Name
Affiliation
Papers
MARCO TILOCA
Univ Pisa, Dept Ingn Informaz, I-56100 Pisa, Italy
24
Collaborators
Citations 
PageRank 
30
79
11.27
Referers 
Referees 
References 
195
370
234
Search Limit
100370
Title
Citations
PageRank
Year
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks00.342021
Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks00.342020
Group Rekeying Based On Member Join History00.342020
DISH: DIstributed SHuffling Against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks.00.342019
Group-IKEv2 for multicast IPsec in the internet of things.00.342019
SARDOS: Self-Adaptive Reaction Against Denial of Service in the Internet of Things10.342018
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control00.342018
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake.50.522017
Axiom: DTLS-Based Secure IoT Group Communication.40.412017
JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs.10.362017
Performance and Security Evaluation of SDN Networks in OMNeT++/INET.00.342016
Robust and Scalable DTLS Session Establishment.00.342016
GREP: A group rekeying protocol based on member join history20.392016
Simulative Evaluation of Security Attacks in Networked Critical Infrastructures10.432015
SMACK: Short message authentication check against battery exhaustion in the Internet of Things30.522015
A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks20.362014
A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems40.472014
STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming.20.412013
SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks70.752013
HISS: A HIghly Scalable Scheme for Group Rekeying.100.582013
On simulative analysis of attack impact in Wireless Sensor Networks60.482013
STaR: a Reconfigurable and Transparent middleware for WSNs security.10.352013
On experimentally evaluating the impact of security on IEEE 802.15.4 networks.130.822011
Considerations on Security in ZigBee Networks171.352010