Sabrina Sicari
Sabrina Sicari
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Internet of things: Vision, applications and research challenges
D Miorandi, S Sicari, F De Pellegrini, I Chlamtac
Ad hoc networks 10 (7), 1497-1516, 2012
Security, privacy and trust in Internet of Things: The road ahead
S Sicari, A Rizzardi, LA Grieco, A Coen-Porisini
Computer networks 76, 146-164, 2015
IoT-aided robotics applications: Technological implications, target domains and open issues
LA Grieco, A Rizzo, S Colucci, S Sicari, G Piro, D Di Paola, G Boggia
Computer Communications 54, 32-47, 2014
Assessing the risk of using vulnerable components
D Balzarotti, M Monga, S Sicari
Quality of Protection, 65-77, 2006
A secure and quality-aware prototypical architecture for the Internet of Things
S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini
Information Systems 58, 43-55, 2016
A security-and quality-aware system architecture for Internet of Things
S Sicari, C Cappiello, F De Pellegrini, D Miorandi, A Coen-Porisini
Information Systems Frontiers 18 (4), 665-677, 2016
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
S Sicari, LA Grieco, G Boggia, A Coen-Porisini
Journal of Systems and Software 85 (1), 152-166, 2012
AUPS: an open source AUthenticated publish/subscribe system for the internet of things
A Rizzardi, S Sicari, D Miorandi, A Coen-Porisini
Information Systems 62, 29-41, 2016
Secure wireless multimedia sensor networks: a survey
LA Grieco, G Boggia, S Sicari, P Colombo
2009 third international conference on Mobile ubiquitous computing, systems …, 2009
A comparative study of recent wireless sensor network simulators
I Minakov, R Passerone, A Rizzardi, S Sicari
ACM Transactions on Sensor Networks (TOSN) 12 (3), 1-39, 2016
Security policy enforcement for networked smart objects
S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini
Computer Networks 108, 133-147, 2016
REATO: REActing TO Denial of Service attacks in the Internet of Things
S Sicari, A Rizzardi, D Miorandi, A Coen-Porisini
Computer Networks 137, 37-48, 2018
Assessing the risk of intercepting VoIP calls
M Benini, S Sicari
Computer Networks 52 (12), 2432-2446, 2008
Security games for node localization through verifiable multilateration
N Basilico, N Gatti, M Monga, S Sicari
IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013
A policy enforcement framework for Internet of Things applications in the smart health
S Sicari, A Rizzardi, LA Grieco, G Piro, A Coen-Porisini
Smart Health 3, 39-74, 2017
DARE: evaluating Data Accuracy using node REputation
S Sicari, A Coen-Porisini, R Riggio
Computer Networks 57 (15), 3098-3111, 2013
Risk assessment in practice: A real case study
M Benini, S Sicari
Computer communications 31 (15), 3691-3699, 2008
Networked smart objects: moving data processing closer to the source
A Rizzardi, D Miorandi, S Sicari, C Cappiello, A Coen-Porisini
International Internet of Things Summit, 28-35, 2015
Toward data governance in the internet of things
S Sicari, A Rizzardi, C Cappiello, D Miorandi, A Coen-Porisini
New advances in the internet of things, 59-74, 2018
A NFP model for internet of things applications
S Sicari, A Rizzardi, A Coen-Porisini, C Cappiello
2014 IEEE 10th International Conference on Wireless and Mobile Computing …, 2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20