ardagna and
               Mauro Conti and
               Mario Leone and
               Julinda Stefa},
  title     = {An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments},
  journal   = {{IEEE} Trans. Services Computing},
  volume    = {7},
  number    = {3},
  pages     = {373--386},
  year      = {2014},
  url       = {https://doi.org/10.1109/TSC.2014.2304717},
  doi       = {10.1109/TSC.2014.2304717},
  timestamp = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tsc/ArdagnaCLS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmbrosinCGT14,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Paolo Gasti and
               Gene Tsudik},
  title     = {Covert ephemeral communication in named data networking},
  booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages     = {15--26},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014asia},
  url       = {https://doi.org/10.1145/2590296.2590306},
  doi       = {10.1145/2590296.2590306},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AmbrosinCGT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ContiFPPS14,
  author    = {Mauro Conti and
               Earlence Fernandes and
               Justin Paupore and
               Atul Prakash and
               Daniel Simionato},
  title     = {{OASIS:} Operational Access Sandboxes for Information Security},
  booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones
               {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November
               03 - 07, 2014},
  pages     = {105--110},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014spsm},
  url       = {https://doi.org/10.1145/2666620.2666629},
  doi       = {10.1145/2666620.2666629},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ContiFPPS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BeatoCPV14,
  author    = {Filipe Beato and
               Mauro Conti and
               Bart Preneel and
               Dario Vettore},
  title     = {VirtualFriendship: Hiding interactions on Online Social Networks},
  booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
               San Francisco, CA, USA, October 29-31, 2014},
  pages     = {328--336},
  year      = {2014},
  crossref  = {DBLP:conf/cns/2014},
  url       = {https://doi.org/10.1109/CNS.2014.6997501},
  doi       = {10.1109/CNS.2014.6997501},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/BeatoCPV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BurattinCC14,
  author    = {Andrea Burattin and
               Giuseppe Cascavilla and
               Mauro Conti},
  title     = {SocialSpy: Browsing (Supposedly) Hidden Information in Online Social
               Networks},
  booktitle = {Risks and Security of Internet and Systems - 9th International Conference,
               CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
  pages     = {83--99},
  year      = {2014},
  crossref  = {DBLP:conf/crisis/2014},
  url       = {https://doi.org/10.1007/978-3-319-17127-2\_6},
  doi       = {10.1007/978-3-319-17127-2\_6},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/BurattinCC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GiuffridaMCB14,
  author    = {Cristiano Giuffrida and
               Kamil Majdanik and
               Mauro Conti and
               Herbert Bos},
  title     = {I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced
               Keystroke Dynamics},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
               2014. Proceedings},
  pages     = {92--111},
  year      = {2014},
  crossref  = {DBLP:conf/dimva/2014},
  url       = {https://doi.org/10.1007/978-3-319-08509-8\_6},
  doi       = {10.1007/978-3-319-08509-8\_6},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/GiuffridaMCB14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AmbrosinBCSS14,
  author    = {Moreno Ambrosin and
               Christoph Busold and
               Mauro Conti and
               Ahmad{-}Reza Sadeghi and
               Matthias Schunter},
  title     = {Updaticator: Updating Billions of Devices by an Efficient, Scalable
               and Secure Software Update Distribution over Untrusted Cache-enabled
               Networks},
  booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {I}},
  pages     = {76--93},
  year      = {2014},
  crossref  = {DBLP:conf/esorics/2014-1},
  url       = {https://doi.org/10.1007/978-3-319-11203-9\_5},
  doi       = {10.1007/978-3-319-11203-9\_5},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/AmbrosinBCSS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NavalLGRRC14,
  author    = {Smita Naval and
               Vijay Laxmi and
               Manoj Singh Gaur and
               Sachin Raja and
               Muttukrishnan Rajarajan and
               Mauro Conti},
  title     = {Environment-Reactive Malware Behavior: Detection and Categorization},
  booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security
               Assurance - 9th International Workshop, {DPM} 2014, 7th International
               Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
               Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  pages     = {167--182},
  year      = {2014},
  crossref  = {DBLP:conf/esorics/2014-8872},
  url       = {https://doi.org/10.1007/978-3-319-17016-9\_11},
  doi       = {10.1007/978-3-319-17016-9\_11},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/NavalLGRRC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Suarez-TangilCTP14,
  author    = {Guillermo Suarez{-}Tangil and
               Mauro Conti and
               Juan E. Tapiador and
               Pedro Peris{-}Lopez},
  title     = {Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic
               Models},
  booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {I}},
  pages     = {183--201},
  year      = {2014},
  crossref  = {DBLP:conf/esorics/2014-1},
  url       = {https://doi.org/10.1007/978-3-319-11203-9\_11},
  doi       = {10.1007/978-3-319-11203-9\_11},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/Suarez-TangilCTP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanaousisAFC14,
  author    = {Emmanouil A. Panaousis and
               Tansu Alpcan and
               Hossein Fereidooni and
               Mauro Conti},
  title     = {Secure Message Delivery Games for Device-to-Device Communications},
  booktitle = {Decision and Game Theory for Security - 5th International Conference,
               GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  pages     = {195--215},
  year      = {2014},
  crossref  = {DBLP:conf/gamesec/2014},
  url       = {https://doi.org/10.1007/978-3-319-12601-2\_11},
  doi       = {10.1007/978-3-319-12601-2\_11},
  timestamp = {Tue, 23 May 2017 01:06:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/PanaousisAFC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SainiGLSC14,
  author    = {Anil Saini and
               Manoj Singh Gaur and
               Vijay Laxmi and
               Tushar Singhal and
               Mauro Conti},
  title     = {Privacy Leakage Attacks in Browsers by Colluding Extensions},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  pages     = {257--276},
  year      = {2014},
  crossref  = {DBLP:conf/iciss/2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_15},
  doi       = {10.1007/978-3-319-13841-1\_15},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/SainiGLSC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/FarukiKBGLC14,
  author    = {Parvez Faruki and
               Vijay Kumar and
               Ammar Bharmal and
               Manoj Singh Gaur and
               Vijay Laxmi and
               Mauro Conti},
  title     = {Platform Neutral Sandbox for Analyzing Malware and Resource Hogger
               Apps},
  booktitle = {International Conference on Security and Privacy in Communication
               Networks - 10th International {ICST} Conference, SecureComm 2014,
               Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
               {I}},
  pages     = {556--560},
  year      = {2014},
  crossref  = {DBLP:conf/securecomm/2014-1},
  url       = {https://doi.org/10.1007/978-3-319-23829-6\_43},
  doi       = {10.1007/978-3-319-23829-6\_43},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/FarukiKBGLC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FarukiBLGCR14,
  author    = {Parvez Faruki and
               Ammar Bharmal and
               Vijay Laxmi and
               Manoj Singh Gaur and
               Mauro Conti and
               Muttukrishnan Rajarajan},
  title     = {Evaluation of Android Anti-malware Techniques against Dalvik Bytecode
               Obfuscation},
  booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2014, Beijing, China, September
               24-26, 2014},
  pages     = {414--421},
  year      = {2014},
  crossref  = {DBLP:conf/trustcom/2014},
  url       = {https://doi.org/10.1109/TrustCom.2014.54},
  doi       = {10.1109/TrustCom.2014.54},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/FarukiBLGCR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wuwnet/TosoMCZ14,
  author    = {Giovanni Toso and
               Daniele Munaretto and
               Mauro Conti and
               Michele Zorzi},
  title     = {Attack Resilient Underwater Networks Through Software Defined Networking},
  booktitle = {Proceedings of the International Conference on Underwater Networks
               {\&} Systems, Rome, Italy, November 12 - 14, 2014},
  pages     = {44:1--44:2},
  year      = {2014},
  crossref  = {DBLP:conf/wuwnet/2014},
  url       = {https://doi.org/10.1145/2671490.2674589},
  doi       = {10.1145/2671490.2674589},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wuwnet/TosoMCZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BurattinCC14,
  author    = {Andrea Burattin and
               Giuseppe Cascavilla and
               Mauro Conti},
  title     = {SocialSpy: Browsing (Supposedly) Hidden Information in Online Social
               Networks},
  journal   = {CoRR},
  volume    = {abs/1406.3216},
  year      = {2014},
  url       = {http://arxiv.org/abs/1406.3216},
  archivePrefix = {arXiv},
  eprint    = {1406.3216},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/BurattinCC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiMSV14,
  author    = {Mauro Conti and
               Luigi V. Mancini and
               Riccardo Spolaor and
               Nino Vincenzo Verde},
  title     = {Can't you hear me knocking: Identification of user actions on Android
               apps via traffic analysis},
  journal   = {CoRR},
  volume    = {abs/1407.7844},
  year      = {2014},
  url       = {http://arxiv.org/abs/1407.7844},
  archivePrefix = {arXiv},
  eprint    = {1407.7844},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiMSV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ContiGT13,
  author    = {Mauro Conti and
               Paolo Gasti and
               Marco Teoli},
  title     = {A lightweight mechanism for detection of cache pollution attacks in
               Named Data Networking},
  journal   = {Computer Networks},
  volume    = {57},
  number    = {16},
  pages     = {3178--3191},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.comnet.2013.07.034},
  doi       = {10.1016/j.comnet.2013.07.034},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/ContiGT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ContiWC13,
  author    = {Mauro Conti and
               Jeroen Willemsen and
               Bruno Crispo},
  title     = {Providing Source Location Privacy in Wireless Sensor Networks: {A}
               Survey},
  journal   = {{IEEE} Communications Surveys and Tutorials},
  volume    = {15},
  number    = {3},
  pages     = {1238--1280},
  year      = {2013},
  url       = {https://doi.org/10.1109/SURV.2013.011413.00118},
  doi       = {10.1109/SURV.2013.011413.00118},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comsur/ContiWC13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CanlarCCP13,
  author    = {Ey{\"{u}}p S. Canlar and
               Mauro Conti and
               Bruno Crispo and
               Roberto Di Pietro},
  title     = {Windows Mobile LiveSD Forensics},
  journal   = {J. Network and Computer Applications},
  volume    = {36},
  number    = {2},
  pages     = {677--684},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.jnca.2012.12.024},
  doi       = {10.1016/j.jnca.2012.12.024},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/CanlarCCP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/0004ZCPJM13,
  author    = {Lei Zhang and
               Honggang Zhang and
               Mauro Conti and
               Roberto Di Pietro and
               Sushil Jajodia and
               Luigi Vincenzo Mancini},
  title     = {Preserving privacy against external and internal threats in {WSN}
               data aggregation},
  journal   = {Telecommunication Systems},
  volume    = {52},
  number    = {4},
  pages     = {2163--2176},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11235-011-9539-8},
  doi       = {10.1007/s11235-011-9539-8},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/telsys/0004ZCPJM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FernandesCC13,
  author    = {Earlence Fernandes and
               Bruno Crispo and
               Mauro Conti},
  title     = {{FM} 99.9, Radio Virus: Exploiting {FM} Radio Broadcasts for Malware
               Deployment},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {8},
  number    = {6},
  pages     = {1027--1037},
  year      = {2013},
  url       = {https://doi.org/10.1109/TIFS.2013.2259818},
  doi       = {10.1109/TIFS.2013.2259818},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/FernandesCC13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RochaCEC13,
  author    = {Bruno P. S. Rocha and
               Mauro Conti and
               Sandro Etalle and
               Bruno Crispo},
  title     = {Hybrid Static-Runtime Information Flow and Declassification Enforcement},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {8},
  number    = {8},
  pages     = {1294--1305},
  year      = {2013},
  url       = {https://doi.org/10.1109/TIFS.2013.2267798},
  doi       = {10.1109/TIFS.2013.2267798},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/RochaCEC13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/ContiHC13,
  author    = {Mauro Conti and
               Arbnor Hasani and
               Bruno Crispo},
  title     = {Virtual private social networks and a facebook implementation},
  journal   = {{TWEB}},
  volume    = {7},
  number    = {3},
  pages     = {14:1--14:31},
  year      = {2013},
  url       = {https://doi.org/10.1145/2516633.2516636},
  doi       = {10.1145/2516633.2516636},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tweb/ContiHC13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/CanlarCCP13,
  author    = {Ey{\"{u}}p S. Canlar and
               Mauro Conti and
               Bruno Crispo and
               Roberto Di Pietro},
  title     = {{CREPUSCOLO:} {A} collusion resistant privacy preserving location
               verification system},
  booktitle = {2013 International Conference on Risks and Security of Internet and
               Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages     = {1--9},
  year      = {2013},
  crossref  = {DBLP:conf/crisis/2013},
  url       = {https://doi.org/10.1109/CRiSIS.2013.6766357},
  doi       = {10.1109/CRiSIS.2013.6766357},
  timestamp = {Wed, 06 Feb 2019 10:30:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/CanlarCCP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/JaballahCPMV13,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Roberto Di Pietro and
               Mohamed Mosbah and
               Nino Vincenzo Verde},
  title     = {{MASS:} An efficient and secure broadcast authentication scheme for
               resource constrained devices},
  booktitle = {2013 International Conference on Risks and Security of Internet and
               Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages     = {1--6},
  year      = {2013},
  crossref  = {DBLP:conf/crisis/2013},
  url       = {https://doi.org/10.1109/CRiSIS.2013.6766350},
  doi       = {10.1109/CRiSIS.2013.6766350},
  timestamp = {Wed, 06 Feb 2019 10:30:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/JaballahCPMV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/AriyapalaCK13,
  author    = {Kanishka Ariyapala and
               Mauro Conti and
               Chamath Keppitiyagama},
  title     = {ContextOS: {A} Context Aware Operating System for Mobile Devices},
  booktitle = {2013 {IEEE} International Conference on Green Computing and Communications
               (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber,
               Physical and Social Computing (CPSCom), Beijing, China, August 20-23,
               2013},
  pages     = {976--984},
  year      = {2013},
  crossref  = {DBLP:conf/greencom/2013},
  url       = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.168},
  doi       = {10.1109/GreenCom-iThings-CPSCom.2013.168},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/greencom/AriyapalaCK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ArdagnaCLS13,
  author    = {Claudio Agostino Ardagna and
               Mauro Conti and
               Mario Leone and
               Julinda Stefa},
  title     = {Preserving Smartphone Users' Anonymity in Cloudy Days},
  booktitle = {22nd International Conference on Computer Communication and Networks,
               {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
  pages     = {1--5},
  year      = {2013},
  crossref  = {DBLP:conf/icccn/2013},
  url       = {https://doi.org/10.1109/ICCCN.2013.6614170},
  doi       = {10.1109/ICCCN.2013.6614170},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccn/ArdagnaCLS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/JaballahCMP13,
  author    = {Wafa Ben Jaballah and
               Mauro Conti and
               Mohamed Mosbah and
               Claudio E. Palazzi},
  title     = {Secure Verification of Location Claims on a Vehicular Safety Application},
  booktitle = {22nd International Conference on Computer Communication and Networks,
               {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
  pages     = {1--7},
  year      = {2013},
  crossref  = {DBLP:conf/icccn/2013},
  url       = {https://doi.org/10.1109/ICCCN.2013.6614193},
  doi       = {10.1109/ICCCN.2013.6614193},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccn/JaballahCMP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/AcsCGGT13,
  author    = {Gergely {\'{A}}cs and
               Mauro Conti and
               Paolo Gasti and
               Cesar Ghali and
               Gene Tsudik},
  title     = {Cache Privacy in Named-Data Networking},
  booktitle = {{IEEE} 33rd International Conference on Distributed Computing Systems,
               {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}},
  pages     = {41--51},
  year      = {2013},
  crossref  = {DBLP:conf/icdcs/2013},
  url       = {https://doi.org/10.1109/ICDCS.2013.12},
  doi       = {10.1109/ICDCS.2013.12},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/AcsCGGT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/CompagnoCGT13,
  author    = {Alberto Compagno and
               Mauro Conti and
               Paolo Gasti and
               Gene Tsudik},
  title     = {Poseidon: Mitigating interest flooding DDoS attacks in Named Data
               Networking},
  booktitle = {38th Annual {IEEE} Conference on Local Computer Networks, Sydney,
               Australia, October 21-24, 2013},
  pages     = {630--638},
  year      = {2013},
  crossref  = {DBLP:conf/lcn/2013},
  url       = {https://doi.org/10.1109/LCN.2013.6761300},
  doi       = {10.1109/LCN.2013.6761300},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/CompagnoCGT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BeatoCP13,
  author    = {Filipe Beato and
               Mauro Conti and
               Bart Preneel},
  title     = {Friend in the Middle (FiM): Tackling de-anonymization in social networks},
  booktitle = {2013 {IEEE} International Conference on Pervasive Computing and Communications
               Workshops, {PERCOM} 2013 Workshops, San Diego, CA, USA, March 18-22,
               2013},
  pages     = {279--284},
  year      = {2013},
  crossref  = {DBLP:conf/percom/2013w},
  url       = {https://doi.org/10.1109/PerComW.2013.6529495},
  doi       = {10.1109/PerComW.2013.6529495},
  timestamp = {Thu, 14 Feb 2019 15:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/percom/BeatoCP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ContiDG13,
  author    = {Mauro Conti and
               Nicola Dragoni and
               Sebastiano Gottardo},
  title     = {{MITHYS:} Mind The Hand You Shake - Protecting Mobile Devices from
               {SSL} Usage Vulnerabilities},
  booktitle = {Security and Trust Management - 9th International Workshop, {STM}
               2013, Egham, UK, September 12-13, 2013. Proceedings},
  pages     = {65--81},
  year      = {2013},
  crossref  = {DBLP:conf/stm/2013},
  url       = {https://doi.org/10.1007/978-3-642-41098-7\_5},
  doi       = {10.1007/978-3-642-41098-7\_5},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stm/ContiDG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wd/AmbrosinBCGP13,
  author    = {Moreno Ambrosin and
               Armir Bujari and
               Mauro Conti and
               Fabio De Gaspari and
               Claudio E. Palazzi},
  title     = {Smartphone and Laptop Frameworks for vehicular networking experimentation},
  booktitle = {Proceedings of the {IFIP} Wireless Days, {WD} 2013, Valencia, Spain,
               November 13-15, 2013},
  pages     = {1--6},
  year      = {2013},
  crossref  = {DBLP:conf/wd/2013},
  url       = {https://doi.org/10.1109/WD.2013.6686481},
  doi       = {10.1109/WD.2013.6686481},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wd/AmbrosinBCGP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2013,
  editor    = {Bruno Crispo and
               Ravi S. Sandhu and
               Nora Cuppens{-}Boulahia and
               Mauro Conti and
               Jean{-}Louis Lanet},
  title     = {2013 International Conference on Risks and Security of Internet and
               Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6749561},
  timestamp = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2013,
  editor    = {Mauro Conti and
               Jaideep Vaidya and
               Andreas Schaad},
  title     = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '13, Amsterdam, The Netherlands, June 12-14, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2462410},
  doi       = {10.1145/2462410},
  isbn      = {978-1-4503-1950-8},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-4823,
  author    = {Alberto Compagno and
               Mauro Conti and
               Paolo Gasti and
               Gene Tsudik},
  title     = {Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data
               Networking},
  journal   = {CoRR},
  volume    = {abs/1303.4823},
  year      = {2013},
  url       = {http://arxiv.org/abs/1303.4823},
  archivePrefix = {arXiv},
  eprint    = {1303.4823},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1303-4823},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ContiDG13,
  author    = {Mauro Conti and
               Nicola Dragoni and
               Sebastiano Gottardo},
  title     = {{MITHYS:} Mind The Hand You Shake - Protecting mobile devices from
               {SSL} usage vulnerabilities},
  journal   = {CoRR},
  volume    = {abs/1306.6729},
  year      = {2013},
  url       = {http://arxiv.org/abs/1306.6729},
  archivePrefix = {arXiv},
  eprint    = {1306.6729},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/ContiDG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AmbrosinCGT13,
  author    = {Moreno Ambrosin and
               Mauro Conti and
               Paolo Gasti and
               Gene Tsudik},
  title     = {Covert Ephemeral Communication in Named Data Networking},
  journal   = {CoRR},
  volume    = {abs/1311.2517},
  year      = {2013},
  url       = {http://arxiv.org/abs/1311.2517},
  archivePrefix = {arXiv},
  eprint    = {1311.2517},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AmbrosinCGT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RoyCSJ12,
  author    = {Sankardas Roy and
               Mauro Conti and
               Sanjeev Setia and
               Sushil Jajodia},
  title     = {Secure Data Aggregation in Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {7},
  number    = {3},
  pages     = {1040--1052},
  year      = {2012},
  url       = {https://doi.org/10.1109/TIFS.2012.2189568},
  doi       = {10.1109/TIFS.2012.2189568},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/RoyCSJ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ContiCFZ12,
  author    = {Mauro Conti and
               Bruno Crispo and
               Earlence Fernandes and
               Yury Zhauniarovich},
  title     = {CR{\^{e}}PE: {A} System for Enforcing Fine-Grained Context-Related
               Policies on Android},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {7},
  number    = {5},
  pages     = {1426--1438},
  year      = {2012},
  url       = {https://doi.org/10.1109/TIFS.2012.2204249},
  doi       = {10.1109/TIFS.2012.2204249},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/ContiCFZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/ContiPS12,
  author    = {Mauro Conti and
               Radha Poovendran and
               Marco Secchiero},
  title     = {FakeBook: Detecting Fake Profiles in On-Line Social Networks},
  booktitle = {International Conference on Advances in Social Networks Analysis and
               Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012},
  pages     = {1071--1078},
  year      = {2012},
  crossref  = {DBLP:conf/asunam/2012},
  url       = {https://doi.org/10.1109/ASONAM.2012.185},
  doi       = {10.1109/ASONAM.2012.185},
  timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asunam/ContiPS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RusselloCCFZ12,
  author    = {Giovanni Russello and
               Mauro Conti and
               Bruno Crispo and
               Earlence Fernandes and
               Yury Zhauniarovich},
  title     = {Demonstrating the effectiveness of {MOSES} for separation of execution
               modes},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {998--1000},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382304},
  doi       = {10.1145/2382196.2382304},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/RusselloCCFZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/ContiDPC12,
  author    = {Mauro Conti and
               Daniele Diodati and
               Cristina M. Pinotti and
               Bruno Crispo},
  title     = {Optimal Solutions for Pairing Services on Smartphones: {A} Strategy
               to Minimize Energy Consumption},
  booktitle = {2012 {IEEE} International Conference on Green Computing and Communications,
               Conference on Internet of Things, and Conference on Cyber, Physical
               and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France,
               November 20-23, 2012},
  pages     = {269--276},
  year      = {2012},
  crossref  = {DBLP:conf/greencom/2012},
  url       = {https://doi.org/10.1109/GreenCom.2012.51},
  doi       = {10.1109/GreenCom.2012.51},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/greencom/ContiDPC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/ContiPS12,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Angelo Spognardi},
  title     = {Wireless Sensor Replica Detection in Mobile Environments},
  booktitle = {Distributed Computing and Networking - 13th International Conference,
               {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings},
  pages     = {249--264},
  year      = {2012},
  crossref  = {DBLP:conf/icdcn/2012},
  url       = {https://doi.org/10.1007/978-3-642-25959-3\_19},
  doi       = {10.1007/978-3-642-25959-3\_19},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcn/ContiPS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/RusselloCCF12,
  author    = {Giovanni Russello and
               Mauro Conti and
               Bruno Crispo and
               Earlence Fernandes},
  title     = {{MOSES:} supporting operation modes on smartphones},
  booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages     = {3--12},
  year      = {2012},
  crossref  = {DBLP:conf/sacmat/2012},
  url       = {https://doi.org/10.1145/2295136.2295140},
  doi       = {10.1145/2295136.2295140},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/RusselloCCF12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CanlarCCP12,
  author    = {Ey{\"{u}}p S. Canlar and
               Mauro Conti and
               Bruno Crispo and
               Roberto Di Pietro},
  title     = {Sense-And-Trace: {A} Privacy Preserving Distributed Geolocation Tracking
               System},
  booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge,
               UK, April 12-13, 2012, Revised Selected Papers},
  pages     = {199--213},
  year      = {2012},
  crossref  = {DBLP:conf/spw/2012},
  url       = {https://doi.org/10.1007/978-3-642-35694-0\_22},
  doi       = {10.1007/978-3-642-35694-0\_22},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/CanlarCCP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Conti12,
  author    = {Mauro Conti},
  title     = {Sense-And-Trace: {A} Privacy Preserving Distributed Geolocation Tracking
               System (Transcript of Discussion)},
  booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge,
               UK, April 12-13, 2012, Revised Selected Papers},
  pages     = {214--222},
  year      = {2012},
  crossref  = {DBLP:conf/spw/2012},
  url       = {https://doi.org/10.1007/978-3-642-35694-0\_23},
  doi       = {10.1007/978-3-642-35694-0\_23},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/Conti12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ContiPS11,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Angelo Spognardi},
  title     = {"Who Counterfeited My Viagra?" Probabilistic Item Removal
               Detection via {RFID} Tag Cooperation},
  journal   = {{EURASIP} J. Wireless Comm. and Networking},
  volume    = {2011},
  year      = {2011},
  url       = {https://doi.org/10.1155/2011/575171},
  doi       = {10.1155/2011/575171},
  timestamp = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejwcn/ContiPS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MarconiCP11,
  author    = {Luciana Marconi and
               Mauro Conti and
               Roberto Di Pietro},
  title     = {{CASSANDRA:} a probabilistic, efficient, and privacy-preserving solution
               to compute set intersection},
  journal   = {Int. J. Inf. Sec.},
  volume    = {10},
  number    = {5},
  pages     = {301--319},
  year      = {2011},
  url       = {https://doi.org/10.1007/s10207-011-0133-6},
  doi       = {10.1007/s10207-011-0133-6},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/MarconiCP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ContiPGM11,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Andrea Gabrielli and
               Luigi V. Mancini},
  title     = {Secure topology maintenance and events collection in WSNs},
  journal   = {Security and Communication Networks},
  volume    = {4},
  number    = {7},
  pages     = {744--762},
  year      = {2011},
  url       = {https://doi.org/10.1002/sec.280},
  doi       = {10.1002/sec.280},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ContiPGM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ContiPMM11,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi Vincenzo Mancini and
               Alessandro Mei},
  title     = {Distributed Detection of Clone Attacks in Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {8},
  number    = {5},
  pages     = {685--698},
  year      = {2011},
  url       = {https://doi.org/10.1109/TDSC.2010.25},
  doi       = {10.1109/TDSC.2010.25},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/ContiPMM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ContiZC11,
  author    = {Mauro Conti and
               Irina Zachia{-}Zlatea and
               Bruno Crispo},
  title     = {Mind how you answer me!: transparently authenticating the user of
               a smartphone when answering or placing a call},
  booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
               2011},
  pages     = {249--259},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011asia},
  url       = {https://doi.org/10.1145/1966913.1966945},
  doi       = {10.1145/1966913.1966945},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ContiZC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ContiHC11,
  author    = {Mauro Conti and
               Arbnor Hasani and
               Bruno Crispo},
  title     = {Virtual private social networks},
  booktitle = {First {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages     = {39--50},
  year      = {2011},
  crossref  = {DBLP:conf/codaspy/2011},
  url       = {https://doi.org/10.1145/1943513.1943521},
  doi       = {10.1145/1943513.1943521},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/ContiHC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/OrtolaniCCP11,
  author    = {Stefano Ortolani and
               Mauro Conti and
               Bruno Crispo and
               Roberto Di Pietro},
  title     = {Events privacy in WSNs: {A} new model and its application},
  booktitle = {12th {IEEE} International Symposium on a World of Wireless, Mobile
               and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June,
               2011},
  pages     = {1--9},
  year      = {2011},
  crossref  = {DBLP:conf/wowmom/2011},
  url       = {https://doi.org/10.1109/WoWMoM.2011.5986491},
  doi       = {10.1109/WoWMoM.2011.5986491},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/OrtolaniCCP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ContiPMS10,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Angelo Spognardi},
  title     = {eRIPP-FS: Enforcing privacy and security in {RFID}},
  journal   = {Security and Communication Networks},
  volume    = {3},
  number    = {1},
  pages     = {58--70},
  year      = {2010},
  url       = {https://doi.org/10.1002/sec.120},
  doi       = {10.1002/sec.120},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ContiPMS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ZhangZCPJM10,
  author    = {Lei Zhang and
               Honggang Zhang and
               Mauro Conti and
               Roberto Di Pietro and
               Sushil Jajodia and
               Luigi Vincenzo Mancini},
  title     = {Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless
               Sensor Networks},
  booktitle = {10th {IEEE} International Conference on Computer and Information Technology,
               {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages     = {910--915},
  year      = {2010},
  crossref  = {DBLP:conf/IEEEcit/2010},
  url       = {https://doi.org/10.1109/CIT.2010.169},
  doi       = {10.1109/CIT.2010.169},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcit/ZhangZCPJM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/BragantiniCP10,
  author    = {Roberto Bragantini and
               Mauro Conti and
               Roberto Di Pietro},
  title     = {Security in Outsourced Storage: Efficiently Checking Integrity and
               Service Level Agreement Compliance},
  booktitle = {10th {IEEE} International Conference on Computer and Information Technology,
               {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages     = {1096--1101},
  year      = {2010},
  crossref  = {DBLP:conf/IEEEcit/2010},
  url       = {https://doi.org/10.1109/CIT.2010.200},
  doi       = {10.1109/CIT.2010.200},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcit/BragantiniCP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MarconiPCC10,
  author    = {Luciana Marconi and
               Roberto Di Pietro and
               Bruno Crispo and
               Mauro Conti},
  title     = {Time Warp: How Time Affects Privacy in LBSs},
  booktitle = {Information and Communications Security - 12th International Conference,
               {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  pages     = {325--339},
  year      = {2010},
  crossref  = {DBLP:conf/icics/2010},
  url       = {https://doi.org/10.1007/978-3-642-17650-0\_23},
  doi       = {10.1007/978-3-642-17650-0\_23},
  timestamp = {Sun, 04 Jun 2017 10:06:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/MarconiPCC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/OrtolaniCCP10,
  author    = {Stefano Ortolani and
               Mauro Conti and
               Bruno Crispo and
               Roberto Di Pietro},
  title     = {Event Handoff Unobservability in {WSN}},
  booktitle = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International
               Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised
               Selected Papers},
  pages     = {20--28},
  year      = {2010},
  crossref  = {DBLP:conf/ifip11-4/2010},
  url       = {https://doi.org/10.1007/978-3-642-19228-9\_3},
  doi       = {10.1007/978-3-642-19228-9\_3},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip11-4/OrtolaniCCP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ContiNC10,
  author    = {Mauro Conti and
               Vu Thien Nga Nguyen and
               Bruno Crispo},
  title     = {CRePE: Context-Related Policy Enforcement for Android},
  booktitle = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  pages     = {331--345},
  year      = {2010},
  crossref  = {DBLP:conf/isw/2010},
  url       = {https://doi.org/10.1007/978-3-642-18178-8\_29},
  doi       = {10.1007/978-3-642-18178-8\_29},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/ContiNC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiwac/ContiPGMM10,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Andrea Gabrielli and
               Luigi V. Mancini and
               Alessandro Mei},
  title     = {The smallville effect: social ties make mobile networks more secure
               against node capture attack},
  booktitle = {Proceedings of the 8th {ACM} International Workshop on Mobility Management
               {\&} Wireless Access, {MOBIWAC} 2010, Bodrum, Turkey October 17-18,
               2010},
  pages     = {99--106},
  year      = {2010},
  crossref  = {DBLP:conf/mobiwac/2010},
  url       = {https://doi.org/10.1145/1868497.1868514},
  doi       = {10.1145/1868497.1868514},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobiwac/ContiPGMM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MarconiCP10,
  author    = {Luciana Marconi and
               Mauro Conti and
               Roberto Di Pietro},
  title     = {CED\({}^{\mbox{2}}\): Communication Efficient Disjointness Decision},
  booktitle = {Security and Privacy in Communication Networks - 6th Iternational
               {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
               Proceedings},
  pages     = {290--306},
  year      = {2010},
  crossref  = {DBLP:conf/securecomm/2010},
  url       = {https://doi.org/10.1007/978-3-642-16161-2\_17},
  doi       = {10.1007/978-3-642-16161-2\_17},
  timestamp = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/MarconiCP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/OrtolaniCC10,
  author    = {Stefano Ortolani and
               Mauro Conti and
               Bruno Crispo},
  title     = {Censorship-Resilient Communications through Information Scattering},
  booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
               UK, March 24-26, 2010, Revised Selected Papers},
  pages     = {82--89},
  year      = {2010},
  crossref  = {DBLP:conf/spw/2010},
  url       = {https://doi.org/10.1007/978-3-662-45921-8\_14},
  doi       = {10.1007/978-3-662-45921-8\_14},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/OrtolaniCC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Conti10,
  author    = {Mauro Conti},
  title     = {Censorship-Resilient Communications through Information Scattering
               (Transcript of Discussion)},
  booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
               UK, March 24-26, 2010, Revised Selected Papers},
  pages     = {90--97},
  year      = {2010},
  crossref  = {DBLP:conf/spw/2010},
  url       = {https://doi.org/10.1007/978-3-662-45921-8\_15},
  doi       = {10.1007/978-3-662-45921-8\_15},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/Conti10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/RoyCSJ09,
  author    = {Sankardas Roy and
               Mauro Conti and
               Sanjeev Setia and
               Sushil Jajodia},
  title     = {Secure median computation in wireless sensor networks},
  journal   = {Ad Hoc Networks},
  volume    = {7},
  number    = {8},
  pages     = {1448--1462},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.adhoc.2009.04.007},
  doi       = {10.1016/j.adhoc.2009.04.007},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/adhoc/RoyCSJ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ContiPMM09,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Alessandro Mei},
  title     = {Mobility and Cooperation to Thwart Node Capture Attacks in MANETs},
  journal   = {{EURASIP} J. Wireless Comm. and Networking},
  volume    = {2009},
  year      = {2009},
  url       = {https://doi.org/10.1155/2009/945943},
  doi       = {10.1155/2009/945943},
  timestamp = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejwcn/ContiPMM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/ContiPMM09,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Alessandro Mei},
  title     = {Distributed data source verification in wireless sensor networks},
  journal   = {Information Fusion},
  volume    = {10},
  number    = {4},
  pages     = {342--353},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.inffus.2009.01.002},
  doi       = {10.1016/j.inffus.2009.01.002},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/inffus/ContiPMM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ContiZRPJM09,
  author    = {Mauro Conti and
               Lei Zhang and
               Sankardas Roy and
               Roberto Di Pietro and
               Sushil Jajodia and
               Luigi V. Mancini},
  title     = {Privacy-preserving robust data aggregation in wireless sensor networks},
  journal   = {Security and Communication Networks},
  volume    = {2},
  number    = {2},
  pages     = {195--213},
  year      = {2009},
  url       = {https://doi.org/10.1002/sec.95},
  doi       = {10.1002/sec.95},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ContiZRPJM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GabrielliCPM09,
  author    = {Andrea Gabrielli and
               Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini},
  title     = {Sec-TMP: {A} Secure Topology Maintenance Protocol for Event Delivery
               Enforcement in {WSN}},
  booktitle = {Security and Privacy in Communication Networks - 5th International
               {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
               2009, Revised Selected Papers},
  pages     = {265--284},
  year      = {2009},
  crossref  = {DBLP:conf/securecomm/2009},
  url       = {https://doi.org/10.1007/978-3-642-05284-2\_15},
  doi       = {10.1007/978-3-642-05284-2\_15},
  timestamp = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/GabrielliCPM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wwic/ContiPGMM09,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Andrea Gabrielli and
               Luigi V. Mancini and
               Alessandro Mei},
  title     = {The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc
               Networks},
  booktitle = {Wired/Wireless Internet Communications, 7th International Conference,
               {WWIC} 2009, Enschede, The Netherlands, May 27-29, 2009. Proceedings},
  pages     = {85--96},
  year      = {2009},
  crossref  = {DBLP:conf/wwic/2009},
  url       = {https://doi.org/10.1007/978-3-642-02118-3\_8},
  doi       = {10.1007/978-3-642-02118-3\_8},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wwic/ContiPGMM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-2199,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Andrea Gabrielli and
               Luigi V. Mancini and
               Alessandro Mei},
  title     = {The Smallville Effect: Social Ties Make Mobile Networks More Secure
               Against the Node Capture Attack},
  journal   = {CoRR},
  volume    = {abs/0912.2199},
  year      = {2009},
  url       = {http://arxiv.org/abs/0912.2199},
  archivePrefix = {arXiv},
  eprint    = {0912.2199},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0912-2199},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RoyCSJ08,
  author    = {Sankardas Roy and
               Mauro Conti and
               Sanjeev Setia and
               Sushil Jajodia},
  title     = {Securely computing an approximate median in wireless sensor networks},
  booktitle = {4th International {ICST} Conference on Security and Privacy in Communication
               Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages     = {6},
  year      = {2008},
  crossref  = {DBLP:conf/securecomm/2008},
  url       = {https://doi.org/10.1145/1460877.1460885},
  doi       = {10.1145/1460877.1460885},
  timestamp = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/RoyCSJ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ContiPMM08,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Alessandro Mei},
  title     = {Emergent properties: detection of the node-capture attack in mobile
               wireless sensor networks},
  booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security,
               {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages     = {214--219},
  year      = {2008},
  crossref  = {DBLP:conf/wisec/2008},
  url       = {https://doi.org/10.1145/1352533.1352568},
  doi       = {10.1145/1352533.1352568},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/ContiPMM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ContiPM07,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini},
  title     = {{ECCE:} Enhanced cooperative channel establishment for secure pair-wise
               communication in wireless sensor networks},
  journal   = {Ad Hoc Networks},
  volume    = {5},
  number    = {1},
  pages     = {49--62},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.adhoc.2006.05.013},
  doi       = {10.1016/j.adhoc.2006.05.013},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/adhoc/ContiPM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/ContiPMM07,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Alessandro Mei},
  title     = {A randomized, efficient, and distributed protocol for the detection
               of node replication attacks in wireless sensor networks},
  booktitle = {Proceedings of the 8th {ACM} Interational Symposium on Mobile Ad Hoc
               Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada,
               September 9-14, 2007},
  pages     = {80--89},
  year      = {2007},
  crossref  = {DBLP:conf/mobihoc/2007},
  url       = {https://doi.org/10.1145/1288107.1288119},
  doi       = {10.1145/1288107.1288119},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobihoc/ContiPMM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ContiPMS07,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Angelo Spognardi},
  title     = {{RIPP-FS:} An {RFID} Identification, Privacy Preserving Protocol with
               Forward Secrecy},
  booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing
               and Communications - Workshops (PerCom Workshops 2007), 19-23 March
               2007, White Plains, New York, {USA}},
  pages     = {229--234},
  year      = {2007},
  crossref  = {DBLP:conf/percom/2007w},
  url       = {https://doi.org/10.1109/PERCOMW.2007.100},
  doi       = {10.1109/PERCOMW.2007.100},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/percom/ContiPMS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ContiPM06,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini},
  title     = {Secure Cooperative Channel Establishment inWireless Sensor Networks},
  booktitle = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops
               (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy},
  pages     = {327--331},
  year      = {2006},
  crossref  = {DBLP:conf/percom/2006w},
  url       = {https://doi.org/10.1109/PERCOMW.2006.121},
  doi       = {10.1109/PERCOMW.2006.121},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/percom/ContiPM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/ContiPMM06,
  author    = {Mauro Conti and
               Roberto Di Pietro and
               Luigi V. Mancini and
               Alessandro Mei},
  title     = {Requirements and Open Issues in Distributed Detection of Node Identity
               Replicas in {WSN}},
  booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man
               and Cybernetics, Taipei, Taiwan, October 8-11, 2006},
  pages     = {1468--1473},
  year      = {2006},
  crossref  = {DBLP:conf/smc/2006},
  url       = {https://doi.org/10.1109/ICSMC.2006.384924},
  doi       = {10.1109/ICSMC.2006.384924},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/smc/ContiPMM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccps/2019,
  editor    = {Xue Liu and
               Paulo Tabuada and
               Miroslav Pajic and
               Linda Bushnell},
  title     = {Proceedings of the 10th {ACM/IEEE} International Conference on Cyber-Physical
               Systems, {ICCPS} 2019, Montreal, QC, Canada, April 16-18, 2019},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3302509},
  doi       = {10.1145/3302509},
  isbn      = {978-1-4503-6285-6},
  timestamp = {Sun, 07 Apr 2019 16:25:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccps/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lnsn/2019ka,
  editor    = {Mehmet Kaya and
               Reda Alhajj},
  title     = {Influence and Behavior Analysis in Social Networks and Social Media},
  series    = {Lecture Notes in Social Networks},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-02592-2},
  doi       = {10.1007/978-3-030-02592-2},
  isbn      = {978-3-030-02591-5},
  timestamp = {Mon, 17 Dec 2018 10:37:32 +0100},
  biburl    = {https://dblp.org/rec/bib/series/lnsn/2019ka},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2018jajodia,
  editor    = {Pierangela Samarati and
               Indrajit Ray and
               Indrakshi Ray},
  title     = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
               on the Occasion of His 70th Birthday},
  series    = {Lecture Notes in Computer Science},
  volume    = {11170},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-04834-1},
  doi       = {10.1007/978-3-030-04834-1},
  isbn      = {978-3-030-04833-4},
  timestamp = {Sun, 02 Dec 2018 12:11:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/birthday/2018jajodia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccnc/2018,
  title     = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference,
               {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8314843},
  isbn      = {978-1-5386-4790-5},
  timestamp = {Tue, 20 Mar 2018 14:22:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccnc/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018aisec,
  editor    = {Sadia Afroz and
               Battista Biggio and
               Yuval Elovici and
               David Freeman and
               Asaf Shabtai},
  title     = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
               and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3270101},
  isbn      = {978-1-4503-6004-3},
  timestamp = {Wed, 09 Jan 2019 16:42:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018aisec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asiacpss,
  editor    = {Dieter Gollmann and
               Jianying Zhou},
  title     = {Proceedings of the 4th {ACM} Workshop on Cyber-Physical System Security,
               CPSS@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3198458},
  doi       = {10.1145/3198458},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018asiacpss},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2018,
  title     = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8410986},
  isbn      = {978-1-5386-4586-4},
  timestamp = {Thu, 16 Aug 2018 12:45:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018-1,
  editor    = {Javier L{\'{o}}pez and
               Jianying Zhou and
               Miguel Soriano},
  title     = {Computer Security - 23rd European Symposium on Research in Computer
               Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11098},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-99073-6},
  doi       = {10.1007/978-3-319-99073-6},
  isbn      = {978-3-319-99072-9},
  timestamp = {Mon, 13 Aug 2018 14:33:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hpdc/2018p,
  title     = {Poster Proceedings of the 27th International Symposium on High-Performance
               Parallel and Distributed Computing, {HPDC} 2018, Tempe, AZ, USA, June
               11-15, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3220192},
  doi       = {10.1145/3220192},
  timestamp = {Fri, 05 Apr 2019 12:37:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hpdc/2018p},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2018w,
  title     = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications
               Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19,
               2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8401302},
  isbn      = {978-1-5386-5979-3},
  timestamp = {Wed, 11 Jul 2018 09:30:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2018w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwqos/2018,
  title     = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
               2018, Banff, AB, Canada, June 4-6, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8613196},
  isbn      = {978-1-5386-2542-2},
  timestamp = {Mon, 28 Jan 2019 08:24:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iwqos/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2018,
  title     = {43rd {IEEE} Conference on Local Computer Networks, {LCN} 2018, Chicago,
               IL, USA, October 1-4, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8635823},
  isbn      = {978-1-5386-4413-3},
  timestamp = {Fri, 15 Feb 2019 13:59:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobiwac/2018,
  editor    = {Wessam Ajib and
               Rodolfo W. L. Coutinho and
               Frank Li},
  title     = {Proceedings of the 16th {ACM} International Symposium on Mobility
               Management and Wireless Access, MobiWac 2018, Montreal, QC, Canada,
               October 28 - November 02, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3265863},
  doi       = {10.1145/3265863},
  isbn      = {978-1-4503-5962-7},
  timestamp = {Mon, 10 Dec 2018 17:43:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobiwac/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2018,
  title     = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  publisher = {The Internet Society},
  year      = {2018},
  url       = {https://www.ndss-symposium.org/ndss2018/},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rtsi/2018,
  title     = {{IEEE} 4th International Forum on Research and Technology for Society
               and Industry, {RTSI} 2018, Palermo, Italy, September 10-13, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8528317},
  isbn      = {978-1-5386-6282-3},
  timestamp = {Fri, 21 Dec 2018 12:31:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/rtsi/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2018-1,
  editor    = {Raheem Beyah and
               Bing Chang and
               Yingjiu Li and
               Sencun Zhu},
  title     = {Security and Privacy in Communication Networks - 14th International
               Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
               Part {I}},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {254},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01701-9},
  doi       = {10.1007/978-3-030-01701-9},
  isbn      = {978-3-030-01700-2},
  timestamp = {Fri, 11 Jan 2019 16:12:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2018,
  editor    = {William Enck and
               Adrienne Porter Felt},
  title     = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018},
  publisher = {{USENIX} Association},
  year      = {2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18},
  timestamp = {Mon, 20 Aug 2018 15:16:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wimob/2018,
  title     = {14th International Conference on Wireless and Mobile Computing, Networking
               and Communications, WiMob 2018, Limassol, Cyprus, October 15-17, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8540803},
  isbn      = {978-1-5386-6876-4},
  timestamp = {Fri, 04 Jan 2019 10:52:13 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wimob/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wowmom/2018,
  title     = {19th {IEEE} International Symposium on "A World of Wireless, Mobile
               and Multimedia Networks", WoWMoM 2018, Chania, Greece, June 12-15,
               2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8412803},
  isbn      = {978-1-5386-4725-7},
  timestamp = {Tue, 04 Sep 2018 13:24:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2017,
  title     = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3098954},
  isbn      = {978-1-4503-5257-4},
  timestamp = {Wed, 16 Aug 2017 12:42:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2017,
  editor    = {Dieter Gollmann and
               Atsuko Miyaji and
               Hiroaki Kikuchi},
  title     = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10355},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1},
  doi       = {10.1007/978-3-319-61204-1},
  isbn      = {978-3-319-61203-4},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asunam/2017,
  editor    = {Jana Diesner and
               Elena Ferrari and
               Guandong Xu},
  title     = {Proceedings of the 2017 {IEEE/ACM} International Conference on Advances
               in Social Networks Analysis and Mining 2017, Sydney, Australia, July
               31 - August 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3110025},
  doi       = {10.1145/3110025},
  isbn      = {978-1-4503-4993-2},
  timestamp = {Tue, 06 Nov 2018 16:57:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asunam/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccnc/2017,
  title     = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference,
               {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7976073},
  isbn      = {978-1-5090-6196-9},
  timestamp = {Fri, 21 Jul 2017 15:01:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccnc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asia,
  editor    = {Ramesh Karri and
               Ozgur Sinanoglu and
               Ahmad{-}Reza Sadeghi and
               Xun Yi},
  title     = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3052973},
  doi       = {10.1145/3052973},
  isbn      = {978-1-4503-4944-4},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cf/2017,
  title     = {Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy,
               May 15-17, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3075564},
  doi       = {10.1145/3075564},
  isbn      = {978-1-4503-4487-6},
  timestamp = {Tue, 06 Nov 2018 11:07:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cf/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chase/2017,
  editor    = {Paolo Bonato and
               Honggang Wang},
  title     = {Proceedings of the Second {IEEE/ACM} International Conference on Connected
               Health: Applications, Systems and Engineering Technologies, {CHASE}
               2017, Philadelphia, PA, USA, July 17-19, 2017},
  publisher = {{IEEE} Computer Society / {ACM}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8010607},
  isbn      = {978-1-5090-4722-2},
  timestamp = {Mon, 23 Apr 2018 11:22:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chase/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2017,
  editor    = {Nora Cuppens and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Jean{-}Louis Lanet and
               Axel Legay and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title     = {Risks and Security of Internet and Systems - 12th International Conference,
               CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10694},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-76687-4},
  doi       = {10.1007/978-3-319-76687-4},
  isbn      = {978-3-319-76686-7},
  timestamp = {Fri, 09 Mar 2018 13:37:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017-1,
  editor    = {Simon N. Foley and
               Dieter Gollmann and
               Einar Snekkenes},
  title     = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10492},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66402-6},
  doi       = {10.1007/978-3-319-66402-6},
  isbn      = {978-3-319-66401-9},
  timestamp = {Fri, 01 Sep 2017 14:18:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ficloud/2017w,
  editor    = {Irfan Awan and
               Filipe Portela and
               Muhammad Younas},
  title     = {5th International Conference on Future Internet of Things and Cloud
               Workshops, FiCloud Workshops 2017, Prague, Czech Republic, August
               21-23, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8110164},
  isbn      = {978-1-5386-3281-9},
  timestamp = {Tue, 19 Mar 2019 17:14:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ficloud/2017w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gpc/2017,
  editor    = {Man Ho Allen Au and
               Arcangelo Castiglione and
               Kim{-}Kwang Raymond Choo and
               Francesco Palmieri and
               Kuan{-}Ching Li},
  title     = {Green, Pervasive, and Cloud Computing - 12th International Conference,
               {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10232},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-57186-7},
  doi       = {10.1007/978-3-319-57186-7},
  isbn      = {978-3-319-57185-0},
  timestamp = {Fri, 26 May 2017 00:49:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gpc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccp2/2017,
  title     = {13th {IEEE} International Conference on Intelligent Computer Communication
               and Processing, {ICCP} 2017, Cluj-Napoca, Romania, September 7-9,
               2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8103830},
  isbn      = {978-1-5386-3368-7},
  timestamp = {Fri, 15 Dec 2017 12:49:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iccp2/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccst/2017,
  title     = {International Carnahan Conference on Security Technology, {ICCST}
               2017, Madrid, Spain, October 23-26, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8122075},
  isbn      = {978-1-5386-1585-0},
  timestamp = {Tue, 06 Feb 2018 12:36:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iccst/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2017,
  editor    = {Kisung Lee and
               Ling Liu},
  title     = {37th {IEEE} International Conference on Distributed Computing Systems,
               {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7976702},
  isbn      = {978-1-5386-1792-2},
  timestamp = {Fri, 21 Jul 2017 13:46:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icissp/2017,
  editor    = {Paolo Mori and
               Steven Furnell and
               Olivier Camp},
  title     = {Proceedings of the 3rd International Conference on Information Systems
               Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
               2017},
  publisher = {SciTePress},
  year      = {2017},
  isbn      = {978-989-758-209-7},
  timestamp = {Thu, 18 May 2017 14:22:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icissp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icnsc/2017,
  editor    = {Giancarlo Fortino and
               MengChu Zhou and
               Zofia Lukszo and
               Athanasios V. Vasilakos and
               Francesco Basile and
               Carlos E. Palau and
               Antonio Liotta and
               Maria Pia Fanti and
               Antonio Guerrieri and
               Andrea Vinci},
  title     = {14th {IEEE} International Conference on Networking, Sensing and Control,
               {ICNSC} 2017, Calabria, Italy, May 16-18, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7990365},
  isbn      = {978-1-5090-4429-0},
  timestamp = {Thu, 04 Jan 2018 08:18:52 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icnsc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2017w,
  title     = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
               Workshops, Atlanta, GA, USA, May 1-4, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8106907},
  isbn      = {978-1-5386-2784-6},
  timestamp = {Thu, 30 Nov 2017 16:47:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2017w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mass/2017,
  title     = {14th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems,
               {MASS} 2017, Orlando, FL, USA, October 22-25, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8107623},
  isbn      = {978-1-5386-2324-4},
  timestamp = {Thu, 23 Nov 2017 12:36:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mass/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nfvsdn/2017,
  title     = {2017 {IEEE} Conference on Network Function Virtualization and Software
               Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8123893},
  isbn      = {978-1-5386-3285-7},
  timestamp = {Tue, 12 Dec 2017 14:43:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nfvsdn/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2017,
  editor    = {Marc Dacier and
               Michael Bailey and
               Michalis Polychronakis and
               Manos Antonakakis},
  title     = {Research in Attacks, Intrusions, and Defenses - 20th International
               Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10453},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66332-6},
  doi       = {10.1007/978-3-319-66332-6},
  isbn      = {978-3-319-66331-9},
  timestamp = {Wed, 18 Oct 2017 19:32:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2017,
  title     = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
               2017, Rennes, France, December 4-7, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8258575},
  isbn      = {978-1-5090-6769-5},
  timestamp = {Tue, 30 Jan 2018 12:23:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wimob/2017,
  title     = {13th {IEEE} International Conference on Wireless and Mobile Computing,
               Networking and Communications, WiMob 2017, Rome, Italy, October 9-11,
               2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8106925},
  isbn      = {978-1-5386-3839-2},
  timestamp = {Fri, 01 Dec 2017 09:24:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wimob/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2017,
  editor    = {Guevara Noubir and
               Mauro Conti and
               Sneha Kumar Kasera},
  title     = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3098243},
  doi       = {10.1145/3098243},
  isbn      = {978-1-4503-5084-6},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/CSB2017,
  editor    = {Sanjay Chaudhary and
               Gaurav Somani and
               Rajkumar Buyya},
  title     = {Research Advances in Cloud Computing},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-981-10-5026-8},
  doi       = {10.1007/978-981-10-5026-8},
  isbn      = {978-981-10-5025-1},
  timestamp = {Wed, 03 Apr 2019 15:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/CSB2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acmicn/2016,
  editor    = {Tohru Asami and
               Xiaoming Fu and
               Jeff Burke and
               Dario Rossi and
               Ioannis Psaras},
  title     = {Proceedings of the 3rd {ACM} Conference on Information-Centric Networking,
               {ICN} '16, Kyoto, Japan, September 26-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2984356},
  doi       = {10.1145/2984356},
  isbn      = {978-1-4503-4467-8},
  timestamp = {Tue, 06 Nov 2018 16:58:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acmicn/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2016,
  editor    = {Mark Manulis and
               Ahmad{-}Reza Sadeghi and
               Steve Schneider},
  title     = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9696},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5},
  doi       = {10.1007/978-3-319-39555-5},
  isbn      = {978-3-319-39554-8},
  timestamp = {Fri, 02 Nov 2018 09:42:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aina/2016w,
  editor    = {Leonard Barolli and
               Makoto Takizawa and
               Tomoya Enokido and
               Antonio J. Jara and
               Yann Bocchi},
  title     = {30th International Conference on Advanced Information Networking and
               Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland,
               March 23-25, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7470660},
  isbn      = {978-1-5090-2461-2},
  timestamp = {Wed, 04 Jul 2018 16:30:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/2016w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccnc/2016,
  title     = {13th {IEEE} Annual Consumer Communications {\&} Networking Conference,
               {CCNC} 2016, Las Vegas, NV, USA, January 9-12, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7435634},
  isbn      = {978-1-4673-9292-1},
  timestamp = {Fri, 08 Apr 2016 13:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccnc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016iotpts,
  editor    = {Richard Chow and
               G{\"{o}}kay Saldamli},
  title     = {Proceedings of the 2nd {ACM} International Workshop on IoT Privacy,
               Trust, and Security, IoTPTS@AsiaCCS, Xi'an, China, May 30, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2899007},
  doi       = {10.1145/2899007},
  isbn      = {978-1-4503-4283-4},
  timestamp = {Tue, 06 Nov 2018 11:07:30 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016iotpts},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2016,
  title     = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
               2016, Philadelphia, PA, USA, October 17-19, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7854080},
  isbn      = {978-1-5090-3065-1},
  timestamp = {Fri, 03 Mar 2017 14:28:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016,
  editor    = {Elisa Bertino and
               Ravi Sandhu and
               Alexander Pretschner},
  title     = {Proceedings of the Sixth {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
               9-11, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2857705},
  isbn      = {978-1-4503-3935-3},
  timestamp = {Tue, 15 Mar 2016 09:10:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2016w,
  title     = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks Workshops, {DSN} Workshops 2016, Toulouse, France, June
               28 - July 1, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7575326},
  isbn      = {978-1-5090-3688-2},
  timestamp = {Thu, 06 Oct 2016 12:03:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2016w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2016,
  title     = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7467055},
  isbn      = {978-1-5090-1751-5},
  timestamp = {Sun, 05 Jun 2016 10:00:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2016,
  title     = {25th International Conference on Computer Communication and Networks,
               {ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7566809},
  isbn      = {978-1-5090-2279-3},
  timestamp = {Fri, 16 Sep 2016 12:11:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccn/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccnc/2016,
  title     = {2016 International Conference on Computing, Networking and Communications,
               {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7430154},
  isbn      = {978-1-4673-8579-4},
  timestamp = {Tue, 03 May 2016 12:19:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccnc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ntms/2016,
  editor    = {Mohamad Badra and
               Giovanni Pau and
               Vasos Vassiliou},
  title     = {8th {IFIP} International Conference on New Technologies, Mobility
               and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7791100},
  isbn      = {978-1-5090-2914-3},
  timestamp = {Thu, 22 Jun 2017 16:10:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ntms/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/symbiotic/2016,
  editor    = {Luciano Gamberini and
               Anna Spagnolli and
               Giulio Jacucci and
               Benjamin Blankertz and
               Jonathan Freeman},
  title     = {Symbiotic Interaction - 5th International Workshop, Symbiotic 2016,
               Padua, Italy, September 29-30, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9961},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-57753-1},
  doi       = {10.1007/978-3-319-57753-1},
  isbn      = {978-3-319-57752-4},
  timestamp = {Thu, 25 May 2017 00:42:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/symbiotic/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uic/2016,
  title     = {2016 Intl {IEEE} Conferences on Ubiquitous Intelligence {\&} Computing,
               Advanced and Trusted Computing, Scalable Computing and Communications,
               Cloud and Big Data Computing, Internet of People, and Smart World
               Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France,
               July 18-21, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7814735},
  isbn      = {978-1-5090-2771-2},
  timestamp = {Mon, 20 Mar 2017 12:37:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/uic/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor    = {Thorsten Holz and
               Stefan Savage},
  title     = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2016,
  editor    = {Matthias Hollick and
               Panos Papadimitratos and
               William Enck},
  title     = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
               in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
               July 18-22, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2939918},
  doi       = {10.1145/2939918},
  isbn      = {978-1-4503-4270-4},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/JSSW2016,
  editor    = {Sushil Jajodia and
               V. S. Subrahmanian and
               Vipin Swarup and
               Cliff Wang},
  title     = {Cyber Deception, Building the Scientific Foundation},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-32699-3},
  doi       = {10.1007/978-3-319-32699-3},
  isbn      = {978-3-319-32697-9},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/JSSW2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sci/2016-621,
  editor    = {Rami S. Abielmona and
               Rafael Falcon and
               A. Nur Zincir{-}Heywood and
               Hussein A. Abbass},
  title     = {Recent Advances in Computational Intelligence in Defense and Security},
  series    = {Studies in Computational Intelligence},
  volume    = {621},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-26450-9},
  doi       = {10.1007/978-3-319-26450-9},
  isbn      = {978-3-319-26448-6},
  timestamp = {Fri, 02 Nov 2018 09:26:55 +0100},
  biburl    = {https://dblp.org/rec/bib/series/sci/2016-621},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2015,
  editor    = {Tal Malkin and
               Vladimir Kolesnikov and
               Allison Bishop Lewko and
               Michalis Polychronakis},
  title     = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9092},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7},
  doi       = {10.1007/978-3-319-28166-7},
  isbn      = {978-3-319-28165-0},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asunam/2015,
  editor    = {Jian Pei and
               Fabrizio Silvestri and
               Jie Tang},
  title     = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
               in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
               August 25 - 28, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2808797},
  isbn      = {978-1-4503-3854-7},
  timestamp = {Sun, 01 Jul 2018 16:24:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asunam/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015asia,
  editor    = {Feng Bao and
               Steven Miller and
               Jianying Zhou and
               Gail{-}Joon Ahn},
  title     = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
               2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2714576},
  isbn      = {978-1-4503-3245-3},
  timestamp = {Tue, 21 Nov 2017 18:32:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Wed, 11 Apr 2018 11:09:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cloudcom/2015,
  title     = {7th {IEEE} International Conference on Cloud Computing Technology
               and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December
               3, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7395249},
  isbn      = {978-1-4673-9560-1},
  timestamp = {Mon, 30 Jan 2017 17:04:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cloudcom/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2015,
  title     = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
               2015, Florence, Italy, September 28-30, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7336674},
  isbn      = {978-1-4673-7876-5},
  timestamp = {Fri, 11 Dec 2015 15:42:21 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2015,
  editor    = {Jaehong Park and
               Anna Cinzia Squicciarini},
  title     = {Proceedings of the 5th {ACM} Conference on Data and Application Security
               and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2699026},
  isbn      = {978-1-4503-3191-3},
  timestamp = {Fri, 27 Feb 2015 11:13:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/epsec/2015,
  editor    = {Victor Chang and
               Muthu Ramachandran and
               Robert John Walters and
               Gary Wills},
  title     = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
               BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10131},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-54380-2},
  doi       = {10.1007/978-3-319-54380-2},
  isbn      = {978-3-319-54379-6},
  timestamp = {Fri, 16 Jun 2017 10:09:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/epsec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ficloud/2015,
  editor    = {Irfan Awan and
               Muhammad Younas and
               Massimo Mecella},
  title     = {3rd International Conference on Future Internet of Things and Cloud,
               FiCloud 2015, Rome, Italy, August 24-26, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7299748},
  isbn      = {978-1-4673-8103-1},
  timestamp = {Tue, 19 Mar 2019 16:23:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ficloud/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2015w,
  title     = {{IEEE} International Conference on Communication, {ICC} 2015, London,
               United Kingdom, June 8-12, 2015, Workshop Proceedings},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7226899},
  isbn      = {978-1-4673-6305-1},
  timestamp = {Wed, 16 Sep 2015 14:33:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2015w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ihci/2015,
  editor    = {U. S. Tiwary},
  title     = {Proceeding of the Seventh International Conference on Intelligent
               Human Computer Interaction, {IHCI} 2015, Allahabad, India, 14-16 December
               2015},
  series    = {Procedia Computer Science},
  volume    = {84},
  publisher = {Elsevier},
  year      = {2016},
  url       = {http://www.sciencedirect.com/science/journal/18770509/84},
  timestamp = {Sat, 14 May 2016 18:09:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ihci/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisys/2015iot-sys,
  editor    = {Simone Cirani and
               Mischa Dohler and
               Gianluigi Ferrari and
               Luigi Alfredo Grieco and
               Marco Picone and
               Thomas Watteyne},
  title     = {Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial
               Systems, IoT-Sys@MobiSys 2015, Florence, Italy, May 18, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2753476},
  isbn      = {978-1-4503-3502-7},
  timestamp = {Tue, 09 Jun 2015 19:01:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/2015iot-sys},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2015,
  editor    = {Oleg B. Makarevich and
               Ron Poet and
               Atilla El{\c{c}}i and
               Manoj Singh Gaur and
               Mehmet A. Orgun and
               Ludmila K. Babenko and
               Md. Sadek Ferdous and
               Anthony T. S. Ho and
               Vijay Laxmi and
               Josef Pieprzyk},
  title     = {Proceedings of the 8th International Conference on Security of Information
               and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10,
               2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2799979},
  isbn      = {978-1-4503-3453-2},
  timestamp = {Wed, 29 Mar 2017 16:45:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sin/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2015-1,
  title     = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
               2015, Volume 1},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7293439},
  isbn      = {978-1-4673-7952-6},
  timestamp = {Thu, 10 Dec 2015 19:40:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2015,
  title     = {2015 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7364553},
  isbn      = {978-1-4673-6802-5},
  timestamp = {Thu, 07 Jan 2016 14:28:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wowmom/2015,
  editor    = {Luciano Bononi and
               Guevara Noubir and
               Victoria Manfredi},
  title     = {16th {IEEE} International Symposium on {A} World of Wireless, Mobile
               and Multimedia Networks, WoWMoM 2015, Boston, MA, USA, June 14-17,
               2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7152453},
  isbn      = {978-1-4799-8461-9},
  timestamp = {Mon, 20 Jul 2015 20:12:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sci/2015-567,
  editor    = {Guillermo Navarro{-}Arribas and
               Vicen{\c{c}} Torra},
  title     = {Advanced Research in Data Privacy},
  series    = {Studies in Computational Intelligence},
  volume    = {567},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-09885-2},
  doi       = {10.1007/978-3-319-09885-2},
  isbn      = {978-3-319-09884-5},
  timestamp = {Fri, 09 Jun 2017 11:04:39 +0200},
  biburl    = {https://dblp.org/rec/bib/series/sci/2015-567},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014asia,
  editor    = {Shiho Moriai and
               Trent Jaeger and
               Kouichi Sakurai},
  title     = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2590296},
  isbn      = {978-1-4503-2800-5},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014spsm,
  editor    = {Cliff Wang and
               Dijiang Huang and
               Kapil Singh and
               Zhenkai Liang},
  title     = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones
               {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November
               03 - 07, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2666620},
  isbn      = {978-1-4503-3155-5},
  timestamp = {Mon, 10 Nov 2014 12:47:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014spsm},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2014,
  title     = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
               San Francisco, CA, USA, October 29-31, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6982337},
  timestamp = {Wed, 04 Feb 2015 15:15:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2014,
  editor    = {Javier L{\'{o}}pez and
               Indrajit Ray and
               Bruno Crispo},
  title     = {Risks and Security of Internet and Systems - 9th International Conference,
               CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8924},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17127-2},
  doi       = {10.1007/978-3-319-17127-2},
  isbn      = {978-3-319-17126-5},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2014,
  editor    = {Sven Dietrich},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
               2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8550},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08509-8},
  doi       = {10.1007/978-3-319-08509-8},
  isbn      = {978-3-319-08508-1},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-1,
  editor    = {Miroslaw Kutylowski and
               Jaideep Vaidya},
  title     = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8712},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11203-9},
  doi       = {10.1007/978-3-319-11203-9},
  isbn      = {978-3-319-11202-2},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2014-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-8872,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Jordi Herrera{-}Joancomart{\'{\i}} and
               Emil Lupu and
               Joachim Posegga and
               Alessandro Aldini and
               Fabio Martinelli and
               Neeraj Suri},
  title     = {Data Privacy Management, Autonomous Spontaneous Security, and Security
               Assurance - 9th International Workshop, {DPM} 2014, 7th International
               Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
               Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8872},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17016-9},
  doi       = {10.1007/978-3-319-17016-9},
  isbn      = {978-3-319-17015-2},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2014-8872},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2014,
  editor    = {Radha Poovendran and
               Walid Saad},
  title     = {Decision and Game Theory for Security - 5th International Conference,
               GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8840},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12601-2},
  doi       = {10.1007/978-3-319-12601-2},
  isbn      = {978-3-319-12600-5},
  timestamp = {Tue, 23 May 2017 01:06:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2014,
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1},
  doi       = {10.1007/978-3-319-13841-1},
  isbn      = {978-3-319-13840-4},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2014-1,
  editor    = {Jing Tian and
               Jiwu Jing and
               Mudhakar Srivatsa},
  title     = {International Conference on Security and Privacy in Communication
               Networks - 10th International {ICST} Conference, SecureComm 2014,
               Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
               {I}},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {152},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-23829-6},
  doi       = {10.1007/978-3-319-23829-6},
  isbn      = {978-3-319-23828-9},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2014-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2014,
  title     = {13th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2014, Beijing, China, September
               24-26, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7008824},
  isbn      = {978-1-4799-6513-7},
  timestamp = {Thu, 13 Aug 2015 18:46:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wuwnet/2014,
  editor    = {Chiara Petrioli and
               Tommaso Melodia and
               Fumin Zhang and
               Zhengdao Wang and
               Jo{\~{a}}o Gomes and
               Wencen Wu},
  title     = {Proceedings of the International Conference on Underwater Networks
               {\&} Systems, Rome, Italy, November 12 - 14, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2671490},
  isbn      = {978-1-4503-3277-4},
  timestamp = {Fri, 16 Jan 2015 14:28:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wuwnet/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2013,
  editor    = {Bruno Crispo and
               Ravi S. Sandhu and
               Nora Cuppens{-}Boulahia and
               Mauro Conti and
               Jean{-}Louis Lanet},
  title     = {2013 International Conference on Risks and Security of Internet and
               Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6749561},
  timestamp = {Wed, 06 Feb 2019 10:30:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/greencom/2013,
  title     = {2013 {IEEE} International Conference on Green Computing and Communications
               (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber,
               Physical and Social Computing (CPSCom), Beijing, China, August 20-23,
               2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6679957},
  isbn      = {978-0-7695-5046-6},
  timestamp = {Wed, 17 Dec 2014 17:27:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/greencom/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2013,
  title     = {22nd International Conference on Computer Communication and Networks,
               {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6603810},
  isbn      = {978-1-4673-5774-6},
  timestamp = {Wed, 23 Mar 2016 15:09:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icccn/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2013,
  title     = {{IEEE} 33rd International Conference on Distributed Computing Systems,
               {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6679374},
  isbn      = {978-0-7695-5000-8},
  timestamp = {Thu, 11 Dec 2014 17:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcs/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2013,
  title     = {38th Annual {IEEE} Conference on Local Computer Networks, Sydney,
               Australia, October 21-24, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6745315},
  isbn      = {978-1-4799-0537-9},
  timestamp = {Wed, 10 Dec 2014 18:26:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/percom/2013w,
  title     = {2013 {IEEE} International Conference on Pervasive Computing and Communications
               Workshops, {PERCOM} 2013 Workshops, San Diego, CA, USA, March 18-22,
               2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6523359},
  isbn      = {978-1-4673-5075-4},
  timestamp = {Thu, 14 Feb 2019 15:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/percom/2013w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2013,
  editor    = {Rafael Accorsi and
               Silvio Ranise},
  title     = {Security and Trust Management - 9th International Workshop, {STM}
               2013, Egham, UK, September 12-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8203},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41098-7},
  doi       = {10.1007/978-3-642-41098-7},
  isbn      = {978-3-642-41097-0},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wd/2013,
  title     = {Proceedings of the {IFIP} Wireless Days, {WD} 2013, Valencia, Spain,
               November 13-15, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6679376},
  isbn      = {978-1-4799-0542-3},
  timestamp = {Tue, 03 Feb 2015 17:12:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wd/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asunam/2012,
  title     = {International Conference on Advances in Social Networks Analysis and
               Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6423126},
  isbn      = {978-0-7695-4799-2},
  timestamp = {Mon, 25 Jan 2016 14:06:03 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asunam/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/greencom/2012,
  title     = {2012 {IEEE} International Conference on Green Computing and Communications,
               Conference on Internet of Things, and Conference on Cyber, Physical
               and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France,
               November 20-23, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6467822},
  isbn      = {978-1-4673-5146-1},
  timestamp = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/greencom/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcn/2012,
  editor    = {Luciano Bononi and
               Ajoy Kumar Datta and
               St{\'{e}}phane Devismes and
               Archan Misra},
  title     = {Distributed Computing and Networking - 13th International Conference,
               {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7129},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-25959-3},
  doi       = {10.1007/978-3-642-25959-3},
  isbn      = {978-3-642-25958-6},
  timestamp = {Thu, 25 May 2017 00:42:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcn/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2012,
  editor    = {Vijay Atluri and
               Jaideep Vaidya and
               Axel Kern and
               Murat Kantarcioglu},
  title     = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2295136},
  doi       = {10.1145/2295136},
  isbn      = {978-1-4503-1295-0},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2012,
  editor    = {Bruce Christianson and
               James A. Malcolm and
               Frank Stajano and
               Jonathan Anderson},
  title     = {Security Protocols {XX} - 20th International Workshop, Cambridge,
               UK, April 12-13, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7622},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35694-0},
  doi       = {10.1007/978-3-642-35694-0},
  isbn      = {978-3-642-35693-3},
  timestamp = {Thu, 25 May 2017 00:42:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011asia,
  editor    = {Bruce S. N. Cheung and
               Lucas Chi Kwong Hui and
               Ravi S. Sandhu and
               Duncan S. Wong},
  title     = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
               2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0564-8},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2011,
  editor    = {Ravi S. Sandhu and
               Elisa Bertino},
  title     = {First {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0466-5},
  timestamp = {Tue, 07 Jun 2011 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wowmom/2011,
  title     = {12th {IEEE} International Symposium on a World of Wireless, Mobile
               and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June,
               2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5976314},
  isbn      = {978-1-4577-0352-2},
  timestamp = {Mon, 22 Sep 2014 16:50:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEcit/2010,
  title     = {10th {IEEE} International Conference on Computer and Information Technology,
               {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5575291},
  isbn      = {978-0-7695-4108-2},
  timestamp = {Tue, 31 May 2016 16:44:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcit/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2010,
  editor    = {Miguel Soriano and
               Sihan Qing and
               Javier L{\'{o}}pez},
  title     = {Information and Communications Security - 12th International Conference,
               {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6476},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17650-0},
  doi       = {10.1007/978-3-642-17650-0},
  isbn      = {978-3-642-17649-4},
  timestamp = {Sun, 04 Jun 2017 10:06:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2010,
  editor    = {Jan Camenisch and
               Valentin S. Kisimov and
               Maria Dubovitskaya},
  title     = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International
               Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6555},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19228-9},
  doi       = {10.1007/978-3-642-19228-9},
  isbn      = {978-3-642-19227-2},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip11-4/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2010,
  editor    = {Mike Burmester and
               Gene Tsudik and
               Spyros S. Magliveras and
               Ivana Ilic},
  title     = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6531},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-18178-8},
  doi       = {10.1007/978-3-642-18178-8},
  isbn      = {978-3-642-18177-1},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobiwac/2010,
  editor    = {Albert Y. Zomaya and
               Bj{\"{o}}rn Landfeldt},
  title     = {Proceedings of the 8th {ACM} International Workshop on Mobility Management
               {\&} Wireless Access, {MOBIWAC} 2010, Bodrum, Turkey October 17-18,
               2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0277-7},
  timestamp = {Mon, 21 Nov 2011 17:42:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobiwac/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2010,
  editor    = {Sushil Jajodia and
               Jianying Zhou},
  title     = {Security and Privacy in Communication Networks - 6th Iternational
               {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
               Proceedings},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {50},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16161-2},
  doi       = {10.1007/978-3-642-16161-2},
  isbn      = {978-3-642-16160-5},
  timestamp = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2010,
  editor    = {Bruce Christianson and
               James A. Malcolm},
  title     = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
               UK, March 24-26, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7061},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45921-8},
  doi       = {10.1007/978-3-662-45921-8},
  isbn      = {978-3-662-45920-1},
  timestamp = {Thu, 25 May 2017 00:42:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2009,
  editor    = {Yan Chen and
               Tassos Dimitriou and
               Jianying Zhou},
  title     = {Security and Privacy in Communication Networks - 5th International
               {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
               2009, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {19},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-05284-2},
  doi       = {10.1007/978-3-642-05284-2},
  isbn      = {978-3-642-05283-5},
  timestamp = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wwic/2009,
  editor    = {Hans van den Berg and
               Geert J. Heijenk and
               Evgeny Osipov and
               Dirk Staehle},
  title     = {Wired/Wireless Internet Communications, 7th International Conference,
               {WWIC} 2009, Enschede, The Netherlands, May 27-29, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5546},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02118-3},
  doi       = {10.1007/978-3-642-02118-3},
  isbn      = {978-3-642-02117-6},
  timestamp = {Wed, 17 May 2017 14:24:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wwic/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2008,
  editor    = {Albert Levi and
               Peng Liu and
               Refik Molva},
  title     = {4th International {ICST} Conference on Security and Privacy in Communication
               Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/1460877},
  doi       = {10.1145/1460877},
  isbn      = {978-1-60558-241-2},
  timestamp = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2008,
  editor    = {Virgil D. Gligor and
               Jean{-}Pierre Hubaux and
               Radha Poovendran},
  title     = {Proceedings of the First {ACM} Conference on Wireless Network Security,
               {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-814-5},
  timestamp = {Mon, 07 Apr 2008 14:16:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobihoc/2007,
  editor    = {Evangelos Kranakis and
               Elizabeth M. Belding and
               Eytan Modiano},
  title     = {Proceedings of the 8th {ACM} Interational Symposium on Mobile Ad Hoc
               Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada,
               September 9-14, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-684-4},
  timestamp = {Thu, 17 Apr 2008 15:24:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobihoc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/percom/2007w,
  title     = {Fifth Annual {IEEE} International Conference on Pervasive Computing
               and Communications - Workshops (PerCom Workshops 2007), 19-23 March
               2007, White Plains, New York, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4144774},
  isbn      = {978-0-7695-2788-8},
  timestamp = {Fri, 27 Nov 2015 10:04:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/percom/2007w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/percom/2006w,
  title     = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops
               (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10656},
  isbn      = {0-7695-2520-2},
  timestamp = {Fri, 27 Nov 2015 10:04:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/percom/2006w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/smc/2006,
  title     = {Proceedings of the {IEEE} International Conference on Systems, Man
               and Cybernetics, Taipei, Taiwan, October 8-11, 2006},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4273787},
  isbn      = {1-4244-0099-6},
  timestamp = {Tue, 12 Mar 2013 08:33:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/smc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier