| MQTTset, a new dataset for machine learning techniques on MQTT I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso Sensors 20 (22), 6578, 2020 | 326 | 2020 |
| SlowITe, a novel denial of service attack affecting MQTT I Vaccari, M Aiello, E Cambiaso Sensors 20 (10), 2932, 2020 | 123 | 2020 |
| A generative adversarial network (GAN) technique for internet of medical things data I Vaccari, V Orani, A Paglialonga, E Cambiaso, M Mongelli Sensors 21 (11), 3726, 2021 | 97 | 2021 |
| Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz, GA Shah, T Bakhshi, ... Sensors 21 (14), 4816, 2021 | 78 | 2021 |
| High blood flow shear stress values are associated with circulating tumor cells cluster disaggregation in a multi-channel microfluidic device A Marrella, A Fedi, G Varani, I Vaccari, M Fato, G Firpo, P Guida, N Aceto, ... PloS one 16 (1), e0245536, 2021 | 71 | 2021 |
| Remotely exploiting at command attacks on zigbee networks I Vaccari, E Cambiaso, M Aiello Security and Communication Networks 2017 (1), 1723658, 2017 | 47 | 2017 |
| Darknet Security: A Categorization of Attacks to the Tor Network. E Cambiaso, I Vaccari, L Patti, M Aiello ITASEC, 1-12, 2019 | 41 | 2019 |
| Slowtt: A slow denial of service against iot networks I Vaccari, M Aiello, E Cambiaso Information 11 (9), 452, 2020 | 37 | 2020 |
| 3D fluid-dynamic ovarian cancer model resembling systemic drug administration for efficacy assay A Marrella, G Varani, M Aiello, I Vaccari, C Vitale, M Mojzisek, C Degrassi, ... ALTEX-Alternatives to animal experimentation 38 (1), 82-94, 2021 | 36 | 2021 |
| Exploiting Internet of Things protocols for malicious data exfiltration activities I Vaccari, S Narteni, M Aiello, M Mongelli, E Cambiaso IEEE Access 9, 104261-104280, 2021 | 35 | 2021 |
| Evaluating security of low-power internet of things networks I Vaccari, E Cambiaso, M Aiello International Journal of Computing and Digital Systems 8 (02), 101-114, 2019 | 30 | 2019 |
| eXplainable and reliable against adversarial machine learning in data analytics I Vaccari, A Carlevaro, S Narteni, E Cambiaso, M Mongelli IEEE Access 10, 83949-83970, 2022 | 26 | 2022 |
| DoS attacks in available MQTT implementations: investigating the impact on brokers and devices, and supported anti-DoS protections U Morelli, I Vaccari, S Ranise, E Cambiaso Proceedings of the 16th International Conference on Availability …, 2021 | 22 | 2021 |
| Sensitivity of logic learning machine for reliability in safety-critical systems S Narteni, V Orani, I Vaccari, E Cambiaso, M Mongelli IEEE Intelligent Systems 37 (5), 66-74, 2022 | 17 | 2022 |
| Detection and classification of slow DoS attacks targeting network servers E Cambiaso, M Aiello, M Mongelli, I Vaccari Proceedings of the 15th International Conference on Availability …, 2020 | 16 | 2020 |
| From explainable to reliable artificial intelligence S Narteni, M Ferretti, V Orani, I Vaccari, E Cambiaso, M Mongelli International Cross-Domain Conference for Machine Learning and Knowledge …, 2021 | 13 | 2021 |
| Challenges and Opportunities of IoT and AI in Pneumology M Mongelli, V Orani, E Cambiaso, I Vaccari, A Paglialonga, F Braido, ... 2020 23rd Euromicro Conference on Digital System Design (DSD), 285-292, 2020 | 13 | 2020 |
| Ippo: A privacy-aware architecture for decentralized data-sharing M Aiello, E Cambiaso, R Canonico, L Maccari, M Mellia, A Pescapè, ... arXiv preprint arXiv:2001.06420, 2020 | 8 | 2020 |
| Innovative protection system against remote AT command attacks on ZigBee networks I Vaccari, M Aiello, E Cambiaso Acta Sci. Comput. Sci 2, 2-8, 2020 | 8 | 2020 |
| Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service. S Narteni, I Vaccari, M Mongelli, M Aiello, E Cambiaso J. Internet Serv. Inf. Secur. 11 (3), 30-46, 2021 | 6 | 2021 |