default search action
Luigi V. Mancini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi Vincenzo Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez:
OliVaR: Improving olive variety recognition using deep neural networks. Comput. Electron. Agric. 216: 108530 (2024) - [j50]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
FedComm: Federated Learning as a Medium for Covert Communication. IEEE Trans. Dependable Secur. Comput. 21(4): 1695-1707 (2024) - [j49]Alberto Maria Mongardini, Massimo La Morgia, Sushil Jajodia, Luigi Vincenzo Mancini, Alessandro Mei:
DARD: Deceptive Approaches for Robust Defense Against IP Theft. IEEE Trans. Inf. Forensics Secur. 19: 5591-5606 (2024) - [c99]Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini:
Have You Poisoned My Data? Defending Neural Networks Against Data Poisoning. ESORICS (1) 2024: 85-104 - [i29]Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz:
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem. CoRR abs/2403.03593 (2024) - [i28]Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini:
Have You Poisoned My Data? Defending Neural Networks against Data Poisoning. CoRR abs/2403.13523 (2024) - [i27]Sabrine Ennaji, Fabio De Gaspari, Dorjan Hitaj, Alicia K Bidi, Luigi V. Mancini:
Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects. CoRR abs/2409.18736 (2024) - 2023
- [j48]Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini:
DOLOS: A Novel Architecture for Moving Target Defense. IEEE Trans. Inf. Forensics Secur. 18: 5890-5905 (2023) - [i26]Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini:
Minerva: A File-Based Ransomware Detector. CoRR abs/2301.11050 (2023) - [i25]Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini:
DOLOS: A Novel Architecture for Moving Target Defense. CoRR abs/2303.00387 (2023) - [i24]Hristofor Miho, Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini, Georgios Koubouris, Gianluca Godino, Mehmet Hakan, Concepcion Muñoz Diez:
OliVaR: Improving Olive Variety Recognition using Deep Neural Networks. CoRR abs/2303.00431 (2023) - 2022
- [j47]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques. Neural Comput. Appl. 34(14): 12077-12096 (2022) - [j46]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Reliable detection of compressed and encrypted data. Neural Comput. Appl. 34(22): 20379-20393 (2022) - [c98]Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini:
PassFlow: Guessing Passwords with Generative Flows. DSN 2022: 251-262 - [c97]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz:
MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding. ESORICS (3) 2022: 425-444 - [i23]Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
FedComm: Federated Learning as a Medium for Covert Communication. CoRR abs/2201.08786 (2022) - [i22]Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding. CoRR abs/2202.06091 (2022) - 2021
- [j45]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intell. Syst. 36(5): 104-112 (2021) - [c96]Michal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. AsiaCCS 2021: 774-786 - [i21]Dorjan Hitaj, Giulio Pagnotta, Iacopo Masi, Luigi V. Mancini:
Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training. CoRR abs/2103.01914 (2021) - [i20]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Reliable Detection of Compressed and Encrypted Data. CoRR abs/2103.17059 (2021) - [i19]Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini:
PassFlow: Guessing Passwords with Generative Flows. CoRR abs/2105.06165 (2021) - [i18]Michal Piskozub, Fabio De Gaspari, Frederick Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. CoRR abs/2106.00541 (2021) - 2020
- [j44]Mauro Conti, Fabio De Gaspari, Luigi V. Mancini:
A Novel Stealthy Attack to Gather SDN Configuration-Information. IEEE Trans. Emerg. Top. Comput. 8(2): 328-340 (2020) - [j43]Edlira Dushku, Md Masoom Rabbani, Mauro Conti, Luigi V. Mancini, Silvio Ranise:
SARA: Secure Asynchronous Remote Attestation for IoT Systems. IEEE Trans. Inf. Forensics Secur. 15: 3123-3136 (2020) - [c95]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. ACNS (2) 2020: 254-274 - [c94]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. NSS 2020: 42-62 - [p4]Paul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît Leblanc, Mauno Pihelgas, Luigi V. Mancini, Fabio De Gaspari:
Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems. Adaptive Autonomous Secure Cyber Systems 2020: 1-21 - [i17]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. CoRR abs/2010.07754 (2020) - [i16]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. CoRR abs/2010.16204 (2020)
2010 – 2019
- 2019
- [c93]Mauro Conti, Edlira Dushku, Luigi V. Mancini, Md Masoom Rabbani, Silvio Ranise:
Remote Attestation as a Service for IoT. IoTSMS 2019: 320-325 - [c92]Mauro Conti, Edlira Dushku, Luigi V. Mancini:
RADIS: Remote Attestation of Distributed IoT Services. SDS 2019: 25-32 - [c91]Dorjan Hitaj, Briland Hitaj, Luigi V. Mancini:
Evasion Attacks Against Watermarking Techniques found in MLaaS Systems. SDS 2019: 55-63 - [c90]Mahdi Akil, Luigi V. Mancini, Daniele Venturi:
Multi-Covert Channel Attack in the Cloud. SDS 2019: 160-165 - [i15]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. CoRR abs/1911.02423 (2019) - 2018
- [j42]Giuseppe Cascavilla, Filipe Beato, Andrea Burattin, Mauro Conti, Luigi Vincenzo Mancini:
OSSINT - Open Source Social Network Intelligence: An efficient and effective way to uncover "private" information in OSN profiles. Online Soc. Networks Media 6: 58-68 (2018) - [c89]Mauro Conti, Edlira Dushku, Luigi V. Mancini:
Distributed Services Attestation in IoT. From Database to Cyber Security 2018: 261-273 - [c88]Paul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît LeBlanc, Mauno Pihelgas, Luigi V. Mancini, Agostino Panico:
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. ICMCIS 2018: 1-9 - [i14]Alexander Kott, Luigi V. Mancini, Paul Théron, Martin Drasar, Edlira Dushku, Heiko Günther, Markus Kont, Benoît Leblanc, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca:
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense. CoRR abs/1803.10664 (2018) - [i13]Paul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît Leblanc, Mauno Pihelgas, Luigi V. Mancini, Agostino Panico:
Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture. CoRR abs/1806.08657 (2018) - [i12]Mauro Conti, Edlira Dushku, Luigi V. Mancini:
RADIS: Remote Attestation of Distributed IoT Services. CoRR abs/1807.10234 (2018) - [i11]Dorjan Hitaj, Luigi V. Mancini:
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques. CoRR abs/1809.00615 (2018) - 2017
- [c87]Mauro Conti, Fabio De Gaspari, Luigi V. Mancini:
Know Your Enemy: Stealth Configuration-Information Gathering in SDN. GPC 2017: 386-401 - [c86]Luigi V. Mancini, Andrea Monti, Agostino Panico:
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court. ICISS 2017: 9-26 - 2016
- [j41]Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Analyzing Android Encrypted Network Traffic to Identify User Actions. IEEE Trans. Inf. Forensics Secur. 11(1): 114-125 (2016) - [c85]Paolo Bottoni, Emanuele Gabrielli, Gabriele Gualandi, Luigi Vincenzo Mancini, Franco Stolfi:
FedUp! Cloud Federation as a Service. ESOCC 2016: 168-182 - [c84]Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico:
AHEAD: A New Architecture for Active Defense. SafeConfig@CCS 2016: 11-16 - [p3]Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini:
Anonymity in an Electronic Society: A Survey. Cyber Deception 2016: 285-314 - [i10]Mauro Conti, Fabio De Gaspari, Luigi V. Mancini:
Know Your Enemy: Stealth Configuration-Information Gathering in SDN. CoRR abs/1608.04766 (2016) - [i9]Giuseppe Cascavilla, Filipe Beato, Andrea Burattin, Mauro Conti, Luigi Vincenzo Mancini:
OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles. CoRR abs/1611.06737 (2016) - 2015
- [j40]Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici:
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Int. J. Secur. Networks 10(3): 137-150 (2015) - [j39]Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obfuscation of Sensitive Data for Incremental Release of Network Flows. IEEE/ACM Trans. Netw. 23(2): 672-686 (2015) - [c83]Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik:
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. ACNS 2015: 243-262 - [c82]Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini:
Boten ELISA: A novel approach for botnet C&C in Online Social Networks. CNS 2015: 74-82 - [c81]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. CODASPY 2015: 297-304 - [c80]Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. NSS 2015: 46-59 - [i8]Giuseppe Ateniese, Briland Hitaj, Luigi V. Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position. CoRR abs/1505.07774 (2015) - 2014
- [c79]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone. ICDCS 2014: 218-227 - [c78]Andrea Di Florio, Nino Vincenzo Verde, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini:
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey. ISSRE Workshops 2014: 389-394 - [i7]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone. CoRR abs/1402.1940 (2014) - [i6]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis. CoRR abs/1407.7844 (2014) - 2013
- [j38]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini:
Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4): 2163-2176 (2013) - [c77]Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali:
Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements. CRiSIS 2013: 1-8 - [c76]Antonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obsidian: A scalable and efficient framework for NetFlow obfuscation. INFOCOM 2013: 7-8 - [c75]Antonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obsidian: A scalable and efficient framework for NetFlow obfuscation. INFOCOM Workshops 2013: 73-74 - [i5]Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali:
Mapping the File Systems Genome: rationales, technique, results and applications. CoRR abs/1306.2833 (2013) - [i4]Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali:
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers. CoRR abs/1306.4447 (2013) - 2012
- [c74]Luigi Vincenzo Mancini, Angelo Spognardi, Claudio Soriente, Antonio Villani, Domenico Vitali:
Relieve Internet Routing Security of Public Key Infrastructure. ICCCN 2012: 1-9 - [c73]Angelo Spognardi, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini, Roberto Battistoni:
Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets. ICETE (Selected Papers) 2012: 192-208 - [c72]Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obfuscation of sensitive data in network flows. INFOCOM 2012: 2372-2380 - [c71]Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini:
DDoS Detection with Information Theory Metrics and Netflows - A Real Case. SECRYPT 2012: 172-181 - 2011
- [j37]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini:
Secure topology maintenance and events collection in WSNs. Secur. Commun. Networks 4(7): 744-762 (2011) - [j36]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(3): 450-465 (2011) - [j35]Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei:
Distributed Detection of Clone Attacks in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(5): 685-698 (2011) - [c70]Domenico Vitali, Angelo Spognardi, Luigi V. Mancini:
Replication Schemes in Unattended Wireless Sensor Networks. NTMS 2011: 1-5 - [c69]Domenico Vitali, Angelo Spognardi, Antonio Villani, Luigi V. Mancini:
MhRep: Multi-hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks. SRDS Workshops 2011: 42-51 - 2010
- [j34]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Hierarchies of keys in secure multicast communications. J. Comput. Secur. 18(5): 839-860 (2010) - [j33]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
eRIPP-FS: Enforcing privacy and security in RFID. Secur. Commun. Networks 3(1): 58-70 (2010) - [c68]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini:
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. CIT 2010: 910-915 - [c67]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The smallville effect: social ties make mobile networks more secure against node capture attack. MOBIWAC 2010: 99-106
2000 – 2009
- 2009
- [j32]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) - [j31]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j30]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Distributed data source verification in wireless sensor networks. Inf. Fusion 10(4): 342-353 (2009) - [j29]Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini:
Privacy-preserving robust data aggregation in wireless sensor networks. Secur. Commun. Networks 2(2): 195-213 (2009) - [j28]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) - [c66]Vishwas Patil, Paolo Gasti, Luigi V. Mancini, Giovanni Chiola:
Resource Management with X.509 Inter-domain Authorization Certificates (InterAC). EuroPKI 2009: 34-50 - [c65]Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. SecureComm 2009: 265-284 - [c64]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. WWIC 2009: 85-96 - [i3]Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini, Alessandro Mei:
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack. CoRR abs/0912.2199 (2009) - 2008
- [j27]Luigi V. Mancini:
Special Issue: Hot Topics in Peer-to-Peer Systems. Concurr. Comput. Pract. Exp. 20(6): 599 (2008) - [j26]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Redoubtable Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): 13:1-13:22 (2008) - [c63]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 - [c62]Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini:
A Live Digital Forensic system for Windows networks. SEC 2008: 653-667 - [c61]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and efficient provable data possession. SecureComm 2008: 9 - [c60]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. WISEC 2008: 214-219 - [i2]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 114 (2008) - [i1]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary. IACR Cryptol. ePrint Arch. 2008: 293 (2008) - 2007
- [j25]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5(1): 49-62 (2007) - [j24]Giorgio Zanin, Roberto Di Pietro, Luigi V. Mancini:
Robust RSA distributed signatures for large-scale long-lived ad hoc networks. J. Comput. Secur. 15(1): 171-196 (2007) - [c59]Andrea Gabrielli, Luigi V. Mancini:
Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks. BIOWIRE 2007: 399-410 - [c58]Vishwas Patil, Alessandro Mei, Luigi V. Mancini:
Addressing interoperability issues in access control models. AsiaCCS 2007: 389-391 - [c57]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Towards threat-adaptive dynamic fragment replication in large scale distributed systems. IPDPS 2007: 1 - [c56]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. MobiHoc 2007: 80-89 - [c55]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234 - [p2]Maria Calagna, Luigi V. Mancini:
Information Hiding for Spatial and Geographical Data. Spatial Data on the Web 2007: 235-258 - [e2]Giovanni Di Crescenzo, Luigi V. Mancini:
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006. Electronic Notes in Theoretical Computer Science 171(1), Elsevier 2007 [contents] - 2006
- [j23]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel. Networks 12(6): 709-721 (2006) - [c54]Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil:
Addressing the shortcomings of one-way chains. AsiaCCS 2006: 289-296 - [c53]Alan A. Bertossi, Luigi V. Mancini, Alessandra Menapace:
Scheduling Hard-Real-Time Tasks with Backup Phasing Delay. DS-RT 2006: 107-118 - [c52]Giorgio Zanin, Alessandro Mei, Luigi V. Mancini:
A Secure and Efficient Large Scale Distributed System for Data Sharing. ICDCS 2006: 27 - [c51]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini:
Secure Cooperative Channel Establishment inWireless Sensor Networks. PerCom Workshops 2006: 327-331 - [c50]Maria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia:
A robust watermarking system based on SVD compression. SAC 2006: 1341-1347 - [c49]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Sensor Networks that Are Provably Resilient. SecureComm 2006: 1-10 - [c48]Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN. SMC 2006: 1468-1473 - [c47]Giovanni Di Crescenzo, Luigi V. Mancini:
Preface. WCAN@ICALP 2006: 1-2 - [c46]Roberto Di Pietro, Luigi V. Mancini, Giorgio Zanin:
Efficient and Adaptive Threshold Signatures for Ad hoc networks. WCAN@ICALP 2006: 93-105 - 2005
- [j22]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Graph-based specification of access control policies. J. Comput. Syst. Sci. 71(1): 1-33 (2005) - [c45]Maria Calagna, Luigi V. Mancini:
A Blind Method for Digital Watermarking Attacks. EuroIMSA 2005: 265-270 - [c44]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. SecureComm 2005: 101-112 - [c43]Roberto Di Pietro, Antonio Durante, Luigi V. Mancini, Vishwas Patil:
Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy. SecureComm 2005: 400-402 - 2004
- [j21]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Key management for high bandwidth secure multicast. J. Comput. Secur. 12(5): 693-709 (2004) - [c42]Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce:
Information Flow Analysis for File Systems and Databases Using Labels. DBSec 2004: 125-141 - [c41]Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini:
A Host Intrusion Prevention System for Windows Operating Systems. ESORICS 2004: 352-368 - [c40]Angelo Spognardi, Roberto Di Pietro, Luigi V. Mancini:
BaRT, balanced randomized tree: a scalable and distributed protocol for lookup in peer-to-peer networks. HOT-P2P 2004: 22-29 - [c39]Giorgio Zanin, Alessandro Mei, Luigi Vincenzo Mancini:
Towards a secure dynamic allocation of files in large scale distributed file systems. HOT-P2P 2004: 102-107 - [c38]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. IPDPS 2004 - [c37]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Administrative scope in the graph-based framework. SACMAT 2004: 97-104 - [c36]Giorgio Zanin, Luigi V. Mancini:
Towards a formal model for security policies specification and validation in the selinux system. SACMAT 2004: 136-145 - [c35]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Connectivity properties of secure wireless sensor networks. SASN 2004: 53-58 - 2003
- [j20]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003) - [j19]Roberto Di Pietro, Luigi V. Mancini:
Security and privacy issues of handheld and wearable wireless devices. Commun. ACM 46(9): 74-79 (2003) - [j18]Alessandro Mei, Luigi V. Mancini, Sushil Jajodia:
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. IEEE Trans. Parallel Distributed Syst. 14(9): 885-896 (2003) - [c34]Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga:
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397- - [c33]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Random key-assignment for secure Wireless Sensor Networks. SASN 2003: 62-71 - [c32]Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132 - [c31]Roberto Di Pietro, Antonio Durante, Luigi V. Mancini:
A Reliable Key Authentication Schema for Secure Multicast Communications. SRDS 2003: 231-240 - 2002
- [j17]Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini:
Remus: a security-enhanced operating system. ACM Trans. Inf. Syst. Secur. 5(1): 36-61 (2002) - [j16]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Secur. 5(3): 332-365 (2002) - [c30]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Decidability of Safety in Graph-Based Models for Access Control. ESORICS 2002: 229-243 - [c29]Antonio Durante, Roberto Di Pietro, Luigi V. Mancini:
Formal Specification for Fast Automatic IDS Training. FASec 2002: 191-204 - [c28]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Conflict Detection and Resolution in Access Control Policy Specifications. FoSSaCS 2002: 223-237 - [c27]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73 - [c26]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434 - 2001
- [c25]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Foundations for a Graph-Based Approach to the Specification of Access Control Policies. FoSSaCS 2001: 287-302 - [c24]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
On the specification and evolution of access control policies. SACMAT 2001: 121-130 - [c23]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Graph Transformations for the Specification of Access Control Policies. GETGRATS Closing Workshop 2001: 222-232 - 2000
- [j15]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino:
Flexible Transaction Dependencies in Database Systems. Distributed Parallel Databases 8(4): 399-446 (2000) - [j14]Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino:
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000) - [c22]Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini:
Enhancements to the Linux Kernel for Blocking Buffer Overflow Based Attacks. Annual Linux Showcase & Conference 2000 - [c21]Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini:
Operating system enhancements to prevent the misuse of system calls. CCS 2000: 174-183 - [c20]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
A Formal Model for Role-Based Access Control Using Graph Transformation. ESORICS 2000: 122-139 - [c19]Giovanni Chiola, Gianni Conte, Luigi V. Mancini:
Workshop on Personal Computer Based Networks of Workstation. IPDPS Workshops 2000: 1-3
1990 – 1999
- 1999
- [j13]Alan A. Bertossi, Luigi V. Mancini, Federico Rossini:
Fault-Tolerant Rate-Monotonic First-Fit Scheduling in Hard-Real-Time Systems. IEEE Trans. Parallel Distributed Syst. 10(9): 934-945 (1999) - [c18]Giovanni Chiola, Giuseppe Ciaccio, Luigi V. Mancini, Pierluigi Rotondo:
GAMMA on DEC 2114x with Efficient Flow Control. PDPTA 1999: 2337-2343 - [e1]José D. P. Rolim, Frank Mueller, Albert Y. Zomaya, Fikret Erçal, Stephan Olariu, Binoy Ravindran, Jan Gustafsson, Hiroaki Takada, Ronald A. Olsson, Laxmikant V. Kalé, Peter H. Beckman, Matthew Haines, Hossam A. ElGindy, Denis Caromel, Serge Chaumette, Geoffrey C. Fox, Yi Pan, Keqin Li, Tao Yang, G. Ghiola, Gianni Conte, Luigi V. Mancini, Dominique Méry, Beverly A. Sanders, Devesh Bhatt, Viktor K. Prasanna:
Parallel and Distributed Processing, 11 IPPS/SPDP'99 Workshops Held in Conjunction with the 13th International Parallel Processing Symposium and 10th Symposium on Parallel and Distributed Processing, San Juan, Puerto Rico, USA, April 12-16, 1999, Proceedings. Lecture Notes in Computer Science 1586, Springer 1999, ISBN 3-540-65831-9 [contents] - 1998
- [j12]Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998) - [c17]Elisa Bertino, Giovanni Chiola, Luigi V. Mancini:
Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models. ICATPN 1998: 266-285 - [c16]Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia:
A Fair Locking Protocol for Multilevel Secure Databases. CSFW 1998: 168-178 - 1997
- [j11]Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo:
Two Implementation Relations and the Correctness of Communicating Replicated Processes. Formal Aspects Comput. 9(2): 119-148 (1997) - [c15]Alan A. Bertossi, Andrea Fusiello, Luigi V. Mancini:
Fault-Tolerant Deadline-Monotonic Algorithm for Scheduling Hard-Real-Time Tasks. IPPS 1997: 133-138 - [p1]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino:
Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997 - 1996
- [c14]Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini:
An Advanced Commit Protocol for MLS Distributed Database Systems. CCS 1996: 119-128 - [c13]Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194 - [c12]Luigi V. Mancini, Indrajit Ray:
Secure Concurrency Control in MLS Databases with Two Versions of Data. ESORICS 1996: 304-323 - 1995
- [j10]Alan A. Bertossi, Massimo Bonometto, Luigi V. Mancini:
Increasing Processor Utilization in Hard-Real-Time Systems with Checkpoints. Real Time Syst. 9(1): 5-29 (1995) - 1994
- [j9]Alan A. Bertossi, Luigi V. Mancini:
Scheduling Algorithms for Fault-Tolerance in Hard-Real-Time Systems. Real Time Syst. 7(3): 229-245 (1994) - [c11]Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini:
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. ESORICS 1994: 359-373 - [c10]Elisa Bertino, Luigi V. Mancini, Sushil Jajodia:
Collecting garbage in multilevel secure object stores. S&P 1994: 106-120 - 1993
- [j8]Santosh K. Shrivastava, Luigi V. Mancini, Brian Randell:
The Duality of Fault-tolerant System Structures. Softw. Pract. Exp. 23(7): 773-798 (1993) - [c9]Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo:
Modelling Replicated Processing. PARLE 1993: 672-675 - 1992
- [j7]Alan A. Bertossi, Luigi V. Mancini:
Fault-tolerant LPT task scheduling in multiprocessor systems. Microprocess. Microsystems 16(2): 91-99 (1992) - [c8]Nicoletta De Francesco, Gigliola Vaglini, Luigi V. Mancini, A. Pereira Paz:
Specification of Concurrency Control in Persistent Programming Languages. POS 1992: 126-143 - [c7]Luigi V. Mancini:
Garbage Collection and Reachability. POS 1992: 394-395 - 1991
- [j6]Luigi V. Mancini, Santosh K. Shrivastava:
Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems. Comput. J. 34(6): 503-513 (1991) - [c6]Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo:
Formalising Replicated Distributed Processing. SRDS 1991: 108-117 - [c5]Luigi V. Mancini, Vittoria Rotella, Simonetta Venosa:
Copying Garbage Collection for Distributed Object Stores. SRDS 1991: 218-227
1980 – 1989
- 1989
- [b1]Luigi Vincenzo Mancini:
Reliability issues in the design of distributed object-based architectures. Newcastle University, Newcastle upon Tyne, UK, 1989 - [j5]Luigi V. Mancini, Giuseppe Pappalardo:
Proving Correctness Properties of a Replicated Synchronous Program. Comput. J. 32(5): 437-444 (1989) - [j4]Maciej Koutny, Luigi V. Mancini:
Synchronizing events in replicated systems. J. Syst. Softw. 9(3): 183-190 (1989) - [c4]Luigi Vincenzo Mancini, Santosh K. Shrivastava:
Replication within atomic actions and conversations: a case study in fault-tolerance duality. FTCS 1989: 454-461 - 1988
- [j3]Luigi V. Mancini, Giuseppe Pappalardo:
Hoare logic of distributed redundant systems. Comput. Syst. Sci. Eng. 3(4): 171-180 (1988) - [j2]Luigi V. Mancini:
A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures. Softw. Pract. Exp. 18(4): 287-300 (1988) - [c3]Luigi V. Mancini, Giuseppe Pappalardo:
Towards a Theory of Replicated Processing. FTRTFT 1988: 175-192 - 1987
- [c2]Santosh K. Shrivastava, Luigi V. Mancini, Brian Randell:
On the Duality of Fault Tolerant System Structures. Experiences with Distributed Systems 1987: 19-37 - 1986
- [j1]Luigi V. Mancini:
Modular Redundancy in a Message Passing System. IEEE Trans. Software Eng. 12(1): 79-86 (1986) - [c1]Luigi V. Mancini, Maciej Koutny:
Formal specification of N-modular redundancy. ACM Conference on Computer Science 1986: 199-204
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint