High-frequency signals were widely studied in the last decade to identif...
The colossal evolution of wireless communication technologies over the p...
Adversarial attacks on deep-learning models pose a serious threat to the...
The science of social bots seeks knowledge and solutions to one of the m...
The recent worldwide introduction of RemoteID (RID) regulations forces a...
Online social networks (OSNs) play a crucial role in today's world. On t...
Polkadot is a network protocol launched in 2020 with the ambition of
unl...
The exploding rate of multimedia publishing in our networked society has...
The metaverse promises a host of bright opportunities for business,
econ...
Satellite-based Communication (SATCOM) systems are gaining renewed momen...
Serverless Computing is a virtualisation-related paradigm that promises ...
Bitcoin (BTC) is probably the most transparent payment network in the wo...
Contact tracing with mobile applications is an attractive approach for m...
Contact tracing via mobile applications is gaining significant traction ...
Physical-layer security is regaining traction in the research community,...
Contact tracing promises to help fight the diffusion of Covid-19 via an ...
Propaganda campaigns aim at influencing people's mindset with the purpos...
In this paper, we study the privately-own IRIDIUM satellite constellatio...
The increasing popularity of autonomous and remotely-piloted drones have...
Energy Harvesting (EH) technologies exploiting solar, mechanical,
thermo...
Vessels cybersecurity is recently gaining momentum, as a result of a few...
Universal Serial Bus (USB) Flash Drives are nowadays one of the most
con...
Navigation software apps have a huge impact on the daily commuting of pe...
Short-range audio channels have a few distinguishing characteristics: ea...
Single-factor password-based authentication is generally the norm to acc...
Single-factor password-based authentication is generally the norm to acc...
A new cybersecurity attack (cryptojacking) is emerging, in both the
lite...
Wireless devices resorting to event-triggered communications have been p...
Cryptographic algorithms have been used not only to create robust
cipher...
We propose PiNcH, a methodology to detect the presence of a drone and it...
Automatic Dependent Surveillance - Broadcast (ADS-B) is the next generat...
Virtualization technologies allow multiple tenants to share physical
res...
Anomaly detection tools play a role of paramount importance in protectin...
With the entry into force of the General Data Protection Regulation (GDP...
Effectively protecting the Windows OS is a challenging task, since most
...