Dept. of Ingegneria di Informazione, University of Pisa
Email verificata su - Home page
Citata da
Citata da
MADAM: a multi-level anomaly detector for android malware
G Dini, F Martinelli, A Saracino, D Sgandurra
International Conference on Mathematical Methods, Models, and Architectures …, 2012
Madam: Effective and efficient behavior-based android malware detection and prevention
A Saracino, D Sgandurra, G Dini, F Martinelli
IEEE Transactions on Dependable and Secure Computing 15 (1), 83-97, 2016
An algorithm for reconnecting wireless sensor network partitions
G Dini, M Pelagatti, IM Savino
European Conference on Wireless Sensor Networks, 253-267, 2008
Considerations on security in zigbee networks
G Dini, M Tiloca
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2010
Enriched view synchrony: A programming paradigm for partitionable asynchronous distributed systems
Ö Babaoglu, A Bartoli, G Dini
IEEE Transactions on Computers 46 (6), 642-658, 1997
Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network
G Dini, AL Duca
Ad Hoc Networks 10 (7), 1167-1178, 2012
An efficient key revocation protocol for wireless sensor networks
G Dini, IM Savino
2006 International Symposium on a World of Wireless, Mobile and Multimedia …, 2006
Graphical design of distributed applications through reusable components
A Bartoli, P Corsini, G Dini, CA Prete
IEEE Parallel & Distributed Technology: Systems & Applications 3 (1), 37-50, 1995
A secure and available electronic voting service for a large-scale distributed system
G Dini
Future Generation Computer Systems 19 (1), 69-85, 2003
Secure cooperation of autonomous mobile sensors using an underwater acoustic network
A Caiti, V Calabro, G Dini, A Lo Duca, A Munafo
Sensors 12 (2), 1967-1989, 2012
Consensus-based distributed intrusion detection for multi-robot systems
A Fagiolini, M Pellinacci, G Valenti, G Dini, A Bicchi
2008 IEEE International Conference on Robotics and Automation, 120-127, 2008
Decentralized intrusion detection for secure cooperative multi-agent systems
A Fagiolini, G Valenti, L Pallottino, G Dini, A Bicchi
2007 46th IEEE Conference on Decision and Control, 1553-1558, 2007
S2rp: a secure and scalable rekeying protocol for wireless sensor networks
G Dini, IM Savino
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 457-466, 2006
A component-based approach to the design of networked control systems
KE Årzén, A Bicchi, G Dini, S Hailes, KH Johansson, J Lygeros, A Tzes
European Journal of Control 13 (2-3), 261-279, 2007
IEEE 802.15. 4 and ZigBee as enabling technologies for low-power wireless systems with quality-of-service constraints
S Tennina, A Koubâa, R Daidone, M Alves, P Jurčík, R Severino, M Tiloca, ...
Springer Science & Business Media, 2013
LARK: a lightweight authenticated rekeying scheme for clustered wireless sensor networks
G Dini, IM Savino
ACM Transactions on Embedded Computing Systems (TECS) 10 (4), 1-35, 2011
On experimentally evaluating the impact of security on IEEE 802.15. 4 networks
R Daidone, G Dini, M Tiloca
2011 International Conference on Distributed Computing in Sensor Systems and …, 2011
A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks
G Dini, AL Duca
The IEEE symposium on Computers and Communications, 772-777, 2010
Heterogeneous wireless multirobot system
A Bicchi, A Danesi, G Dini, S La Porta, L Pallottino, IM Savino, R Schiavi
IEEE robotics & automation magazine 15 (1), 62-70, 2008
A secure communication suite for underwater acoustic sensor networks
G Dini, A Lo Duca
Sensors 12 (11), 15133-15158, 2012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20