default search action
Alberto Compagno
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j5]Abdelmadjid Benarfa, Muhammad Hassan, Eleonora Losiouk, Alberto Compagno, Mohamed Bachir Yagoubi, Mauro Conti:
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN. Int. J. Inf. Sec. 20(3): 269-285 (2021) - [j4]Luca Ascari, Anna Marchenkova, Andréa Bellotti, Stefano Lai, Lucia Moro, Konstantin Koshmak, Alice Mantoan, Michele Barsotti, Raffaello Brondi, Giovanni Avveduto, Davide Sechi, Alberto Compagno, Pietro Avanzini, Jonas Ambeck-Madsen, Giovanni Vecchiato:
Validation of a Novel Wearable Multistream Data Acquisition and Analysis System for Ergonomic Studies. Sensors 21(24): 8167 (2021) - 2020
- [c15]Michele Papalini, Giovanna Carofiglio, Alberto Compagno, Angelo Mantellini, Luca Muscariello, Jacques Samain, Mauro Sardara:
On the Scalability of WebRTC with Information-Centric Networking. LANMAN 2020: 1-6 - [c14]Alberto Compagno, Mauro Conti, Eleonora Losiouk, Gene Tsudik, Sebastiano Valle:
A Proactive Cache Privacy Attack on NDN. NOMS 2020: 1-7
2010 – 2019
- 2019
- [j3]Stefano Cecconello, Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Skype & Type: Keyboard Eavesdropping in Voice-over-IP. ACM Trans. Priv. Secur. 22(4): 24:1-24:34 (2019) - [c13]Giovanna Carofiglio, Luca Muscariello, Jordan Augé, Michele Papalini, Mauro Sardara, Alberto Compagno:
Enabling ICN in the Internet Protocol: Analysis and Evaluation of the Hybrid-ICN Architecture. ICN 2019: 55-66 - [c12]Abdelmadjid Benarfa, Muhammad Hassan, Alberto Compagno, Eleonora Losiouk, Mohamed Bachir Yagoubi, Mauro Conti:
ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN. WWIC 2019: 53-65 - 2018
- [j2]Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik:
Security and Privacy Analysis of National Science Foundation Future Internet Architectures. IEEE Commun. Surv. Tutorials 20(2): 1418-1442 (2018) - [c11]Mauro Sardara, Luca Muscariello, Alberto Compagno:
A transport layer and socket API for (h)ICN: design, implementation and performance analysis. ICN 2018: 137-147 - [c10]Mauro Sardara, Luca Muscariello, Alberto Compagno:
Efficient transport layer and socket API for ICN. ICN 2018: 206-207 - [c9]Giovanna Carofiglio, Alberto Compagno, Mauro Conti, Fabio De Gaspari, Luca Muscariello:
IaaS-Aided Access Control for Information-Centric IoT. LCN 2018: 208-216 - [c8]Alberto Compagno, Mauro Conti, Stefano Munari, Riccardo Lazzeretti:
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking. LCN 2018: 580-588 - 2017
- [c7]Mauro Sardara, Luca Muscariello, Jordan Augé, Marcel Enguehard, Alberto Compagno, Giovanna Carofiglio:
Virtualized ICN (vICN): towards a unified network virtualization framework for ICN experimentation. ICN 2017: 109-115 - [c6]Alberto Compagno, Xuan Zeng, Luca Muscariello, Giovanna Carofiglio, Jordan Augé:
Secure producer mobility in information-centric network. ICN 2017: 163-169 - [c5]Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP. AsiaCCS 2017: 703-715 - 2016
- [j1]Alberto Compagno, Mauro Conti, Antonio Alberto D'Amico, Gianluca Dini, Pericle Perazzo, Lorenzo Taponecco:
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols. IEEE Trans. Inf. Forensics Secur. 11(7): 1565-1577 (2016) - [c4]Alberto Compagno, Mauro Conti, Ralph E. Droms:
OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN. ICN 2016: 166-175 - [i4]Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP. CoRR abs/1609.09359 (2016) - [i3]Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik:
Security and Privacy Analysis of NSF Future Internet Architectures. CoRR abs/1610.00355 (2016) - 2015
- [c3]Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik:
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. ACNS 2015: 243-262 - [c2]Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini:
Boten ELISA: A novel approach for botnet C&C in Online Social Networks. CNS 2015: 74-82 - [i2]Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik:
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking. CoRR abs/1503.02123 (2015) - 2013
- [c1]Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik:
Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. LCN 2013: 630-638 - [i1]Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik:
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking. CoRR abs/1303.4823 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint