A survey of architectures and scenarios in satellite‐based wireless sensor networks: system design aspects N Celandroni, E Ferro, A Gotta, G Oligeri, C Roseti, M Luglio, I Bisio, ... International Journal of Satellite Communications and Networking 31 (1), 1-38, 2013 | 96 | 2013 |
Jamming Mitigation in Cognitive Radio Networks R Di Pietro, G Oligeri IEEE Network, 2013 | 66 | 2013 |
Intrusion-resilience in mobile unattended WSNs R Di Pietro, G Oligeri, C Soriente, G Tsudik 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 45 | 2010 |
Frame error model in rural Wi-Fi networks P Barsocchi, G Oligeri, F Potorti 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2007 | 33 | 2007 |
Securing mobile unattended WSNs against a mobile adversary R Di Pietro, G Oligeri, C Soriente, G Tsudik 29th IEEE Symposium on Reliable and Distributed Systems, 2010. SRDS2010., 11-20, 2010 | 32 | 2010 |
United we stand: intrusion-resilience in mobile unattended WSNs R Di Pietro, G Oligeri, C Soriente, G Tsudik IEEE Transaction on Mobile Computing 12 (7), 1456-1458, 2012 | 29 | 2012 |
Measurement-based frame error model for simulating outdoor Wi-Fi networks P Barsocchi, G Oligeri, F Potortì IEEE Transactions on Wireless Communications. 8 (3), 1154-1158, 2009 | 28 | 2009 |
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments) G Oligeri, S Sciancalepore, OA Ibrahim, R Di Pietro Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 16* | 2019 |
Silence is golden: Exploiting jamming and radio silence to communicate RD Pietro, G Oligeri ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-24, 2015 | 16 | 2015 |
Validation for 802.11 b wireless channel measurements P Barsocchi, G Oligeri, F Potortı Technical report, 2006 | 16 | 2006 |
A cyber-physical approach to secret key generation in smart environments P Barsocchi, S Chessa, I Martinovic, G Oligeri Journal of Ambient Intelligence and Humanized Computing 4 (1), 1-16, 2013 | 15 | 2013 |
COKE: Crypto-less Over-the-air Key Establishment R Di Pietro, G Oligeri IEEE Transactions on Information Forensics and Security 8 (1), 163-173, 2013 | 15 | 2013 |
Strength of crowd (SOC)—defeating a reactive jammer in IoT with decoy messages S Sciancalepore, G Oligeri, R Di Pietro Sensors 18 (10), 3492, 2018 | 14 | 2018 |
Mobile application security for video streaming authentication and data integrity combining digital signature and watermarking techniques S Chessa, R Di Pietro, E Ferro, G Giunta, G Oligeri IEEE 65th Vehicular Technology Conference, 2007. VTC2007-Spring., 634-638, 2007 | 14 | 2007 |
Detecting Drones Status via Encrypted Traffic Analysis S Sciancalepore, OA Ibrahim, G Oligeri, R Di Pietro | 13* | 2019 |
Your culture is in your password: An analysis of a demographically-diverse password dataset M AlSabah, G Oligeri, R Riley Computers & security 77, 427-441, 2018 | 12 | 2018 |
SHAKE: Single HAsh key establishment for resource constrained devices P Barsocchi, G Oligeri, C Soriente Ad hoc networks 11 (1), 288-297, 2013 | 11 | 2013 |
Freedom of speech: Thwarting jammers via a probabilistic approach R Di Pietro, G Oligeri Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 10 | 2015 |
Robust and efficient authentication of video stream broadcasting G Oligeri, S Chessa, RD Pietro, G Giunta ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-25, 2011 | 10 | 2011 |
Communications and networking over satellites: SatNEx experimental activities and testbeds T de Cola, L Ronga, T Pecorella, P Barsocchi, S Chessa, E Ferro, A Gotta, ... International Journal of Satellite Communications and Networking 27 (1), 1-33, 2009 | 10 | 2009 |