default search action
Federico Turrin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
EVScout2.0: Electric Vehicle Profiling through Charging Profile. ACM Trans. Cyber Phys. Syst. 8(2): 11 (2024) - [c17]Alessandro Brighente, Mauro Conti, Sitora Salaeva, Federico Turrin:
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection. ACNS Workshops (2) 2024: 55-74 - [c16]Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. EuroS&P Workshops 2024: 352-360 - 2023
- [j2]Simone Soderi, Riccardo Colelli, Federico Turrin, Federica Pascucci, Mauro Conti:
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming. IEEE Trans. Dependable Secur. Comput. 20(3): 2274-2288 (2023) - [c15]Riccardo Cestaro, Mauro Conti, Elonora Mancini, Federico Turrin:
OpenScope-sec: An ADS-B Simulator to Support the Security Research. ARES 2023: 116:1-116:6 - [c14]Ko Zheng Teng, Trupil Limbasiya, Federico Turrin, Yan Lin Aung, Sudipta Chattopadhyay, Jianying Zhou, Mauro Conti:
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems. CPSS@AsiaCCS 2023: 3-13 - [c13]Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin:
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments. ESORICS Workshops (1) 2023: 145-159 - [c12]Riccardo Spolaor, Hao Liu, Federico Turrin, Mauro Conti, Xiuzhen Cheng:
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. INFOCOM 2023: 1-10 - [c11]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. RAID 2023: 195-206 - [d1]Riccardo Spolaor, Hao Liu, Federico Turrin, Mauro Conti, Xiuzhen Cheng:
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. Zenodo, 2023 - [i10]Alessandro Brighente, Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023) - [i9]Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. CoRR abs/2302.08992 (2023) - [i8]Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin:
HoneyEVSE: An Honeypot to emulate Electric Vehicle Supply Equipments. CoRR abs/2309.06077 (2023) - 2022
- [c10]Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin:
EVExchange: A Relay Attack on Electric Vehicle Charging System. ESORICS (1) 2022: 488-508 - [c9]Mauro Conti, Francesco Trolese, Federico Turrin:
ICSpot: A High-Interaction Honeypot for Industrial Control Systems. ISNCC 2022: 1-4 - [c8]Simone Soderi, Alessandro Brighente, Federico Turrin, Mauro Conti:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. SECON 2022: 370-378 - [i7]Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin:
EVExchange: A Relay Attack on Electric Vehicle Charging System. CoRR abs/2203.05266 (2022) - [i6]Simone Soderi, Alessandro Brighente, Federico Turrin, Mauro Conti:
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks. CoRR abs/2205.09026 (2022) - [i5]Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. CoRR abs/2209.03095 (2022) - 2021
- [j1]Mauro Conti, Denis Donadel, Federico Turrin:
A Survey on Industrial Control System Testbeds and Datasets for Security Research. IEEE Commun. Surv. Tutorials 23(4): 2248-2294 (2021) - [c7]Luca Attanasio, Mauro Conti, Denis Donadel, Federico Turrin:
MiniV2G: An Electric Vehicle Charging Emulator. CPSS@AsiaCCS 2021: 65-73 - [c6]Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin:
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis. ICCCN 2021: 1-9 - [i4]Luca Attanasio, Mauro Conti, Denis Donadel, Federico Turrin:
MiniV2G: An Electric Vehicle Charging Emulator. CoRR abs/2101.11720 (2021) - [i3]Mauro Conti, Denis Donadel, Federico Turrin:
A Survey on Industrial Control System Testbeds and Datasets for Security Research. CoRR abs/2102.05631 (2021) - [i2]Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
EVScout2.0: Electric Vehicle Profiling Through Charging Profile. CoRR abs/2106.16016 (2021) - 2020
- [c5]Federico Turrin, Alessandro Erba, Nils Ole Tippenhauer, Mauro Conti:
A Statistical Analysis Framework for ICS Process Datasets. CPSIOTSEC@CCS 2020: 25-30 - [c4]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Luca Pajola, Federico Turrin:
Fake News Spreaders Profiling Through Behavioural Analysis. CLEF (Working Notes) 2020 - [c3]Giuseppe Bernieri, Mauro Conti, Matteo Sovilla, Federico Turrin:
ALISI: a lightweight identification system based on Iroha. SAC 2020: 271-273 - [i1]Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin:
Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis. CoRR abs/2007.01114 (2020)
2010 – 2019
- 2019
- [c2]Giuseppe Bernieri, Mauro Conti, Federico Turrin:
Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks. M&N 2019: 1-6 - [c1]Giuseppe Bernieri, Mauro Conti, Federico Turrin:
KingFisher: an Industrial Security Framework based on Variational Autoencoders. SenSys-ML 2019: 7-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint