Follow
Ivan Vaccari
Title
Cited by
Cited by
Year
MQTTset, a new dataset for machine learning techniques on MQTT
I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso
Sensors 20 (22), 6578, 2020
1772020
SlowITe, a novel denial of service attack affecting MQTT
I Vaccari, M Aiello, E Cambiaso
Sensors 20 (10), 2932, 2020
712020
High blood flow shear stress values are associated with circulating tumor cells cluster disaggregation in a multi-channel microfluidic device
A Marrella, A Fedi, G Varani, I Vaccari, M Fato, G Firpo, P Guida, N Aceto, ...
PLoS One 16 (1), e0245536, 2021
472021
A generative adversarial network (GAN) technique for internet of medical things data
I Vaccari, V Orani, A Paglialonga, E Cambiaso, M Mongelli
Sensors 21 (11), 3726, 2021
462021
Remotely exploiting at command attacks on zigbee networks
I Vaccari, E Cambiaso, M Aiello
Security and Communication Networks 2017, 2017
412017
Darknet Security: A Categorization of Attacks to the Tor Network.
E Cambiaso, I Vaccari, L Patti, M Aiello
ITASEC, 1-12, 2019
382019
Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach
SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz, GA Shah, T Bakhshi, ...
Sensors 21 (14), 4816, 2021
352021
Slowtt: A slow denial of service against iot networks
I Vaccari, M Aiello, E Cambiaso
Information 11 (9), 452, 2020
282020
3D fluid-dynamic ovarian cancer model resembling systemic drug administration for efficacy assay
A Marrella, G Varani, M Aiello, I Vaccari, C Vitale, M Mojzisek, C Degrassi, ...
ALTEX-Alternatives to animal experimentation 38 (1), 82-94, 2021
222021
Evaluating security of low-power internet of things networks
I Vaccari, E Cambiaso, M Aiello
International Journal of Computing and Digital Systems 8 (02), 101-114, 2019
202019
Exploiting Internet of Things protocols for malicious data exfiltration activities
I Vaccari, S Narteni, M Aiello, M Mongelli, E Cambiaso
IEEE Access 9, 104261-104280, 2021
152021
Detection and classification of slow DoS attacks targeting network servers
E Cambiaso, M Aiello, M Mongelli, I Vaccari
Proceedings of the 15th International Conference on Availability …, 2020
132020
DoS attacks in available MQTT implementations: investigating the impact on brokers and devices, and supported anti-DoS protections
U Morelli, I Vaccari, S Ranise, E Cambiaso
Proceedings Of The 16th International Conference On Availability …, 2021
102021
eXplainable and reliable against adversarial machine learning in data analytics
I Vaccari, A Carlevaro, S Narteni, E Cambiaso, M Mongelli
IEEE Access 10, 83949-83970, 2022
82022
From explainable to reliable artificial intelligence
S Narteni, M Ferretti, V Orani, I Vaccari, E Cambiaso, M Mongelli
International Cross-Domain Conference for Machine Learning and Knowledge …, 2021
82021
Challenges and Opportunities of IoT and AI in Pneumology
M Mongelli, V Orani, E Cambiaso, I Vaccari, A Paglialonga, F Braido, ...
2020 23rd Euromicro Conference on Digital System Design (DSD), 285-292, 2020
82020
Ippo: A privacy-aware architecture for decentralized data-sharing
M Aiello, E Cambiaso, R Canonico, L Maccari, M Mellia, A Pescapè, ...
arXiv preprint arXiv:2001.06420, 2020
72020
Sensitivity of logic learning machine for reliability in safety-critical systems
S Narteni, V Orani, I Vaccari, E Cambiaso, M Mongelli
IEEE Intelligent Systems 37 (5), 66-74, 2022
62022
Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service.
S Narteni, I Vaccari, M Mongelli, M Aiello, E Cambiaso
J. Internet Serv. Inf. Secur. 11 (3), 30-46, 2021
52021
Perpetrate cyber-attacks using IoT devices as attack vector: the ESP8266 use case
I Vaccari, S Narteni, M Mongelli, M Aiello, E Cambiaso
CEUR Workshop Proceedings 2940, 35-46, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20