D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 37 Citations 8,268 190 World Ranking 5296 National Ranking 7

Research.com Recognitions

Awards & Achievements

2019 - ACM Distinguished Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Roberto Di Pietro mainly focuses on Computer network, Wireless sensor network, Key distribution in wireless sensor networks, Distributed computing and Computer security. The study of Computer network is intertwined with the study of Secrecy in a number of ways. Roberto Di Pietro works mostly in the field of Wireless sensor network, limiting it down to topics relating to Node and, in certain cases, Resilience, Encryption, Wireless and Set, as a part of the same area of interest.

His work on Mobile wireless sensor network as part of general Key distribution in wireless sensor networks research is frequently linked to Random graph and Constant, bridging the gap between disciplines. His study explores the link between Distributed computing and topics such as Cryptography that cross with problems in Visual sensor network, Sensor node and Wireless WAN. His research in Computer security intersects with topics in Virtual machine and Virtualization, Cloud computing, Cloud computing security.

His most cited work include:

  • Scalable and efficient provable data possession (852 citations)
  • Smart health: A context-aware health paradigm within smart cities (356 citations)
  • Secure virtualization for cloud computing (306 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Computer network, Wireless sensor network, Distributed computing and Adversary. His research investigates the connection with Computer security and areas like Cloud computing security which intersect with concerns in Virtualization. In his research, Key is intimately related to Cryptography, which falls under the overarching field of Computer network.

Roberto Di Pietro has researched Wireless sensor network in several fields, including Context, Key distribution in wireless sensor networks, Probabilistic logic and Survivability. Roberto Di Pietro studies Key distribution in wireless sensor networks, namely Mobile wireless sensor network. His Encryption study combines topics from a wide range of disciplines, such as Wireless and Scalability.

He most often published in these fields:

  • Computer security (38.26%)
  • Computer network (31.44%)
  • Wireless sensor network (16.29%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (38.26%)
  • Real-time computing (4.17%)
  • Computer network (31.44%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer security, Real-time computing, Computer network, Authentication and Context. The Computer security study combines topics in areas such as Virtualization and Service. The study incorporates disciplines such as Overhead, Network packet and Haystack in addition to Real-time computing.

Roberto Di Pietro focuses mostly in the field of Authentication, narrowing it down to matters related to Satellite radio and, in some cases, Wireless. Roberto Di Pietro interconnects Field and Data science in the investigation of issues within Context. Roberto Di Pietro studied Protocol stack and Cryptography that intersect with Lightweight protocol, Scalability, Distributed computing and Hash function.

Between 2019 and 2021, his most popular works were:

  • A Survey on Computational Propaganda Detection. (24 citations)
  • LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications (11 citations)
  • PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis (10 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

His main research concerns Computer security, Cryptography, Overhead, Real-time computing and Drone. His work on Computer security is being expanded to include thematically relevant topics such as Anomaly detection. The various areas that he examines in his Cryptography study include Trusted third party, Protocol stack, Key-agreement protocol and Data science.

In his study, Computer network is strongly linked to Privacy preserving, which falls under the umbrella field of Overhead. His Computer network study integrates concerns from other disciplines, such as Mobile device and Tracing. Roberto Di Pietro has researched Real-time computing in several fields, including Packet loss, Network packet, Evasion, Firmware and Haystack.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Scalable and efficient provable data possession

Giuseppe Ateniese;Roberto Di Pietro;Luigi V. Mancini;Gene Tsudik.
international workshop on security (2008)

1511 Citations

Smart health: A context-aware health paradigm within smart cities

Agusti Solanas;Constantinos Patsakis;Mauro Conti;Ioannis S. Vlachos.
IEEE Communications Magazine (2014)

534 Citations

Secure virtualization for cloud computing

Flavio Lombardi;Roberto Di Pietro.
Journal of Network and Computer Applications (2011)

528 Citations

Random key-assignment for secure Wireless Sensor Networks

Roberto Di Pietro;Luigi V. Mancini;Alessandro Mei.
security of ad hoc and sensor networks (2003)

409 Citations

A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks

Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
mobile ad hoc networking and computing (2007)

303 Citations

Boosting efficiency and security in proof of ownership for deduplication

Roberto Di Pietro;Alessandro Sorniotti.
computer and communications security (2012)

271 Citations

Fame for sale

Stefano Cresci;Roberto Di Pietro;Marinella Petrocchi;Angelo Spognardi.
decision support systems (2015)

234 Citations

Distributed Detection of Clone Attacks in Wireless Sensor Networks

Mauro Conti;Roberto Di Pietro;Luigi Vincenzo Mancini;Alessandro Mei.
IEEE Transactions on Dependable and Secure Computing (2011)

230 Citations

The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race

Stefano Cresci;Roberto Di Pietro;Marinella Petrocchi;Angelo Spognardi.
the web conference (2017)

229 Citations

To Docker or Not to Docker: A Security Perspective

Theo Combe;Antony Martin;Roberto Di Pietro.
IEEE Cloud Computing (2016)

169 Citations

Best Scientists Citing Roberto Di Pietro

Mauro Conti

Mauro Conti

University of Padua

Publications: 23

Kui Ren

Kui Ren

Zhejiang University

Publications: 22

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 19

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 18

Francisco Falcone

Francisco Falcone

Universidad Publica De Navarra

Publications: 17

Jin Li

Jin Li

Guangzhou University

Publications: 17

Jaideep Vaidya

Jaideep Vaidya

Rutgers, The State University of New Jersey

Publications: 16

Preslav Nakov

Preslav Nakov

Qatar Computing Research Institute

Publications: 16

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 15

Cong Wang

Cong Wang

City University of Hong Kong

Publications: 14

Luigi Vincenzo Mancini

Luigi Vincenzo Mancini

Sapienza University of Rome

Publications: 12

Jinjun Chen

Jinjun Chen

Swinburne University of Technology

Publications: 12

Xuyun Zhang

Xuyun Zhang

Macquarie University

Publications: 12

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 12

Shui Yu

Shui Yu

University of Technology Sydney

Publications: 12

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.