Posts by Collection
publications
The Security of Wireless Communication Protocols Used in Mobile Health Systems
ScaRR: Scalable Runtime Remote Attestation for Complex Systems
A Mobile Platform for Emergency Care
An Environment for Representing and using Medical Checklists on Mobile Devices
Ambulance protocols: a mobile solution
An mHealth App counseling Patients and General Practitioners about Multiple Myeloma
A Telemonitoring Service Supporting Preterm Newborns Care in a Neonatal Intensive Care Unit
Stochastic Relevance for Crowdsourcing
HideMyApp: Hiding the Presence of Sensitive Apps on Android
A Proactive Cache Privacy Attack on NDN
Contact Tracing Made Un-relay-able
ICN PATTA: ICN Privacy Attack Through Traffic Analysis
Repack Me If You Can: An Anti-Repackaging Solution based on Android Virtualization
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels.
Face Recognition Systems: Are you sure they only consider your face?
HolA: Holistic and Autonomous Attestation for IoT Networks
Sim2Testbed Transfer: NDN Performance Evaluation
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks
Beware of Pickpockets: A Practical Attack against Blocking Cards
R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android
Decompiling the Synergy: An Empirical Study of Human–LLM Teaming in Software Reverse Engineering
Spatial Bloom Filter in Named Data Networking: a Memory Efficient Solution
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications.
ChoKIFA: A New Detection and Mitigation Approach against Interest Flooding Attacks in NDN
Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
Hercules Droidot and the murder on the JNI Express
Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android
Il Pancreas artificiale in età pediatrica: prima esperienza italiana
Remote Blood Glucose Monitoring in mHealth Scenarios: A Review
Parental Evaluation of a Telemonitoring Service for Children with Type 1 Diabetes
How do interval scales help us with better understanding IR evaluation measures?
ChoKIFA+: An Early Detection and Mitigation Approach against Interest Flooding Attacks in NDN
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions
Vulnerabilities in Android WebView Objects: Still Not the End!
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
VirtualPatch: Distributing Android Security Patches Through Android Virtualization
teaching
Internet and Medicine - Teaching Assistant
Telemedicine Systems - Teaching Assistant
C Programming Language - Teaching Assistant
Informatics and Bioinformatics
Database Systems - Teaching Assistant
Computer and Network Security - Teaching Assistant
CyberSecurity: Principles and Practice - Teaching Assistant
Network Security - Teaching Assistant
Mobile and IoT Security and Ethical Hacking
Mobile Security and Ethical Hacking
Mobile Security, Ethical Hacking, and Computer Architecture
Mobile Security, Ethical Hacking, and Computer Architecture
