Cybersecurity considerations for Communication Based Train Control
2016 Soderi, Simone; Hamalainen, Matti; Iinatti, Jari
CLPDI algorithm in UWB synchronization
2003 Soderi, Simone; Iinatti, Jari; Hamalainen, Matti
An experimental evaluation of WiFi-based vehicle-to-vehicle (V2V) communication in a tunnel
2013 Viittala, H.; Soderi, S.; Saloranta, J.; Hamalainen, M.; Iinatti, J.
Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario
2013 Soderi, S.; Viittala, H.; Saloranta, J.; Hamalainen, M.; Iinatti, J.; Gurtov, A.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel
2020 Soderi, Simone
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols
2020 Sinigaglia, F.; Carbone, R.; Costa, G.; Ranise, S.
WAF-A-MoLE: Evading web application firewalls through adversarial machine learning
2020 Demetrio, L.; Valenza, A.; Costa, G.; Lagorio, G.
A type language for message passing component-based systems
2020 Savanovic, Zorica; Vieira, Hugo; Galletta, Letterio
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs
2021 Canidio, Andrea; Costa, Gabriele; Galletta, Letterio
Analysing the Provenance of IoT Data
2020 Bodei, Chiara; Galletta, Letterio
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors
2020 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Tobias Mühlberg, Jan; Piessens, Frank
A True Concurrent Model of Smart Contracts Executions
2020 Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio
MUAC: Access control language for mutual benefits
2020 Ceragioli, L.; Degano, P.; Galletta, L.
Control-flow flattening preserves the constant-time policy
2020 Busi, M.; Degano, P.; Galletta, L.
Accumulating and Interacting. Artworks in Ancient Rome’s Public Spaces
2020 Poggio, Alessandro
Are all firewall systems equally powerful?
2019 Ceragioli, L.; Degano, P.; Galletta, L.
Revealing the trajectories of KLAIM tuples, statically
2019 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
A Minimal Core Calculus for Solidity Contracts
2019 Bartoletti, M.; Galletta, L.; Murgia, M.
Checking the Expressivity of Firewall Languages
2019 Ceragioli, L.; Degano, P.; Galletta, L.
Security Metrics at Work on the Things in IoT Systems
2020 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
| Titolo | Data di pubblicazione | Autore(i) | File |
|---|---|---|---|
| Cybersecurity considerations for Communication Based Train Control | 1-gen-2016 | Soderi, Simone; Hamalainen, Matti; Iinatti, Jari | |
| CLPDI algorithm in UWB synchronization | 1-gen-2003 | Soderi, Simone; Iinatti, Jari; Hamalainen, Matti | |
| An experimental evaluation of WiFi-based vehicle-to-vehicle (V2V) communication in a tunnel | 1-gen-2013 | Viittala, H.; Soderi, S.; Saloranta, J.; Hamalainen, M.; Iinatti, J. | |
| Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario | 1-gen-2013 | Soderi, S.; Viittala, H.; Saloranta, J.; Hamalainen, M.; Iinatti, J.; Gurtov, A. | |
| Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel | 1-gen-2020 | Soderi, Simone | |
| MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols | 1-gen-2020 | Sinigaglia, F.; Carbone, R.; Costa, G.; Ranise, S. | |
| WAF-A-MoLE: Evading web application firewalls through adversarial machine learning | 1-gen-2020 | Demetrio, L.; Valenza, A.; Costa, G.; Lagorio, G. | |
| A type language for message passing component-based systems | 1-gen-2020 | Savanovic, Zorica; Vieira, Hugo; Galletta, Letterio | |
| VeriOSS: Using the Blockchain to Foster Bug Bounty Programs | 1-gen-2021 | Canidio, Andrea; Costa, Gabriele; Galletta, Letterio | |
| Analysing the Provenance of IoT Data | 1-gen-2020 | Bodei, Chiara; Galletta, Letterio | |
| Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors | 1-gen-2020 | Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Tobias Mühlberg, Jan; Piessens, Frank | |
| A True Concurrent Model of Smart Contracts Executions | 1-gen-2020 | Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio | |
| MUAC: Access control language for mutual benefits | 1-gen-2020 | Ceragioli, L.; Degano, P.; Galletta, L. | |
| Control-flow flattening preserves the constant-time policy | 1-gen-2020 | Busi, M.; Degano, P.; Galletta, L. | |
| Accumulating and Interacting. Artworks in Ancient Rome’s Public Spaces | 1-gen-2020 | Poggio, Alessandro | |
| Are all firewall systems equally powerful? | 1-gen-2019 | Ceragioli, L.; Degano, P.; Galletta, L. | |
| Revealing the trajectories of KLAIM tuples, statically | 1-gen-2019 | Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L. | |
| A Minimal Core Calculus for Solidity Contracts | 1-gen-2019 | Bartoletti, M.; Galletta, L.; Murgia, M. | |
| Checking the Expressivity of Firewall Languages | 1-gen-2019 | Ceragioli, L.; Degano, P.; Galletta, L. | |
| Security Metrics at Work on the Things in IoT Systems | 1-gen-2020 | Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile
Scopri
Tipologia
- 4 Contributo in Atti di Convegno ...1156
Data di pubblicazione
- In corso di stampa2
- 2020 - 2026278
- 2010 - 2019567
- 2000 - 2009266
- 1990 - 199937
- 1988 - 19896
Editore
- IEEE104
- Springer57
- Institute of Electrical and Elect...38
- Elsevier33
- Association for Computing Machinery21
- IEEE Computer Society17
- Springer Verlag17
- EURAM11
- CEUR-WS10
- Springer Science and Business Med...10
Rivista
- NEUROIMAGE25
- LECTURE NOTES IN COMPUTER SCIENCE17
- ELECTRONIC PROCEEDINGS IN THEORET...9
- LECTURE NOTES IN COMPUTER SCIENCE6
- SLEEP6
- ENERGY PROCEDIA5
- PROCEEDINGS OF THE IEEE CONFERENC...5
- CEUR WORKSHOP PROCEEDINGS4
- JOURNAL OF SLEEP RESEARCH4
- LECTURE NOTES IN APPLIED AND COMP...3
Serie
- LECTURE NOTES IN COMPUTER SCIENCE52
- IFAC-PAPERSONLINE23
- PROCEEDINGS OF THE IEEE CONFERENC...21
- CEUR WORKSHOP PROCEEDINGS18
- PROCEEDINGS OF THE ... IEEE CONFE...11
- EUROPEAN CONTROL CONFERENCE8
- LECTURE NOTES OF THE INSTITUTE FO...7
- COMMUNICATIONS IN COMPUTER AND IN...6
- PROCEEDINGS OF THE AMERICAN CONTR...6
- COMPUTER-AIDED CHEMICAL ENGINEERING5
Keyword
- Security9
- Games7
- Machine learning7
- security7
- Cybersecurity6
- Deep Learning6
- Uncertainty6
- IoT5
- Model predictive control5
- Nash equilibrium5
Lingua
- eng842
- ita101
- und80
- por6
- spa4
- fre1
Accesso al fulltext
- no fulltext677
- reserved301
- open141
- partially open37