Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tamer F. Rabie
Daniel P. Kennedy
Dan Graur
Yunjian Jia
Barbara Aquilani
Shangguan Yuan
Roland Zumkeller
Maximilian Dürr
Liangliang Shang
Chen Ma
Home
/
Author
/
MARCO TILOCA
Author Info
Open Visualization
Name
Affiliation
Papers
MARCO TILOCA
Univ Pisa, Dept Ingn Informaz, I-56100 Pisa, Italy
24
Collaborators
Citations
PageRank
30
79
11.27
Referers
Referees
References
195
370
234
Search Limit
100
370
Publications (24 rows)
Collaborators (30 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
0
0.34
2021
Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks
0
0.34
2020
Group Rekeying Based On Member Join History
0
0.34
2020
DISH: DIstributed SHuffling Against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks.
0
0.34
2019
Group-IKEv2 for multicast IPsec in the internet of things.
0
0.34
2019
SARDOS: Self-Adaptive Reaction Against Denial of Service in the Internet of Things
1
0.34
2018
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control
0
0.34
2018
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.
5
0.52
2017
Axiom: DTLS-Based Secure IoT Group Communication.
4
0.41
2017
JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs.
1
0.36
2017
Performance and Security Evaluation of SDN Networks in OMNeT++/INET.
0
0.34
2016
Robust and Scalable DTLS Session Establishment.
0
0.34
2016
GREP: A group rekeying protocol based on member join history
2
0.39
2016
Simulative Evaluation of Security Attacks in Networked Critical Infrastructures
1
0.43
2015
SMACK: Short message authentication check against battery exhaustion in the Internet of Things
3
0.52
2015
A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks
2
0.36
2014
A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems
4
0.47
2014
STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming.
2
0.41
2013
SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks
7
0.75
2013
HISS: A HIghly Scalable Scheme for Group Rekeying.
10
0.58
2013
On simulative analysis of attack impact in Wireless Sensor Networks
6
0.48
2013
STaR: a Reconfigurable and Transparent middleware for WSNs security.
1
0.35
2013
On experimentally evaluating the impact of security on IEEE 802.15.4 networks.
13
0.82
2011
Considerations on Security in ZigBee Networks
17
1.35
2010
1