A survey of architectures and scenarios in satellite‐based wireless sensor networks: system design aspects N Celandroni, E Ferro, A Gotta, G Oligeri, C Roseti, M Luglio, I Bisio, ... International Journal of Satellite Communications and Networking 31 (1), 1-38, 2013 | 109 | 2013 |
Jamming Mitigation in Cognitive Radio Networks R Di Pietro, G Oligeri IEEE Network, 2013 | 76 | 2013 |
Intrusion-resilience in mobile unattended WSNs R Di Pietro, G Oligeri, C Soriente, G Tsudik 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 47 | 2010 |
Frame error model in rural Wi-Fi networks P Barsocchi, G Oligeri, F Potorti 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2007 | 35 | 2007 |
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments) G Oligeri, S Sciancalepore, OA Ibrahim, R Di Pietro Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 33* | 2019 |
Securing mobile unattended WSNs against a mobile adversary R Di Pietro, G Oligeri, C Soriente, G Tsudik 29th IEEE Symposium on Reliable and Distributed Systems, 2010. SRDS2010., 11-20, 2010 | 33 | 2010 |
United we stand: intrusion-resilience in mobile unattended WSNs R Di Pietro, G Oligeri, C Soriente, G Tsudik IEEE Transaction on Mobile Computing 12 (7), 1456-1458, 2012 | 32 | 2012 |
Detecting Drones Status via Encrypted Traffic Analysis S Sciancalepore, OA Ibrahim, G Oligeri, R Di Pietro | 29* | 2019 |
Your culture is in your password: An analysis of a demographically-diverse password dataset M AlSabah, G Oligeri, R Riley Computers & security 77, 427-441, 2018 | 29 | 2018 |
Measurement-based frame error model for simulating outdoor Wi-Fi networks P Barsocchi, G Oligeri, F Potortì IEEE Transactions on Wireless Communications. 8 (3), 1154-1158, 2009 | 28 | 2009 |
PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis S Sciancalepore, OA Ibrahim, G Oligeri, R Di Pietro Computer Networks 168, 107044, 2020 | 21 | 2020 |
Strength of crowd (SOC)—Defeating a reactive jammer in IoT with decoy messages S Sciancalepore, G Oligeri, R Di Pietro Sensors 18 (10), 3492, 2018 | 19 | 2018 |
Silence is golden: Exploiting jamming and radio silence to communicate RD Pietro, G Oligeri ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-24, 2015 | 19 | 2015 |
Cryptomining makes noise: Detecting cryptojacking via Machine Learning M Caprolu, S Raponi, G Oligeri, R Di Pietro Computer Communications 171, 126-139, 2021 | 18* | 2021 |
Leveraging jamming to help drones complete their mission P Tedeschi, G Oligeri, R Di Pietro IEEE Access 8, 5049-5064, 2019 | 18 | 2019 |
A cyber-physical approach to secret key generation in smart environments P Barsocchi, S Chessa, I Martinovic, G Oligeri Journal of Ambient Intelligence and Humanized Computing 4 (1), 1-16, 2013 | 18 | 2013 |
COKE: Crypto-less Over-the-air Key Establishment R Di Pietro, G Oligeri IEEE Transactions on Information Forensics and Security 8 (1), 163-173, 2013 | 17 | 2013 |
GNSS spoofing detection via opportunistic IRIDIUM signals G Oligeri, S Sciancalepore, R Di Pietro Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 16 | 2020 |
Validation for 802.11 b wireless channel measurements P Barsocchi, G Oligeri, F Potortı Technical report, 2006 | 16 | 2006 |
Mobile application security for video streaming authentication and data integrity combining digital signature and watermarking techniques S Chessa, R Di Pietro, E Ferro, G Giunta, G Oligeri IEEE 65th Vehicular Technology Conference, 2007. VTC2007-Spring., 634-638, 2007 | 15 | 2007 |