2023 - Research.com Computer Science in Italy Leader Award
The scientist’s investigation covers issues in Computer security, Computer network, Wireless sensor network, Android and Encryption. The concepts of his Computer security study are interwoven with issues in Software, The Internet and Internet privacy. His Computer network research integrates issues from Adversary, Denial-of-service attack and Distributed computing.
His Wireless sensor network research includes elements of Default gateway, Key distribution in wireless sensor networks, Smart card, Protocol and Node. His biological study spans a wide range of topics, including Authorization, World Wide Web, Random forest, Ransomware and Mobile computing. In general Encryption, his work in Homomorphic encryption is often linked to Exclusive right linking many areas of study.
Mauro Conti focuses on Computer security, Computer network, The Internet, Encryption and Cloud computing. The various areas that Mauro Conti examines in his Computer security study include Android and Mobile device. Mauro Conti has researched Computer network in several fields, including Denial-of-service attack and Distributed computing.
His Cryptography research extends to Encryption, which is thematically connected. As part of his studies on Cloud computing, Mauro Conti often connects relevant subjects like Server. His Malware study incorporates themes from Machine learning and Artificial intelligence.
His primary areas of study are Computer security, Cloud computing, Encryption, Real-time computing and Key. His Computer security research incorporates themes from Denial-of-service attack, Software deployment and Use case. His research in Cloud computing intersects with topics in Digital forensics, Computational science, The Internet, Scheduling and Computation.
His Encryption study is concerned with Computer network in general. The study incorporates disciplines such as SYN flood, MAC spoofing and Cryptography in addition to Computer network. Mauro Conti has included themes like Data science, Proof of concept, Data Protection Act 1998 and Vulnerability in his Key study.
Encryption, Artificial intelligence, Real-time computing, Computer vision and Android are his primary areas of study. His work deals with themes such as Digital forensics, Access control, Blockchain, Cloud computing and Computer security model, which intersect with Encryption. His work carried out in the field of Artificial intelligence brings together such families of science as Password, Theoretical computer science and Password cracking.
His Real-time computing study integrates concerns from other disciplines, such as Cruise control, State and Platoon. Many of his studies on Android apply to Cryptography as well.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Survey on Security and Privacy Issues of Bitcoin
Mauro Conti;E. Sandeep Kumar;Chhagan Lal;Sushmita Ruj.
IEEE Communications Surveys and Tutorials (2018)
Smart health: A context-aware health paradigm within smart cities
Agusti Solanas;Constantinos Patsakis;Mauro Conti;Ioannis S. Vlachos.
IEEE Communications Magazine (2014)
Android Security: A Survey of Issues, Malware Penetration, and Defenses
Parvez Faruki;Ammar Bharmal;Vijay Laxmi;Vijay Ganmoor.
IEEE Communications Surveys and Tutorials (2015)
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Abbas Acar;Hidayet Aksu;A. Selcuk Uluagac;Mauro Conti.
ACM Computing Surveys (2018)
Internet of Things security and forensics: Challenges and opportunities
Mauro Conti;Ali Dehghantanha;Katrin Franke;Steve Watson.
Future Generation Computer Systems (2018)
A Survey of Man In The Middle Attacks
Mauro Conti;Nicola Dragoni;Viktor Lesyk.
IEEE Communications Surveys and Tutorials (2016)
A Survey on Security and Privacy Issues of Bitcoin
Mauro Conti;Sandeep Kumar E;Chhagan Lal;Sushmita Ruj.
arXiv: Cryptography and Security (2017)
CRePE: context-related policy enforcement for android
Mauro Conti;Vu Thien Nga Nguyen;Bruno Crispo.
international conference on information security (2010)
Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking
Alberto Compagno;Mauro Conti;Paolo Gasti;Gene Tsudik.
local computer networks (2013)
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
mobile ad hoc networking and computing (2007)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Hamad bin Khalifa University
University of Trento
University of Surrey
Sapienza University of Rome
University of California, Irvine
University of Washington
Technical University of Darmstadt
University of Guelph
Fondazione Bruno Kessler
Missouri University of Science and Technology
Zhejiang University
Huazhong University of Science and Technology
Georgia Institute of Technology
European Synchrotron Radiation Facility
University of California, Los Angeles
Forschungszentrum Jülich
University of Alberta
University of Arizona
Hokkaido University
Johns Hopkins University
Karolinska Institute
Newcastle University
University of California, Irvine
University Hospital Heidelberg
Curtin University
Boston Children's Hospital