Kris Oosthoek, Mark van Staalduinen, Georgios Smaragdakis (2023), Quantifying Dark Web Shops’ Illicit Revenue, In IEEE Access Volume 11 p.4794-4808.
Fenghua Wang, Robert E. Kooij (2023), Robustness of Network Controllability with Respect to Node Removals Based on In-Degree and Out-Degree, In Entropy: international and interdisciplinary journal of entropy and information studies Volume 25.
Fenghua Wang, Robert E. Kooij (2023), The recoverability of network controllability with respect to node additions, In New Journal of Physics Volume 25.
Adriaan de Vos, Alessandro Brighente, Mauro Conti (2023), Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions, Sokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla (Eds.), In Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT and SECOMANE 2022, EIS 2022, and SecAssure 2022, Revised Selected Papers p.67-80, Springer.
Mohammad Salar Arbabi, Chhagan Lal, Narasimha Raghavan Veeraragavan, Dusica Marijan, Jan F. Nygard, Roman Vitenberg (2022), A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions, In IEEE Communications Surveys and Tutorials Volume 25 p.386-424.
Mauro Conti, Shubham Khandhar, P. Vinod (2022), A few-shot malware classification approach for unknown family recognition using malware feature visualization, In Computers and Security Volume 122 p.1-16.
Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek (2022), Can You Hear It? Backdoor Attacks via Ultrasonic Triggers, In WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning p.57-62, Association for Computing Machinery (ACM).
Vincent Ghiette, Christian Dörr (2022), Clustering Payloads: Grouping Randomized Scan Probes Into Campaign Templates, In Proceedings of the 2022 IFIP Networking Conference (IFIP Networking) p.1-9, IEEE.
Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Qianmu Li, Max Kilger, Kim Kwang Raymond Choo, Mauro Conti (2022), CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks, In Journal of Information Security and Applications Volume 71.
Stefanos Koffas, Stjepan Picek, Mauro Conti (2022), Dynamic Backdoors with Global Average Pooling, In Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS) p.320-323, IEEE.