Zobrazeno 1 - 10
of 61
pro vyhledávání: '"Lazzeretti, Riccardo"'
Autor:
Mekdad, Yassine, Acar, Abbas, Aris, Ahmet, Fergougui, Abdeslam El, Conti, Mauro, Lazzeretti, Riccardo, Uluagac, Selcuk
Recent advancements in drone technology have shown that commercial off-the-shelf Micro Aerial Drones are more effective than large-sized drones for performing flight missions in narrow environments, such as swarming, indoor navigation, and inspection
Externí odkaz:
http://arxiv.org/abs/2403.03858
Autor:
Cayir, Derin, Acar, Abbas, Lazzeretti, Riccardo, Angelini, Marco, Conti, Mauro, Uluagac, Selcuk
Publikováno v:
in IEEE Security & Privacy, vol. 22, no. 01, pp. 10-23, 2024
In this work, we present a device-centric analysis of security and privacy attacks and defenses on Extended Reality (XR) devices, highlighting the need for robust and privacy-aware security mechanisms. Based on our analysis, we present future researc
Externí odkaz:
http://arxiv.org/abs/2402.03114
Today Internet is experiencing a massive number of users with a continuously increasing need for data, which is the leading cause of introduced limitations among security and privacy issues. To overcome these limitations, a shift from host-centric to
Externí odkaz:
http://arxiv.org/abs/2209.02835
Autor:
Mekdad, Yassine, Aris, Ahmet, Babun, Leonardo, Fergougui, Abdeslam EL, Conti, Mauro, Lazzeretti, Riccardo, Uluagac, A. Selcuk
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilian applications such as hostage re
Externí odkaz:
http://arxiv.org/abs/2109.14442
Publikováno v:
In Future Generation Computer Systems March 2024 152:288-303
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Mekdad, Yassine, Aris, Ahmet, Babun, Leonardo, Fergougui, Abdeslam El, Conti, Mauro, Lazzeretti, Riccardo, Uluagac, A. Selcuk
Publikováno v:
In Computer Networks April 2023 224
In the last decade, a new class of cyber-threats has emerged. This new cybersecurity adversary is known with the name of "Advanced Persistent Threat" (APT) and is referred to different organizations that in the last years have been "in the center of
Externí odkaz:
http://arxiv.org/abs/1810.07321
Remote attestation protocols are widely used to detect device configuration (e.g., software and/or data) compromise in Internet of Things (IoT) scenarios. Unfortunately, the performances of such protocols are unsatisfactory when dealing with thousand
Externí odkaz:
http://arxiv.org/abs/1806.05766
Biometrics security is a dynamic research area spurred by the need to protect personal traits from threats like theft, non-authorised distribution, reuse and so on. A widely investigated solution to such threats consists in processing the biometric s
Externí odkaz:
http://arxiv.org/abs/1803.10758