Sabrina Sicari
Sabrina Sicari
Geverifieerd e-mailadres voor uninsubria.it - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Internet of things: Vision, applications and research challenges
D Miorandi, S Sicari, F De Pellegrini, I Chlamtac
Ad hoc networks 10 (7), 1497-1516, 2012
32512012
Security, privacy and trust in Internet of Things: The road ahead
S Sicari, A Rizzardi, LA Grieco, A Coen-Porisini
Computer networks 76, 146-164, 2015
12492015
IoT-aided robotics applications: Technological implications, target domains and open issues
LA Grieco, A Rizzo, S Colucci, S Sicari, G Piro, D Di Paola, G Boggia
Computer Communications 54, 32-47, 2014
1322014
Assessing the risk of using vulnerable components
D Balzarotti, M Monga, S Sicari
Quality of Protection, 65-77, 2006
852006
A secure and quality-aware prototypical architecture for the Internet of Things
S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini
Information Systems 58, 43-55, 2016
792016
A security-and quality-aware system architecture for Internet of Things
S Sicari, C Cappiello, F De Pellegrini, D Miorandi, A Coen-Porisini
Information Systems Frontiers 18 (4), 665-677, 2016
762016
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
S Sicari, LA Grieco, G Boggia, A Coen-Porisini
Journal of Systems and Software 85 (1), 152-166, 2012
612012
Secure wireless multimedia sensor networks: a survey
LA Grieco, G Boggia, S Sicari, P Colombo
2009 Third International Conference on Mobile Ubiquitous Computing, Systems …, 2009
502009
AUPS: an open source AUthenticated publish/subscribe system for the internet of things
A Rizzardi, S Sicari, D Miorandi, A Coen-Porisini
Information Systems 62, 29-41, 2016
462016
A comparative study of recent wireless sensor network simulators
I Minakov, R Passerone, A Rizzardi, S Sicari
ACM Transactions on Sensor Networks (TOSN) 12 (3), 1-39, 2016
392016
Security policy enforcement for networked smart objects
S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini
Computer Networks 108, 133-147, 2016
312016
Assessing the risk of intercepting VoIP calls
M Benini, S Sicari
Computer Networks 52 (12), 2432-2446, 2008
282008
Security games for node localization through verifiable multilateration
N Basilico, N Gatti, M Monga, S Sicari
IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013
272013
REATO: REActing TO Denial of Service attacks in the Internet of Things
S Sicari, A Rizzardi, D Miorandi, A Coen-Porisini
Computer Networks 137, 37-48, 2018
242018
DARE: evaluating Data Accuracy using node REputation
S Sicari, A Coen-Porisini, R Riggio
Computer Networks 57 (15), 3098-3111, 2013
242013
Risk assessment in practice: A real case study
M Benini, S Sicari
Computer communications 31 (15), 3691-3699, 2008
242008
Networked smart objects: moving data processing closer to the source
A Rizzardi, D Miorandi, S Sicari, C Cappiello, A Coen-Porisini
International Internet of Things Summit, 28-35, 2015
202015
A NFP model for internet of things applications
S Sicari, A Rizzardi, A Coen-Porisini, C Cappiello
2014 IEEE 10th International Conference on Wireless and Mobile Computing …, 2014
192014
Introducing privacy in a hospital information system
S Braghin, A Coen-Porisini, P Colombo, S Sicari, A Trombetta
Proceedings of the fourth international workshop on Software engineering for …, 2008
192008
A policy enforcement framework for Internet of Things applications in the smart health
S Sicari, A Rizzardi, LA Grieco, G Piro, A Coen-Porisini
Smart Health 3, 39-74, 2017
182017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20