MQTTset, a new dataset for machine learning techniques on MQTT I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso Sensors 20 (22), 6578, 2020 | 178 | 2020 |
SlowITe, a novel denial of service attack affecting MQTT I Vaccari, M Aiello, E Cambiaso Sensors 20 (10), 2932, 2020 | 71 | 2020 |
High blood flow shear stress values are associated with circulating tumor cells cluster disaggregation in a multi-channel microfluidic device A Marrella, A Fedi, G Varani, I Vaccari, M Fato, G Firpo, P Guida, N Aceto, ... PLoS One 16 (1), e0245536, 2021 | 47 | 2021 |
A generative adversarial network (GAN) technique for internet of medical things data I Vaccari, V Orani, A Paglialonga, E Cambiaso, M Mongelli Sensors 21 (11), 3726, 2021 | 46 | 2021 |
Remotely exploiting at command attacks on zigbee networks I Vaccari, E Cambiaso, M Aiello Security and Communication Networks 2017, 2017 | 41 | 2017 |
Darknet Security: A Categorization of Attacks to the Tor Network. E Cambiaso, I Vaccari, L Patti, M Aiello ITASEC, 1-12, 2019 | 38 | 2019 |
Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz, GA Shah, T Bakhshi, ... Sensors 21 (14), 4816, 2021 | 35 | 2021 |
Slowtt: A slow denial of service against iot networks I Vaccari, M Aiello, E Cambiaso Information 11 (9), 452, 2020 | 28 | 2020 |
3D fluid-dynamic ovarian cancer model resembling systemic drug administration for efficacy assay A Marrella, G Varani, M Aiello, I Vaccari, C Vitale, M Mojzisek, C Degrassi, ... ALTEX-Alternatives to animal experimentation 38 (1), 82-94, 2021 | 24 | 2021 |
Evaluating security of low-power internet of things networks I Vaccari, E Cambiaso, M Aiello International Journal of Computing and Digital Systems 8 (02), 101-114, 2019 | 20 | 2019 |
Exploiting Internet of Things protocols for malicious data exfiltration activities I Vaccari, S Narteni, M Aiello, M Mongelli, E Cambiaso IEEE Access 9, 104261-104280, 2021 | 15 | 2021 |
Detection and classification of slow DoS attacks targeting network servers E Cambiaso, M Aiello, M Mongelli, I Vaccari Proceedings of the 15th International Conference on Availability …, 2020 | 13 | 2020 |
DoS attacks in available MQTT implementations: investigating the impact on brokers and devices, and supported anti-DoS protections U Morelli, I Vaccari, S Ranise, E Cambiaso Proceedings Of The 16th International Conference On Availability …, 2021 | 10 | 2021 |
eXplainable and reliable against adversarial machine learning in data analytics I Vaccari, A Carlevaro, S Narteni, E Cambiaso, M Mongelli IEEE Access 10, 83949-83970, 2022 | 8 | 2022 |
From explainable to reliable artificial intelligence S Narteni, M Ferretti, V Orani, I Vaccari, E Cambiaso, M Mongelli International Cross-Domain Conference for Machine Learning and Knowledge …, 2021 | 8 | 2021 |
Challenges and Opportunities of IoT and AI in Pneumology M Mongelli, V Orani, E Cambiaso, I Vaccari, A Paglialonga, F Braido, ... 2020 23rd Euromicro Conference on Digital System Design (DSD), 285-292, 2020 | 8 | 2020 |
Ippo: A privacy-aware architecture for decentralized data-sharing M Aiello, E Cambiaso, R Canonico, L Maccari, M Mellia, A Pescapè, ... arXiv preprint arXiv:2001.06420, 2020 | 7 | 2020 |
Sensitivity of logic learning machine for reliability in safety-critical systems S Narteni, V Orani, I Vaccari, E Cambiaso, M Mongelli IEEE Intelligent Systems 37 (5), 66-74, 2022 | 6 | 2022 |
Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service. S Narteni, I Vaccari, M Mongelli, M Aiello, E Cambiaso J. Internet Serv. Inf. Secur. 11 (3), 30-46, 2021 | 5 | 2021 |
Perpetrate cyber-attacks using IoT devices as attack vector: the ESP8266 use case I Vaccari, S Narteni, M Mongelli, M Aiello, E Cambiaso CEUR Workshop Proceedings 2940, 35-46, 2021 | 4 | 2021 |