Sfoglia per Autore
A key agreement protocol for P2P VoIP applications
2009-01-01 Pecori, R.; Veltri, L.
A Peer-to-Peer Secure VoIP Architecture
2011-01-01 Cirani, Simone; Pecori, Riccardo; Veltri, Luca
A PKI-free key agreement protocol for P2P VoIP applications
2012-01-01 Pecori, Riccardo
Trust-based routing for Kademlia in a sybil scenario
2014-01-01 Pecori, Riccardo; Veltri, Luca
A statistical blind technique for recognition of internet traffic with dependence enforcement
2014-01-01 Pecori, Riccardo; Veltri, Luca
Trust-based storage in a Kademlia network infected by Sybils
2015-01-01 Pecori, Riccardo
A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems
2015-01-01 Pecori, Riccardo
Educational Big Data Mining: How to Enhance Virtual Learning Environments
2016-01-01 Ducange, Pietro; Pecori, Riccardo; Sarti, Luigi; Vecchio, Massimo
3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications
2016-01-01 Pecori, Riccardo; Veltri, Luca
Efficient Search of Relevant Structures in Complex Systems
2016-01-01 Sani, Laura; Amoretti, Michele; Vicari, Emilio; Mordonini, Monica; Pecori, Riccardo; Roli, Andrea; Villani, Marco; Cagnoni, Stefano; Serra, Roberto
S-Kademlia: a Trust and Reputation Method to Mitigate a Sybil Attack in Kademlia
2016-01-01 Pecori, Riccardo
GPU-Based Parallel Search of Relevant Variable Sets in Complex Systems
2017-01-01 Vicari, Emilio; Amoretti, Michele; Sani, Laura; Mordonini, Monica; Pecori, Riccardo; Roli, Andrea; Villani, Marco; Cagnoni, Stefano; Serra, Roberto
A novel approach for internet traffic classification based on multi-objective evolutionary fuzzy classifiers
2017-01-01 Ducange, Pietro; Mannara, Giuseppe; Marcelloni, Francesco; Pecori, Riccardo; Vecchio, Massimo
The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices
2017-01-01 Perrone, Giovanni; Vecchio, Massimo; Pecori, Riccardo; Giaffreda, Raffaele
Searching Relevant Variable Subsets in Complex Systems Using K-Means PSO
2018-01-01 Silvestri, Gianluigi; Sani, Laura; Amoretti, Michele; Pecori, Riccardo; Vicari, Emilio; Mordonini, Monica; Cagnoni, Stefano
Can the Relevance Index be Used to Evolve Relevant Feature Sets?
2018-01-01 Sani, Laura; Pecori, Riccardo; Vicari, Emilio; Amoretti, Michele; Mordonini, Monica; Cagnoni, Stefano
An Iterative Information-Theoretic Approach to the Detection of Structures in Complex Systems
2018-01-01 Marco, Villani; Sani, Laura; Pecori, Riccardo; Amoretti, Michele; Roli, Andrea; Mordonini, Monica; Serra, Roberto; Cagnoni, Stefano
A Relevance Index Method to Infer Global Properties of Biological Networks
2018-01-01 Villani, Marco; Sani, Laura; Amoretti, Michele; Vicari, Emilio; Pecori, Riccardo; Mordonini, Monica; Cagnoni, Stefano; Serra, Roberto
MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
2018-01-01 Calabretta, Marco; Pecori, Riccardo; Vecchio, Massimo; Veltri, Luca
A Token-based Protocol for Securing MQTT Communications
2018-01-01 Calabretta, Marco; Pecori, Riccardo; Veltri, Luca
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A key agreement protocol for P2P VoIP applications | 1-gen-2009 | Pecori, R.; Veltri, L. | |
A Peer-to-Peer Secure VoIP Architecture | 1-gen-2011 | Cirani, Simone; Pecori, Riccardo; Veltri, Luca | |
A PKI-free key agreement protocol for P2P VoIP applications | 1-gen-2012 | Pecori, Riccardo | |
Trust-based routing for Kademlia in a sybil scenario | 1-gen-2014 | Pecori, Riccardo; Veltri, Luca | |
A statistical blind technique for recognition of internet traffic with dependence enforcement | 1-gen-2014 | Pecori, Riccardo; Veltri, Luca | |
Trust-based storage in a Kademlia network infected by Sybils | 1-gen-2015 | Pecori, Riccardo | |
A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems | 1-gen-2015 | Pecori, Riccardo | |
Educational Big Data Mining: How to Enhance Virtual Learning Environments | 1-gen-2016 | Ducange, Pietro; Pecori, Riccardo; Sarti, Luigi; Vecchio, Massimo | |
3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications | 1-gen-2016 | Pecori, Riccardo; Veltri, Luca | |
Efficient Search of Relevant Structures in Complex Systems | 1-gen-2016 | Sani, Laura; Amoretti, Michele; Vicari, Emilio; Mordonini, Monica; Pecori, Riccardo; Roli, Andrea; Villani, Marco; Cagnoni, Stefano; Serra, Roberto | |
S-Kademlia: a Trust and Reputation Method to Mitigate a Sybil Attack in Kademlia | 1-gen-2016 | Pecori, Riccardo | |
GPU-Based Parallel Search of Relevant Variable Sets in Complex Systems | 1-gen-2017 | Vicari, Emilio; Amoretti, Michele; Sani, Laura; Mordonini, Monica; Pecori, Riccardo; Roli, Andrea; Villani, Marco; Cagnoni, Stefano; Serra, Roberto | |
A novel approach for internet traffic classification based on multi-objective evolutionary fuzzy classifiers | 1-gen-2017 | Ducange, Pietro; Mannara, Giuseppe; Marcelloni, Francesco; Pecori, Riccardo; Vecchio, Massimo | |
The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices | 1-gen-2017 | Perrone, Giovanni; Vecchio, Massimo; Pecori, Riccardo; Giaffreda, Raffaele | |
Searching Relevant Variable Subsets in Complex Systems Using K-Means PSO | 1-gen-2018 | Silvestri, Gianluigi; Sani, Laura; Amoretti, Michele; Pecori, Riccardo; Vicari, Emilio; Mordonini, Monica; Cagnoni, Stefano | |
Can the Relevance Index be Used to Evolve Relevant Feature Sets? | 1-gen-2018 | Sani, Laura; Pecori, Riccardo; Vicari, Emilio; Amoretti, Michele; Mordonini, Monica; Cagnoni, Stefano | |
An Iterative Information-Theoretic Approach to the Detection of Structures in Complex Systems | 1-gen-2018 | Marco, Villani; Sani, Laura; Pecori, Riccardo; Amoretti, Michele; Roli, Andrea; Mordonini, Monica; Serra, Roberto; Cagnoni, Stefano | |
A Relevance Index Method to Infer Global Properties of Biological Networks | 1-gen-2018 | Villani, Marco; Sani, Laura; Amoretti, Michele; Vicari, Emilio; Pecori, Riccardo; Mordonini, Monica; Cagnoni, Stefano; Serra, Roberto | |
MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities | 1-gen-2018 | Calabretta, Marco; Pecori, Riccardo; Vecchio, Massimo; Veltri, Luca | |
A Token-based Protocol for Securing MQTT Communications | 1-gen-2018 | Calabretta, Marco; Pecori, Riccardo; Veltri, Luca |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile