Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
The PadOverflow Research Group
Jupyter notebook markdown generator
Posts
publications
The Security of Wireless Communication Protocols Used in Mobile Health Systems
ScaRR: Scalable Runtime Remote Attestation for Complex Systems
A Mobile Platform for Emergency Care
An Environment for Representing and using Medical Checklists on Mobile Devices
Ambulance protocols: a mobile solution
An mHealth App counseling Patients and General Practitioners about Multiple Myeloma
A Telemonitoring Service Supporting Preterm Newborns Care in a Neonatal Intensive Care Unit
Stochastic Relevance for Crowdsourcing
Hiding the Presence of Sensitive Apps on Android
A Proactive Cache Privacy Attack on NDN
Contact Tracing Made Un-relay-able
ICN PATTA: ICN Privacy Attack Through Traffic Analysis
Repack Me If You Can: An Anti-Repackaging Solution based on Android Virtualization
What You See is Not What You Get: a Man-in-the-Middle Attack Applied to Video Channels.
Face Recognition Systems: Are you sure they only consider your face?
HolA: Holistic and Autonomous Attestation for IoT Networks
Sim2Testbed Transfer: NDN Performance Evaluation
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks
Beware of Pickpockets: A Practical Attack against Blocking Cards
R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android
Spatial Bloom Filter in Named Data Networking: a Memory Efficient Solution
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications.
ChoKIFA: A New Detection and Mitigation Approach against Interest Flooding Attacks in NDN
Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
Hercules Droidot and the murder on the JNI Express
Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android
Il Pancreas artificiale in età pediatrica: prima esperienza italiana
Remote Blood Glucose Monitoring in mHealth Scenarios: A Review
Parental Evaluation of a Telemonitoring Service for Children with Type 1 Diabetes
How do interval scales help us with better understanding IR evaluation measures?
ChoKIFA+: An Early Detection and Mitigation Approach against Interest Flooding Attacks in NDN
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions
Vulnerabilities in Android WebView Objects: Still Not the End!
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey
VirtualPatch: Distributing Android Security Patches Through Android Virtualization
teaching
Internet and Medicine - Teaching Assistant
Telemedicine Systems - Teaching Assistant
C Programming Language - Teaching Assistant
Informatics and Bioinformatics
Database Systems - Teaching Assistant
Computer and Network Security - Teaching Assistant
CyberSecurity: Principles and Practice - Teaching Assistant
Network Security - Teaching Assistant
Mobile and IoT Security and Ethical Hacking
Mobile Security and Ethical Hacking
Mobile Security, Ethical Hacking, and Computer Architecture
Mobile Security, Ethical Hacking, and Computer Architecture