default search action
Alberto Giaretta 0001
Person information
- affiliation (PhD 2021): Örebro University, Sweden
- affiliation (former): University of Padova, Department of Mathematics, Italy
Other persons with the same name
- Alberto Giaretta 0002 — University of Cambridge, Department of Pathology, UK (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i14]Alberto Giaretta, Amy Loutfi:
Cybersecurity and Embodiment Integrity for Modern Robots: A Conceptual Framework. CoRR abs/2401.07783 (2024) - [i13]Jonatan Bartolini, Todor Stoyanov, Alberto Giaretta:
Hidden in Plain Sound: Environmental Backdoor Poisoning Attacks on Whisper, and Mitigations. CoRR abs/2409.12553 (2024) - 2023
- [j12]Alberto Giaretta, Amy Loutfi:
On the people counting problem in smart homes: undirected graphs and theoretical lower-bounds. J. Ambient Intell. Humaniz. Comput. 14(4): 3839-3851 (2023) - [c11]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [i12]Marco Venturini, Francesco Freda, Emanuele Miotto, Alberto Giaretta, Mauro Conti:
Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. CoRR abs/2303.17351 (2023) - 2022
- [j11]Jamshid Pirayesh, Alberto Giaretta, Mauro Conti, Parviz Keshavarzi:
A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Comput. Networks 216: 109077 (2022) - [j10]Federico Tavella, Alberto Giaretta, Mauro Conti, Sasitharan Balasubramaniam:
A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Comput. Commun. 187: 59-70 (2022) - [j9]Gibson Chimamiwa, Alberto Giaretta, Marjan Alirezaie, Federico Pecora, Amy Loutfi:
Are Smart Homes Adequate for Older Adults with Dementia? Sensors 22(11): 4254 (2022) - [j8]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices. ACM Trans. Sens. Networks 18(1): 12:1-12:51 (2022) - [i11]Alberto Giaretta:
Security and Privacy in Virtual Reality - A Literature Survey. CoRR abs/2205.00208 (2022) - [i10]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - 2021
- [j7]Federico Tavella, Alberto Giaretta, Triona Marie Dooley-Cullinane, Mauro Conti, Lee Coffey, Sasitharan Balasubramaniam:
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Trans. Emerg. Top. Comput. 9(3): 1566-1580 (2021) - [j6]Manuel Mazzara, Nicola Dragoni, Antonio Bucchiarone, Alberto Giaretta, Stephan Thordal Larsen, Schahram Dustdar:
Microservices: Migration of a Mission Critical System. IEEE Trans. Serv. Comput. 14(5): 1464-1477 (2021) - 2020
- [j5]Lasse Herskind, Alberto Giaretta, Michele De Donno, Nicola Dragoni:
BitFlow: Enabling real-time cash-flow evaluations through blockchain. Concurr. Comput. Pract. Exp. 32(12) (2020) - [c10]Guðni Matthíasson, Alberto Giaretta, Nicola Dragoni:
IoT Device Profiling: From MUD Files to S×C Contracts. Open Identity Summit 2020: 143-154 - [i9]Matthias Forstmann, Alberto Giaretta, Jennifer Renoux:
Users' Concern for Privacy in Context-Aware Reasoning Systems. CoRR abs/2007.01561 (2020) - [i8]Federico Tavella, Alberto Giaretta, Mauro Conti, Sasitharan Balasubramaniam:
A Machine Learning-based Approach to Detect Threats in Bio-Cyber DNA Storage Systems. CoRR abs/2009.13380 (2020)
2010 – 2019
- 2019
- [j4]Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone, Manuel Mazzara:
Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era. Future Internet 11(6): 127 (2019) - [j3]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
IoT Security Configurability with Security-by-Contract. Sensors 19(19): 4121 (2019) - [c9]Alberto Giaretta, Stefano Pepe, Nicola Dragoni:
UniquID: A Quest to Reconcile Identity Access Management and the IoT. TOOLS 2019: 237-251 - [c8]Alberto Giaretta, Nicola Dragoni, Fabio Massacci:
Protecting the Internet of Things with Security-by-Contract and Fog Computing. WF-IoT 2019: 1-6 - [i7]Alberto Giaretta, Stefano Pepe, Nicola Dragoni:
UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things. CoRR abs/1905.04021 (2019) - 2018
- [j2]Michele De Donno, Nicola Dragoni, Alberto Giaretta, Angelo Spognardi:
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Secur. Commun. Networks 2018: 7178164:1-7178164:30 (2018) - [c7]Alberto Giaretta, Michele De Donno, Nicola Dragoni:
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. ARES 2018: 22:1-22:8 - [c6]Alberto Giaretta, Nicola Dragoni:
Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation. SEDA 2018: 86-93 - [c5]Gudmundur Sigurdsson, Alberto Giaretta, Nicola Dragoni:
Vulnerabilities and Security Breaches in Cryptocurrencies. SEDA 2018: 288-299 - [i6]Federico Tavella, Alberto Giaretta, Triona Marie Dooley-Cullinane, Mauro Conti, Lee Coffey, Sasitharan Balasubramaniam:
DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks. CoRR abs/1801.04774 (2018) - [i5]Alberto Giaretta, Michele De Donno, Nicola Dragoni:
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. CoRR abs/1805.04101 (2018) - 2017
- [c4]Angelo Spognardi, Michele De Donno, Nicola Dragoni, Alberto Giaretta:
Analysis of DDoS-Capable IoT Malwares. FedCSIS 2017: 807-816 - [i4]Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
The Internet of Hackable Things. CoRR abs/1707.08380 (2017) - [i3]Michele De Donno, Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
AntibIoTic: Protecting IoT Devices Against DDoS Attacks. CoRR abs/1708.05050 (2017) - [i2]Alberto Giaretta, Nicola Dragoni:
Community Targeted Spam: A Middle Ground Between General Spam and Spear Phishing. CoRR abs/1708.07342 (2017) - [i1]Alberto Giaretta, Nicola Dragoni, Manuel Mazzara:
Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer. CoRR abs/1709.05635 (2017) - 2016
- [j1]Alberto Giaretta, Sasitharan Balasubramaniam, Mauro Conti:
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Trans. Inf. Forensics Secur. 11(4): 665-676 (2016) - [c3]Michele De Donno, Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
AntibIoTic: Protecting IoT Devices Against DDoS Attacks. SEDA 2016: 59-72 - [c2]Nicola Dragoni, Alberto Giaretta, Manuel Mazzara:
The Internet of Hackable Things. SEDA 2016: 129-140 - [c1]Alberto Giaretta, Nicola Dragoni, Manuel Mazzara:
Joining Jolie to Docker - Orchestration of Microservices on a Containers-as-a-Service Layer. SEDA 2016: 167-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint