No description
-
2013 (v1)PublicationUploaded on: April 14, 2023
-
2011 (v1)Publication
ABSTRACT – Due to the proliferation of wideband and Internet technologies in the last decade, the risk of security threats hidden in single packets arose. This had taken ISP networks to the adoption of Intrusion Detection Systems, enhancing the basic routing with packets inspection, in order to provide a secure connection service. Currently,...
Uploaded on: March 27, 2023 -
2013 (v1)Publication
No description
Uploaded on: April 14, 2023 -
2013 (v1)Publication
No description
Uploaded on: March 27, 2023 -
2013 (v1)Publication
No description
Uploaded on: April 14, 2023 -
2014 (v1)Publication
The 4W project system allows providing users with location and time contextualized cues that are generated automatically starting from user expressed needs. The system comprises a server side engine capable of reasoning to find out which location categories have to be searched for and a mobile device to track user location and provide...
Uploaded on: April 14, 2023 -
2014 (v1)Publication
No description
Uploaded on: March 27, 2023 -
2016 (v1)Publication
Network attacks and cyber-security breaches may be the cause of huge monetary damages in the modern information-based economy; thus, the need for network security is stronger than ever as it is the need for full traffic sanitization. Nonetheless, the purge of malicious packets is still too often relegated to the destination of the attacks...
Uploaded on: April 14, 2023 -
2015 (v1)Publication
Content Delivery Network (CDN) Systems share many similarities with On-line Markets (OM), since they both provide a way to acquire something (be it information or a physical good) whose quality needs to be certified in order to provide consumer protection. In most common implementations the quality is guaranteed by a central node that provides...
Uploaded on: March 27, 2023 -
2014 (v1)Publication
Since its inception, the field of Green, Energy-Aware Security (GEAS) has gathered momentum and has seen many interesting developments in some of its different declinations. In this paper we will analyze some of the most recent evolutions and we will summarize the current state of the art describing some of the most interesting and promising...
Uploaded on: December 2, 2022 -
2015 (v1)Publication
The increasing adoption of mobile devices as the preferred tool to access the Internet imposes to deepen the investigation of security aspects. In parallel, their power constrained nature must be explicitly considered in order to analyze security in an effective and comprehensive manner. This aspect, which is often neglected in the literature,...
Uploaded on: April 14, 2023 -
2015 (v1)Publication
This paper investigates the feasibility of constructing power-consumption-based sensors for the identification of security threats (e.g. battery-drain attacks) on Android based mobile devices. In particular, this paper proposes a measurement methodology and high-level models for the energy consumption of two very important hardware subsystems...
Uploaded on: March 27, 2023 -
2013 (v1)Publication
No description
Uploaded on: April 14, 2023 -
1996 (v1)Publication
No description
Uploaded on: April 14, 2023