Sabrina Sicari
TitleCited byYear
Internet of things: Vision, applications and research challenges
D Miorandi, S Sicari, F De Pellegrini, I Chlamtac
Ad hoc networks 10 (7), 1497-1516, 2012
29942012
Security, privacy and trust in Internet of Things: The road ahead
S Sicari, A Rizzardi, LA Grieco, A Coen-Porisini
Computer networks 76, 146-164, 2015
10772015
IoT-aided robotics applications: Technological implications, target domains and open issues
LA Grieco, A Rizzo, S Colucci, S Sicari, G Piro, D Di Paola, G Boggia
Computer Communications 54, 32-47, 2014
1122014
Assessing the risk of using vulnerable components
D Balzarotti, M Monga, S Sicari
Quality of Protection, 65-77, 2006
832006
A security-and quality-aware system architecture for Internet of Things
S Sicari, C Cappiello, F De Pellegrini, D Miorandi, A Coen-Porisini
Information Systems Frontiers 18 (4), 665-677, 2016
712016
A secure and quality-aware prototypical architecture for the Internet of Things
S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini
Information Systems 58, 43-55, 2016
692016
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
S Sicari, LA Grieco, G Boggia, A Coen-Porisini
Journal of Systems and Software 85 (1), 152-166, 2012
602012
Secure wireless multimedia sensor networks: a survey
LA Grieco, G Boggia, S Sicari, P Colombo
2009 Third International Conference on Mobile Ubiquitous Computing, Systems …, 2009
482009
AUPS: an open source AUthenticated publish/subscribe system for the internet of things
A Rizzardi, S Sicari, D Miorandi, A Coen-Porisini
Information Systems 62, 29-41, 2016
412016
Security policy enforcement for networked smart objects
S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini
Computer Networks 108, 133-147, 2016
302016
Assessing the risk of intercepting VoIP calls
M Benini, S Sicari
Computer Networks 52 (12), 2432-2446, 2008
292008
A comparative study of recent wireless sensor network simulators
I Minakov, R Passerone, A Rizzardi, S Sicari
ACM Transactions on Sensor Networks (TOSN) 12 (3), 20, 2016
282016
Security games for node localization through verifiable multilateration
N Basilico, N Gatti, M Monga, S Sicari
IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013
252013
DARE: evaluating Data Accuracy using node REputation
S Sicari, A Coen-Porisini, R Riggio
Computer Networks 57 (15), 3098-3111, 2013
232013
Risk assessment in practice: A real case study
M Benini, S Sicari
Computer communications 31 (15), 3691-3699, 2008
232008
Networked smart objects: moving data processing closer to the source
A Rizzardi, D Miorandi, S Sicari, C Cappiello, A Coen-Porisini
International Internet of Things Summit, 28-35, 2015
202015
A NFP model for internet of things applications
S Sicari, A Rizzardi, A Coen-Porisini, C Cappiello
2014 IEEE 10th International Conference on Wireless and Mobile Computing …, 2014
192014
Introducing privacy in a hospital information system.
S Braghin, A Coen-Porisini, P Colombo, S Sicari, A Trombetta
SESS 8, 17-18, 2008
192008
Improving data quality using a cross layer protocol in wireless sensor networks
A Coen-Porisini, S Sicari
Computer Networks 56 (17), 3655-3665, 2012
182012
Seta: A secure sharing of tasks in clustered wireless sensor networks
S Sicari, LA Grieco, A Rizzardi, G Boggia, A Coen-Porisini
2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013
162013
The system can't perform the operation now. Try again later.
Articles 1–20