Items where Author is "Conti, M."
Article
Nanni, M., Andrienko, G. ORCID: 0000-0002-8574-6295, Barabási, A-L. , Boldrini, C., Bonchi, F., Cattuto, C., Chiaromonte, F., Comandé, G., Conti, M., Coté, M., Dignum, F., Dignum, V., Domingo-Ferrer, J., Ferragina, P., Giannotti, F., Guidotti, R., Helbing, D., Kaski, K., Kertesz, J., Lehmann, S., Lepri, B., Lukowicz, P., Matwin, S., Jiménez, D. M., Monreale, A., Morik, K., Oliver, N., Passarella, A., Passerini, A., Pedreschi, D., Pentland, A., Pianesi, F., Pratesi, F., Rinzivillo, S., Ruggieri, S., Siebes, A., Torra, V., Trasarti, R., van den Hoven, J. & Vespignani, A. (2021). Give more data, awareness and control to individual citizens, and they will help COVID-19 containment. Ethics and Information Technology, 23(S1), pp. 1-6. doi: 10.1007/s10676-020-09572-w
Sîrbu, A., Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N. ORCID: 0000-0003-3313-1560 , Boldrini, C., Conti, M., Giannotti, F., Guidotti, R., Bertoli, S., Kim, J., Muntean, C. I., Pappalardo, L., Passarella, A., Pedreschi, D., Pollacci, L., Pratesi, F. & Sharma, R. (2020). Human migration: the big data perspective. International Journal of Data Science and Analytics, 11(4), pp. 341-360. doi: 10.1007/s41060-020-00213-5
Somani, G., Gaur, M. S., Sanghi, D. , Conti, M. & Rajarajan, M. (2017). Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), pp. 959-973. doi: 10.1109/tdsc.2017.2763160
Idrees, F., Rajarajan, M., Conti, M. , Chen, T. & Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011
Somani, G., Gaur, M. S., Sanghi, D. , Conti, M., Rajarajan, M. & Buyya, R. (2017). Combating DDoS attacks in the cloud: Requirements, trends, and future directions. IEEE Cloud Computing, 4(1), pp. 22-32. doi: 10.1109/mcc.2017.14
Gajrani, J., Tripathi, M., Laxmi, V. , Gaur, M. S., Conti, M. & Rajarajan, M. (2017). sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 48, pp. 854-860. doi: 10.1109/ccnc.2017.7983245
Somani, G., Gaur, M. S., Sanghi, D. , Conti, M. & Rajarajan, M. (2016). DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers and Electrical Engineering, 59, pp. 165-179. doi: 10.1016/j.compeleceng.2016.12.004
Li, F., Rahulamathavan, Y., Conti, M. & Rajarajan, M. (2015). Robust access control framework for mobile cloud computing network. Computer Communications, 68(Sept), pp. 61-72. doi: 10.1016/j.comcom.2015.07.005
Naval, S., Laxmi, V., Rajarajan, M. , Gaur, M. S. & Conti, M. (2015). Employing Program Semantics for Malware Detection. IEEE Transactions on Information Forensics and Security, 10(12), pp. 2591-2604. doi: 10.1109/tifs.2015.2469253
Faruki, P., Bharmal, A., Laxmi, V. , Ganmoor, V., Gaur, M. S., Conti, M. & Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials, 17(2), pp. 998-1022. doi: 10.1109/comst.2014.2386139