Search

Your search keyword '"Brighente, Alessandro"' showing total 146 results

Search Constraints

Start Over You searched for: Author "Brighente, Alessandro" Remove constraint Author: "Brighente, Alessandro"
146 results on '"Brighente, Alessandro"'

Search Results

1. Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check

2. The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach

3. Obfuscated Location Disclosure for Remote ID Enabled Drones

4. Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data

5. GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

6. Reduce to the MACs -- Privacy Friendly Generic Probe Requests

7. Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?

8. Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments

9. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids

10. Penetration Testing of 5G Core Network Web Technologies

11. A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

12. DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles

13. LoVe is in the Air -- Location Verification of ADS-B Signals using Distributed Public Sensors

14. EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks

15. When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems

16. Beware of Pickpockets: A Practical Attack against Blocking Cards

17. Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

18. One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection

19. Hyperloop: A Cybersecurity Perspective

20. Identity-Based Authentication for On-Demand Charging of Electric Vehicles

21. Hide and Seek -- Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles

22. QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

23. VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks

24. FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

25. Unmanned Aerial Vehicles Meet Reflective Intelligent Surfaces to Improve Coverage and Secrecy

26. Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit

28. EVScout2.0: Electric Vehicle Profiling Through Charging Profile

29. Interference Prediction for Low-Complexity Link Adaptation in Beyond 5G Ultra-Reliable Low-Latency Communications

30. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

31. Interference Distribution Prediction for Link Adaptation in Ultra-Reliable Low-Latency Communications

34. Machine Learning For In-Region Location Verification In Wireless Networks

35. Location-Verification and Network Planning via Machine Learning Approaches

38. Centralized and Distributed Sparsification for Low-Complexity Message Passing Algorithm in C-RAN Architectures

39. Beamforming and Scheduling for mmWave Downlink Sparse Virtual Channels With Non-Orthogonal and Orthogonal Multiple Access

40. Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand

41. Multi-RIS Aided VLC Physical Layer Security for 6G Wireless Networks

42. Evaporative Angle: A Generative Approach to Mitigate Jamming Attacks in DOA Estimation

50. BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

Catalog

Books, media, physical & digital resources