Follow
Roberto Di Pietro
Roberto Di Pietro
IEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUST
Verified email at kaust.edu.sa - Homepage
Title
Cited by
Cited by
Year
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
17542008
Smart health: a context-aware health paradigm within smart cities
A Solanas, C Patsakis, M Conti, I Vlachos, V Ramos, F Falcone, ...
Communications Magazine, IEEE 52 (8), 74-81, 2014
7252014
Secure virtualization for cloud computing
F Lombardi, R Di Pietro
Journal of network and computer applications 34 (4), 1113-1122, 2011
5892011
The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race
S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi
Proceedings of the 26th international conference on world wide web companion …, 2017
5342017
Fame for sale: Efficient detection of fake Twitter followers
S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi
Decision Support Systems 80, 56-71, 2015
5172015
Random key-assignment for secure wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
4132003
To docker or not to docker: A security perspective
T Combe, A Martin, R Di Pietro
IEEE Cloud Computing 3 (5), 54-62, 2016
3582016
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
3042007
Boosting efficiency and security in proof of ownership for deduplication
R Di Pietro, A Sorniotti
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
2912012
Distributed detection of clone attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Dependable and Secure Computing, IEEE Transactions on 8 (5), 685-698, 2011
2432011
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
R Di Pietro, LV Mancini, YW Law, S Etall, P Havinga
Parallel Processing Workshops, 2003. Proceedings. 2003 International …, 2003
2232003
Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling
S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi
IEEE Transactions on Dependable and Secure Computing 15 (4), 561-576, 2017
2132017
DNA-inspired online behavioral modeling and its application to spambot detection
S Cresci, R Di Pietro, M Petrocchi, A Spognardi, M Tesconi
IEEE Intelligent Systems 31 (5), 58-64, 2016
2092016
Intrusion detection systems
R Di Pietro, LV Mancini
Springer Science & Business Media, 2008
2032008
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
2012014
Metaverse: Security and Privacy Issues
R Di Pietro, S Cresci
IEEE International Conference on Trust, Privacy and Security in Intelligent …, 2022
1932022
Edge computing perspectives: Architectures, technologies, and open security issues
M Caprolu, R Di Pietro, F Lombardi, S Raponi
2019 IEEE International Conference on Edge Computing (EDGE), 116-123, 2019
1932019
Docker ecosystem–vulnerability analysis
A Martin, S Raponi, T Combe, R Di Pietro
Computer Communications 122, 30-43, 2018
1852018
A survey on computational propaganda detection
GDS Martino, S Cresci, A Barrķn-Cedeņo, S Yu, R Di Pietro, P Nakov
arXiv preprint arXiv:2007.08024, 2020
1592020
Catch me (if you can): Data survival in unattended sensor networks
R Di Pietro, LV Mancini, C Soriente, A Spognardi, G Tsudik
Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE …, 2008
1572008
The system can't perform the operation now. Try again later.
Articles 1–20