Search
for Author
All Reviews
Di Pietro, Roberto
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
Titans’ revenge: detecting Zeus via its own flaws
Riccardi M., Di Pietro R., Palanques M., Vila J. Computer Networks 57(2): 422-435, 2013. Type: Article
Malware has become an underground industry, rapidly evolving in response to attempts by computer security experts and organizations to keep it in check. One of the most notorious examples of this pattern is Zeus malware, and specifical...
...
Jul 30 2013
Collaborative authentication in unattended WSNs
Di Pietro R., Soriente C., Spognardi A., Tsudik G. WiSec 2009 (Proceedings of the 2nd ACM Conference on Wireless Network Security, Zurich, Switzerland, Mar 16-19, 2009) 237-244, 2009. Type: Proceedings
The concept of an unattended wireless sensor network (UWSN) is based on a mobile sink visiting a network to collect sensed data. This data is stored locally on the UWSN’s nodes until the next sink visit. A problem with UWSNs ...
...
May 19 2009
Intrusion detection systems
Di Pietro R., Mancini L., Springer Publishing Company, Incorporated, 2008. 250 pp. Type: Book (9780387772653)
Intrusion detection systems (IDSs) are a keystone in network security. This collection of seven papers, plus a glossary and a two-page editorial introduction, presents the state of the art in IDSs....
...
Jan 14 2009
Security and privacy issues of handheld and wearable wireless devices
Di Pietro R., Mancini L. Communications of the ACM 46(9): 74-79, 2003. Type: Article
Di Pietro and Mancini correctly call into question the methods used to maintain security and privacy, as handheld wearable wireless (HWW) devices come into use to connect our personal devices, and even our personal health and financial...
...
Dec 15 2003
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy