Alberto Caponi
Alberto Caponi
Senior Researcher, CNIT @ University of Rome "Tor Vergata"
Verified email at - Homepage
Cited by
Cited by
EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations
F Cuomo, M Campo, A Caponi, G Bianchi, G Rossini, P Pisani
2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017
A survey on the security of stateful SDN data planes
T Dargahi, A Caponi, M Ambrosin, G Bianchi, M Conti
IEEE Communications Surveys & Tutorials 19 (3), 1701-1725, 2017
Check before storing: What is the performance price of content integrity verification in LRU caching?
G Bianchi, A Detti, A Caponi, N Blefari Melazzi
ACM SIGCOMM Computer Communication Review 43 (3), 59-67, 2013
Towards traffic-oriented spreading factor allocations in LoRaWAN systems
F Cuomo, JCC Gįmez, A Maurizio, L Scipione, M Campo, A Caponi, ...
2018 17th annual mediterranean ad hoc networking workshop (Med-Hoc-Net), 1-8, 2018
A General, Tractable and Accurate Model for a Cascade of LRU Caches
N Melazzi, G Bianchi, A Caponi, A Detti
Communications Letters, IEEE, 1-4, 2014
Exploitation of Information Centric Networking Principles in Satellite Networks
A Detti, A Caponi, N Blefari-Melazzi
Satellite Telecommunications (ESTEL), 2012 IEEE First AESS European …, 2012
A web platform for integrated vulnerability assessment and cyber risk management
P Russo, A Caponi, M Leuti, G Bianchi
Information 10 (7), 242, 2019
Killing the password and preserving privacy with device-centric and attribute-based authentication
K Papadamou, S Zannettou, B Chifor, S Teican, G Gugulea, A Caponi, ...
IEEE Transactions on Information Forensics and Security 15, 2183-2193, 2019
On the Interplay among Naming, Content Integrity and Caching in Information Centric Networks
A Detti, A Caponi, G Tropea, N Blefari-Melazzi, G Bianchi
Globecom 2013 - Next Generation Networking Symposium, 2108-2113, 2013
Push attack: binding virtual and real identities using mobile push notifications
P Loreti, L Bracciale, A Caponi
Future Internet 10 (2), 13, 2018
WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures
C Pisa, A Caponi, T Dargahi, G Bianchi, N Blefari-Melazzi
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet …, 2016
Mobile-PEP: Satellite terminal handover preserving service continuity
A Caponi, A Detti, M Luglio, C Roseti, F Zampognaro
2015 International Symposium on Wireless Communication Systems (ISWCS), 221 …, 2015
D-streamon—nfv-capable distributed framework for network monitoring
D Palmisano, PL Ventre, A Caponi, G Siracusano, S Salsano, M Bonola, ...
2017 29th International Teletraffic Congress (ITC 29) 2, 30-35, 2017
Advanced widespread behavioral probes against lateral movements
A Greco, G Pecoraro, A Caponi, G Bianchi
Int. J. Inf. Secur. Res 6 (2), 651-659, 2016
D-STREAMON: from middlebox to distributed NFV framework for network monitoring
PL Ventre, A Caponi, G Siracusano, D Palmisano, S Salsano, M Bonola, ...
2017 IEEE International Symposium on Local and Metropolitan Area Networks …, 2017
On the feasibility of attribute-based encryption for WLAN access control
C Pisa, T Dargahi, A Caponi, G Bianchi, N Blefari-Melazzi
2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017
Facing lateral movements using widespread behavioral probes
A Greco, A Caponi, G Bianchi
2016 11th International Conference for Internet Technology and Secured …, 2016
Conditional Disclosure of Encrypted Whitelists for DDoS Attack Mitigation
GP Giuseppe Bianchi, Hanieh Rajabi, Alberto Caponi
Globecom 2013 Workshop - First International Workshop on Security and …, 2013
Intelligent conditional collaborative private data sharing
G Bianchi, T Dargahi, A Caponi, M Conti
Future Generation Computer Systems 96, 1-10, 2019
FEBA: An action-based feature extraction framework for behavioural identification and authentication
L Stammati, C Pisa, T Dargahi, A Caponi, G Bianchi
2016 11th International Conference on Availability, Reliability and Security …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20