The scientist’s investigation covers issues in Computer security, Computer network, Wireless sensor network, Android and Encryption. The concepts of his Computer security study are interwoven with issues in Software, The Internet and Internet privacy. His Computer network research integrates issues from Adversary, Denial-of-service attack and Distributed computing.
His Wireless sensor network research includes elements of Default gateway, Key distribution in wireless sensor networks, Smart card, Protocol and Node. His biological study spans a wide range of topics, including Authorization, World Wide Web, Random forest, Ransomware and Mobile computing. In general Encryption, his work in Homomorphic encryption is often linked to Exclusive right linking many areas of study.
Mauro Conti focuses on Computer security, Computer network, The Internet, Encryption and Cloud computing. The various areas that Mauro Conti examines in his Computer security study include Android and Mobile device. Mauro Conti has researched Computer network in several fields, including Denial-of-service attack and Distributed computing.
His Cryptography research extends to Encryption, which is thematically connected. As part of his studies on Cloud computing, Mauro Conti often connects relevant subjects like Server. His Malware study incorporates themes from Machine learning and Artificial intelligence.
His primary areas of study are Computer security, Cloud computing, Encryption, Real-time computing and Key. His Computer security research incorporates themes from Denial-of-service attack, Software deployment and Use case. His research in Cloud computing intersects with topics in Digital forensics, Computational science, The Internet, Scheduling and Computation.
His Encryption study is concerned with Computer network in general. The study incorporates disciplines such as SYN flood, MAC spoofing and Cryptography in addition to Computer network. Mauro Conti has included themes like Data science, Proof of concept, Data Protection Act 1998 and Vulnerability in his Key study.
Encryption, Artificial intelligence, Real-time computing, Computer vision and Android are his primary areas of study. His work deals with themes such as Digital forensics, Access control, Blockchain, Cloud computing and Computer security model, which intersect with Encryption. His work carried out in the field of Artificial intelligence brings together such families of science as Password, Theoretical computer science and Password cracking.
His Real-time computing study integrates concerns from other disciplines, such as Cruise control, State and Platoon. Many of his studies on Android apply to Cryptography as well.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Survey on Security and Privacy Issues of Bitcoin
Mauro Conti;E. Sandeep Kumar;Chhagan Lal;Sushmita Ruj.
IEEE Communications Surveys and Tutorials (2018)
Smart health: A context-aware health paradigm within smart cities
Agusti Solanas;Constantinos Patsakis;Mauro Conti;Ioannis S. Vlachos.
IEEE Communications Magazine (2014)
Android Security: A Survey of Issues, Malware Penetration, and Defenses
Parvez Faruki;Ammar Bharmal;Vijay Laxmi;Vijay Ganmoor.
IEEE Communications Surveys and Tutorials (2015)
Internet of Things security and forensics: Challenges and opportunities
Mauro Conti;Ali Dehghantanha;Katrin Franke;Steve Watson.
Future Generation Computer Systems (2018)
CRePE: context-related policy enforcement for android
Mauro Conti;Vu Thien Nga Nguyen;Bruno Crispo.
international conference on information security (2010)
A Survey of Man In The Middle Attacks
Mauro Conti;Nicola Dragoni;Viktor Lesyk.
IEEE Communications Surveys and Tutorials (2016)
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
mobile ad hoc networking and computing (2007)
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Abbas Acar;Hidayet Aksu;A. Selcuk Uluagac;Mauro Conti.
ACM Computing Surveys (2018)
Distributed Detection of Clone Attacks in Wireless Sensor Networks
Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
IEEE Transactions on Dependable and Secure Computing (2011)
FlowFence: practical data protection for emerging IoT application frameworks
Earlence Fernandes;Justin Paupore;Amir Rahmati;Daniel Simionato.
usenix security symposium (2016)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
Hamad bin Khalifa University
University of Trento
Sapienza University of Rome
University of California, Irvine
University of Washington
TU Darmstadt
University of Guelph
Fondazione Bruno Kessler
Missouri University of Science and Technology
University of Padua
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: