H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 61 Citations 14,520 390 World Ranking 1463 National Ranking 23

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

The scientist’s investigation covers issues in Computer security, Computer network, Wireless sensor network, Android and Encryption. The concepts of his Computer security study are interwoven with issues in Software, The Internet and Internet privacy. His Computer network research integrates issues from Adversary, Denial-of-service attack and Distributed computing.

His Wireless sensor network research includes elements of Default gateway, Key distribution in wireless sensor networks, Smart card, Protocol and Node. His biological study spans a wide range of topics, including Authorization, World Wide Web, Random forest, Ransomware and Mobile computing. In general Encryption, his work in Homomorphic encryption is often linked to Exclusive right linking many areas of study.

His most cited work include:

  • Smart health: A context-aware health paradigm within smart cities (356 citations)
  • A Survey on Security and Privacy Issues of Bitcoin (327 citations)
  • Android Security: A Survey of Issues, Malware Penetration, and Defenses (301 citations)

What are the main themes of his work throughout his whole career to date?

Mauro Conti focuses on Computer security, Computer network, The Internet, Encryption and Cloud computing. The various areas that Mauro Conti examines in his Computer security study include Android and Mobile device. Mauro Conti has researched Computer network in several fields, including Denial-of-service attack and Distributed computing.

His Cryptography research extends to Encryption, which is thematically connected. As part of his studies on Cloud computing, Mauro Conti often connects relevant subjects like Server. His Malware study incorporates themes from Machine learning and Artificial intelligence.

He most often published in these fields:

  • Computer security (42.69%)
  • Computer network (29.46%)
  • The Internet (10.82%)

What were the highlights of his more recent work (between 2020-2021)?

  • Computer security (42.69%)
  • Cloud computing (10.82%)
  • Encryption (11.42%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Cloud computing, Encryption, Real-time computing and Key. His Computer security research incorporates themes from Denial-of-service attack, Software deployment and Use case. His research in Cloud computing intersects with topics in Digital forensics, Computational science, The Internet, Scheduling and Computation.

His Encryption study is concerned with Computer network in general. The study incorporates disciplines such as SYN flood, MAC spoofing and Cryptography in addition to Computer network. Mauro Conti has included themes like Data science, Proof of concept, Data Protection Act 1998 and Vulnerability in his Key study.

Between 2020 and 2021, his most popular works were:

  • Improving Password Guessing via Representation Learning (6 citations)
  • LEChain: A blockchain-based lawful evidence management scheme for digital forensics (4 citations)
  • Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps (2 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Encryption, Artificial intelligence, Real-time computing, Computer vision and Android are his primary areas of study. His work deals with themes such as Digital forensics, Access control, Blockchain, Cloud computing and Computer security model, which intersect with Encryption. His work carried out in the field of Artificial intelligence brings together such families of science as Password, Theoretical computer science and Password cracking.

His Real-time computing study integrates concerns from other disciplines, such as Cruise control, State and Platoon. Many of his studies on Android apply to Cryptography as well.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

A Survey on Security and Privacy Issues of Bitcoin

Mauro Conti;E. Sandeep Kumar;Chhagan Lal;Sushmita Ruj.
IEEE Communications Surveys and Tutorials (2018)

550 Citations

Smart health: A context-aware health paradigm within smart cities

Agusti Solanas;Constantinos Patsakis;Mauro Conti;Ioannis S. Vlachos.
IEEE Communications Magazine (2014)

534 Citations

Android Security: A Survey of Issues, Malware Penetration, and Defenses

Parvez Faruki;Ammar Bharmal;Vijay Laxmi;Vijay Ganmoor.
IEEE Communications Surveys and Tutorials (2015)

488 Citations

Internet of Things security and forensics: Challenges and opportunities

Mauro Conti;Ali Dehghantanha;Katrin Franke;Steve Watson.
Future Generation Computer Systems (2018)

379 Citations

CRePE: context-related policy enforcement for android

Mauro Conti;Vu Thien Nga Nguyen;Bruno Crispo.
international conference on information security (2010)

366 Citations

A Survey of Man In The Middle Attacks

Mauro Conti;Nicola Dragoni;Viktor Lesyk.
IEEE Communications Surveys and Tutorials (2016)

322 Citations

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks

Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
mobile ad hoc networking and computing (2007)

303 Citations

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

Abbas Acar;Hidayet Aksu;A. Selcuk Uluagac;Mauro Conti.
ACM Computing Surveys (2018)

276 Citations

Distributed Detection of Clone Attacks in Wireless Sensor Networks

Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
IEEE Transactions on Dependable and Secure Computing (2011)

230 Citations

FlowFence: practical data protection for emerging IoT application frameworks

Earlence Fernandes;Justin Paupore;Amir Rahmati;Daniel Simionato.
usenix security symposium (2016)

218 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Mauro Conti

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 74

Ali Dehghantanha

Ali Dehghantanha

University of Guelph

Publications: 69

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 46

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 43

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 38

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 31

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 31

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 29

Zheng Yan

Zheng Yan

Shanghai Jiao Tong University

Publications: 29

Bruno Crispo

Bruno Crispo

University of Trento

Publications: 23

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 22

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 19

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 18

J.J. Garcia-Luna-Aceves

J.J. Garcia-Luna-Aceves

University of California, Santa Cruz

Publications: 17

Francisco Falcone

Francisco Falcone

Universidad Publica De Navarra

Publications: 17

Something went wrong. Please try again later.