Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Di Pietro, Roberto Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Titans’ revenge: detecting Zeus via its own flaws
Riccardi M., Di Pietro R., Palanques M., Vila J. Computer Networks 57(2): 422-435, 2013.  Type: Article

Malware has become an underground industry, rapidly evolving in response to attempts by computer security experts and organizations to keep it in check. One of the most notorious examples of this pattern is Zeus malware, and specifical...
...
Jul 30 2013  
  Collaborative authentication in unattended WSNs
Di Pietro R., Soriente C., Spognardi A., Tsudik G.  WiSec 2009 (Proceedings of the 2nd ACM Conference on Wireless Network Security, Zurich, Switzerland, Mar 16-19, 2009) 237-244, 2009.  Type: Proceedings

The concept of an unattended wireless sensor network (UWSN) is based on a mobile sink visiting a network to collect sensed data. This data is stored locally on the UWSN’s nodes until the next sink visit. A problem with UWSNs ...
...
May 19 2009  
  Intrusion detection systems
Di Pietro R., Mancini L., Springer Publishing Company, Incorporated, 2008. 250 pp.  Type: Book (9780387772653)

Intrusion detection systems (IDSs) are a keystone in network security. This collection of seven papers, plus a glossary and a two-page editorial introduction, presents the state of the art in IDSs....
...
Jan 14 2009  
  Security and privacy issues of handheld and wearable wireless devices
Di Pietro R., Mancini L. Communications of the ACM 46(9): 74-79, 2003.  Type: Article

Di Pietro and Mancini correctly call into question the methods used to maintain security and privacy, as handheld wearable wireless (HWW) devices come into use to connect our personal devices, and even our personal health and financial...
...
Dec 15 2003  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy