Sitemap

A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.

Pages

Page Not Found

Eleonora Losiouk

Achievements

Archive Layout with Content

Posts by Category

Posts by Collection

Community Service

CV

CV

Education

Markdown

Mobile Security

Page not in menu

Page Archive

Publications

Sitemap

Students

Posts by Tags

Talk map

Teaching

The PadOverflow Research Group

Terms and Privacy Policy

Blog posts

Jupyter notebook markdown generator

Posts

Future Blog Post

Blog Post number 4

Blog Post number 3

Blog Post number 2

Blog Post number 1

publications

Programmazione in linguaggio C. Problemi e temi svolti. Esercizi. (Tutorial and Exercise Book for learning C Programming Language)

The Security of Wireless Communication Protocols Used in Mobile Health Systems

ScaRR: Scalable Runtime Remote Attestation for Complex Systems

A Mobile Platform for Emergency Care

An Environment for Representing and using Medical Checklists on Mobile Devices

Ambulance protocols: a mobile solution

An mHealth App counseling Patients and General Practitioners about Multiple Myeloma

A Telemonitoring Service Supporting Preterm Newborns Care in a Neonatal Intensive Care Unit

Stochastic Relevance for Crowdsourcing

Hiding the Presence of Sensitive Apps on Android

A Proactive Cache Privacy Attack on NDN

Contact Tracing Made Un-relay-able

ICN PATTA: ICN Privacy Attack Through Traffic Analysis

Under the Hood of MARVEL

Repack Me If You Can: An Anti-Repackaging Solution based on Android Virtualization

What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels.

Face Recognition Systems: Are you sure they only consider your face?

HolA: Holistic and Autonomous Attestation for IoT Networks

Sim2Testbed Transfer: NDN Performance Evaluation

BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem

GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks

Beware of Pickpockets: A Practical Attack against Blocking Cards

Fuzzing for Smart Contract Interworking Security Evaluation: An Empirical Evaluation of the State of the Art

R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android

Spatial Bloom Filter in Named Data Networking: a Memory Efficient Solution

E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem

A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications.

ChoKIFA: A New Detection and Mitigation Approach against Interest Flooding Attacks in NDN

Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities

E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems

Hercules Droidot and the murder on the JNI Express

Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android

Il Pancreas artificiale in età pediatrica: prima esperienza italiana

Evaluating the experience of children with type 1 diabetes and their parents taking part in an artificial pancreas clinical trial over multiple days in a diabetes camp setting

Randomized summer camp crossover trial in 5- to 9-year-old children: outpatient wearable artificial pancreas is feasible and safe

Remote Blood Glucose Monitoring in mHealth Scenarios: A Review

Parental Evaluation of a Telemonitoring Service for Children with Type 1 Diabetes

Trusting telemedicine: a discussion on risks, safety, legal implications and liability of involved stakeholders

Continuous Glucose Monitoring Linked to an Artificial Intelligence Risk Index: Early Footprints of Intraventricular Hemorrhage in Preterm Neonates

How do interval scales help us with better understanding IR evaluation measures?

Do not Let Next-Intent Vulnerability Be Your Next Nightmare: Type System Based Approach to Detect It in Android Apps

ChoKIFA+: An Early Detection and Mitigation Approach against Interest Flooding Attacks in NDN

The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions

Vulnerabilities in Android WebView Objects: Still Not the End!

Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution

VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics

Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey

VirtualPatch: Distributing Android Security Patches Through Android Virtualization

teaching

Internet and Medicine - Teaching Assistant

Telemedicine Systems - Teaching Assistant

C Programming Language - Teaching Assistant

Informatics and Bioinformatics

Database Systems - Teaching Assistant

Computer and Network Security - Teaching Assistant

CyberSecurity: Principles and Practice - Teaching Assistant

Network Security - Teaching Assistant

Mobile and IoT Security

Mobile and IoT Security and Ethical Hacking

Mobile Security and Ethical Hacking

Mobile Security Short Course

Mobile Security, Ethical Hacking, and Computer Architecture

Mobile Security, Ethical Hacking, and Computer Architecture

team

Samuele Doria

Nicholas Miazzo