Internet of things: Vision, applications and research challenges D Miorandi, S Sicari, F De Pellegrini, I Chlamtac Ad hoc networks 10 (7), 1497-1516, 2012 | 3651 | 2012 |
Security, privacy and trust in Internet of Things: The road ahead S Sicari, A Rizzardi, LA Grieco, A Coen-Porisini Computer networks 76, 146-164, 2015 | 1500 | 2015 |
IoT-aided robotics applications: Technological implications, target domains and open issues LA Grieco, A Rizzo, S Colucci, S Sicari, G Piro, D Di Paola, G Boggia Computer Communications 54, 32-47, 2014 | 150 | 2014 |
A secure and quality-aware prototypical architecture for the Internet of Things S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini Information Systems 58, 43-55, 2016 | 89 | 2016 |
Assessing the risk of using vulnerable components D Balzarotti, M Monga, S Sicari Quality of Protection, 65-77, 2006 | 87 | 2006 |
A security-and quality-aware system architecture for Internet of Things S Sicari, C Cappiello, F De Pellegrini, D Miorandi, A Coen-Porisini Information Systems Frontiers 18 (4), 665-677, 2016 | 83 | 2016 |
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks S Sicari, LA Grieco, G Boggia, A Coen-Porisini Journal of Systems and Software 85 (1), 152-166, 2012 | 66 | 2012 |
AUPS: An open source AUthenticated Publish/Subscribe system for the Internet of Things A Rizzardi, S Sicari, D Miorandi, A Coen-Porisini Information Systems 62, 29-41, 2016 | 57 | 2016 |
Secure wireless multimedia sensor networks: a survey LA Grieco, G Boggia, S Sicari, P Colombo 2009 third international conference on Mobile ubiquitous computing, systems …, 2009 | 54 | 2009 |
A comparative study of recent wireless sensor network simulators I Minakov, R Passerone, A Rizzardi, S Sicari ACM Transactions on Sensor Networks (TOSN) 12 (3), 1-39, 2016 | 47 | 2016 |
Security policy enforcement for networked smart objects S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini Computer Networks 108, 133-147, 2016 | 40 | 2016 |
REATO: REActing TO Denial of Service attacks in the Internet of Things S Sicari, A Rizzardi, D Miorandi, A Coen-Porisini Computer Networks 137, 37-48, 2018 | 36 | 2018 |
Security games for node localization through verifiable multilateration N Basilico, N Gatti, M Monga, S Sicari IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013 | 30 | 2013 |
A policy enforcement framework for Internet of Things applications in the smart health S Sicari, A Rizzardi, LA Grieco, G Piro, A Coen-Porisini Smart Health 3, 39-74, 2017 | 29 | 2017 |
Assessing the risk of intercepting VoIP calls M Benini, S Sicari Computer Networks 52 (12), 2432-2446, 2008 | 28 | 2008 |
Risk assessment in practice: A real case study M Benini, S Sicari Computer communications 31 (15), 3691-3699, 2008 | 26 | 2008 |
DARE: evaluating Data Accuracy using node REputation S Sicari, A Coen-Porisini, R Riggio Computer Networks 57 (15), 3098-3111, 2013 | 25 | 2013 |
Toward data governance in the internet of things S Sicari, A Rizzardi, C Cappiello, D Miorandi, A Coen-Porisini New advances in the internet of things, 59-74, 2018 | 21 | 2018 |
A secure ICN-IoT architecture S Sicari, A Rizzardi, LA Grieco, A Coen-Porisini 2017 IEEE international conference on communications workshops (ICC …, 2017 | 21 | 2017 |
Networked smart objects: moving data processing closer to the source A Rizzardi, D Miorandi, S Sicari, C Cappiello, A Coen-Porisini International Internet of Things Summit, 28-35, 2015 | 21 | 2015 |