Internet of things: Vision, applications and research challenges D Miorandi, S Sicari, F De Pellegrini, I Chlamtac Ad hoc networks 10 (7), 1497-1516, 2012 | 2994 | 2012 |
Security, privacy and trust in Internet of Things: The road ahead S Sicari, A Rizzardi, LA Grieco, A Coen-Porisini Computer networks 76, 146-164, 2015 | 1077 | 2015 |
IoT-aided robotics applications: Technological implications, target domains and open issues LA Grieco, A Rizzo, S Colucci, S Sicari, G Piro, D Di Paola, G Boggia Computer Communications 54, 32-47, 2014 | 112 | 2014 |
Assessing the risk of using vulnerable components D Balzarotti, M Monga, S Sicari Quality of Protection, 65-77, 2006 | 83 | 2006 |
A security-and quality-aware system architecture for Internet of Things S Sicari, C Cappiello, F De Pellegrini, D Miorandi, A Coen-Porisini Information Systems Frontiers 18 (4), 665-677, 2016 | 71 | 2016 |
A secure and quality-aware prototypical architecture for the Internet of Things S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini Information Systems 58, 43-55, 2016 | 69 | 2016 |
DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks S Sicari, LA Grieco, G Boggia, A Coen-Porisini Journal of Systems and Software 85 (1), 152-166, 2012 | 60 | 2012 |
Secure wireless multimedia sensor networks: a survey LA Grieco, G Boggia, S Sicari, P Colombo 2009 Third International Conference on Mobile Ubiquitous Computing, Systems …, 2009 | 48 | 2009 |
AUPS: an open source AUthenticated publish/subscribe system for the internet of things A Rizzardi, S Sicari, D Miorandi, A Coen-Porisini Information Systems 62, 29-41, 2016 | 41 | 2016 |
Security policy enforcement for networked smart objects S Sicari, A Rizzardi, D Miorandi, C Cappiello, A Coen-Porisini Computer Networks 108, 133-147, 2016 | 30 | 2016 |
Assessing the risk of intercepting VoIP calls M Benini, S Sicari Computer Networks 52 (12), 2432-2446, 2008 | 29 | 2008 |
A comparative study of recent wireless sensor network simulators I Minakov, R Passerone, A Rizzardi, S Sicari ACM Transactions on Sensor Networks (TOSN) 12 (3), 20, 2016 | 28 | 2016 |
Security games for node localization through verifiable multilateration N Basilico, N Gatti, M Monga, S Sicari IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013 | 25 | 2013 |
DARE: evaluating Data Accuracy using node REputation S Sicari, A Coen-Porisini, R Riggio Computer Networks 57 (15), 3098-3111, 2013 | 23 | 2013 |
Risk assessment in practice: A real case study M Benini, S Sicari Computer communications 31 (15), 3691-3699, 2008 | 23 | 2008 |
Networked smart objects: moving data processing closer to the source A Rizzardi, D Miorandi, S Sicari, C Cappiello, A Coen-Porisini International Internet of Things Summit, 28-35, 2015 | 20 | 2015 |
A NFP model for internet of things applications S Sicari, A Rizzardi, A Coen-Porisini, C Cappiello 2014 IEEE 10th International Conference on Wireless and Mobile Computing …, 2014 | 19 | 2014 |
Introducing privacy in a hospital information system. S Braghin, A Coen-Porisini, P Colombo, S Sicari, A Trombetta SESS 8, 17-18, 2008 | 19 | 2008 |
Improving data quality using a cross layer protocol in wireless sensor networks A Coen-Porisini, S Sicari Computer Networks 56 (17), 3655-3665, 2012 | 18 | 2012 |
Seta: A secure sharing of tasks in clustered wireless sensor networks S Sicari, LA Grieco, A Rizzardi, G Boggia, A Coen-Porisini 2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013 | 16 | 2013 |