Segui
Alberto Giaretta
Alberto Giaretta
Ph.D in Computer Science, AASS MPI Lab, Írebro University
Email verificata su oru.se - Home page
Titolo
Citata da
Citata da
Anno
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
M De Donno, N Dragoni, A Giaretta, A Spognardi
Security and Communication Networks 2018 (7178164), 30, 2018
1662018
Microservices: Migration of a mission critical system
M Mazzara, N Dragoni, A Bucchiarone, A Giaretta, ST Larsen, S Dustdar
IEEE Transactions on Services Computing 14 (5), 1464-1477, 2018
912018
Analysis of DDoS-capable IoT Malwares
M De Donno, N Dragoni, A Giaretta, A Spognardi
Proceedings of 1st International Conference on Security, Privacy, and Trustá…, 2017
882017
The Internet of Hackable Things
N Dragoni, A Giaretta, M Mazzara
Proceedings of 5th International Conference in Software Engineering forá…, 2018
642018
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks
A Giaretta, S Balasubramaniam, M Conti
IEEE Transactions on Information Forensics and Security 11 (4), 665-676, 2016
482016
Cyber-storms come from clouds: Security of cloud computing in the IoT era
M De Donno, A Giaretta, N Dragoni, A Bucchiarone, M Mazzara
Future Internet 11 (6), 127, 2019
462019
AntibIoTic: Protecting IoT Devices Against DDoS Attacks
M De Donno, N Dragoni, A Giaretta, M Mazzara
Proceedings of 5th International Conference in Software Engineering forá…, 2018
412018
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot
A Giaretta, M De Donno, N Dragoni
Proceedings of the 13th International Conference on Availabilityá…, 2018
372018
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks
F Tavella, A Giaretta, TM Dooley-Cullinane, M Conti, L Coffey, ...
IEEE Transactions on Emerging Topics in Computing, 2019
242019
IoT security configurability with security-by-contract
A Giaretta, N Dragoni, F Massacci
Sensors 19 (19), 4121, 2019
172019
Community Targeted Phishing: A Middle Ground Between Massive and Spear Phishing through Natural Language Generation
A Giaretta, N Dragoni
6th International Conference in Software Engineering for Defenceá…, 2018
8*2018
Joining Jolie to Docker: Orchestration of Microservices on a Containers-as-a-Service Layer
A Giaretta, N Dragoni, M Mazzara
Proceedings of 5th International Conference in Software Engineering forá…, 2018
8*2018
Protecting the internet of things with security-by-contract and fog computing
A Giaretta, N Dragoni, F Massacci
2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 1-6, 2019
72019
A Taxonomy of Distributed Denial of Service Attacks
M De Donno, N Dragoni, A Giaretta, A Spognardi
International Conference on Information Society (i-Society), 2017, 2017
72017
UniquID: A Quest to Reconcile Identity Access Management and the IoT
A Giaretta, S Pepe, N Dragoni
International Conference on Objects, Components, Models and Patterns, 237-251, 2019
62019
Smart Lamp or Security Camera? Automatic Identification of IoT Devices
MD Thomsen, A Giaretta, N Dragoni
12th International Network Conference 2020 (INC2020), 2020
42020
IoT Device Profiling: From MUD Files to SÎC Contracts
G MatthÝasson, A Giaretta, N Dragoni
Open Identity Summit 2020, 143-154, 2020
42020
BitFlow: Enabling real‐time cash‐flow evaluations through blockchain
L Herskind, A Giaretta, M De Donno, N Dragoni
Concurrency and Computation: Practice and Experience, e5333, 2019
42019
Security and Privacy in Virtual Reality - A Literature Survey
A Giaretta
arXiv preprint arXiv:2205.00208, 2022
32022
Vulnerabilities and security breaches in cryptocurrencies
G Sigurdsson, A Giaretta, N Dragoni
International Conference in Software Engineering for Defence Applicationsá…, 2018
32018
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20