Carminati, Barbara
208  results:
Search for persons X
?
1

RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming..:

, In: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems,
 
?
2

Protecting Privacy in Knowledge Graphs With Personalized An..:

Hoang, Anh-Tu ; Carminati, Barbara ; Ferrari, Elena
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 2181-2193 , 2024
 
?
3

ConPrEF: A Context-based Privacy Enforcement Framework for ..:

, In: 2023 IEEE International Conference on Edge Computing and Communications (EDGE),
 
?
4

Early-Stage Ransomware Detection Based on Pre-attack Intern..:

, In: Advanced Information Networking and Applications; Lecture Notes in Networks and Systems,
 
?
5

Cyber Pandemics:

Carminati, Barbara ; Bahri, Leila
IEEE Internet Computing.  27 (2023)  2 - p. 5-6 , 2023
 
?
6

Private, Fair and Secure Collaborative Learning Framework f..:

, In: Adjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing,
 
?
8

Message from the General Chairs and PC Chairs CIC 2023:

, In: 2023 IEEE 9th International Conference on Collaboration and Internet Computing (CIC),
 
?
9

Mathematics and Computing: ICMC 2022, Vellore, India, Janua.. 

Springer Proceedings in Mathematics & Statistics, 415
Rushi Kumar, B ; Ponnusamy, S ; Giri, Debasis... - 1st ed. 2022 . , 2022
 
?
10

Privacy and Security Issues for Human Digital Twins:

, In: 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA),
 
?
12

Blockchain-Based Privacy Enforcement in the IoT Domain:

Daidone, Federico ; Carminati, Barbara ; Ferrari, Elena
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  6 - p. 3887-3898 , 2022
 
?
13

MalRec: A Blockchain-based Malware Recovery Framework for I..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
14

PriApp-Install: Learning User Privacy Preferences on Mobile..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
 
?
15

Enforcement of Laws and Privacy Preferences in Modern Compu..:

, In: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy,
 
1-15