Security in wireless ad-hoc networks–a survey R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer Computer Communications 51, 1-20, 2014 | 207 | 2014 |
Characterizing networks of propaganda on twitter: a case study S Guarino, N Trino, A Celestini, A Chessa, G Riotta Applied Network Science 5 (1), 1-22, 2020 | 59 | 2020 |
Information disorders during the COVID-19 infodemic: The case of Italian Facebook S Guarino, F Pierri, M Di Giovanni, A Celestini Online Social Networks and Media 22, 100124, 2021 | 58* | 2021 |
Exploring and analyzing the tor hidden services graph M Bernaschi, A Celestini, S Guarino, F Lombardi ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017 | 35 | 2017 |
Beyond fact-checking: Network analysis tools for monitoring disinformation in social media S Guarino, N Trino, A Chessa, G Riotta Complex Networks and Their Applications VIII: Volume 1 Proceedings of the …, 2020 | 33 | 2020 |
Spiders like onions: on the network of tor hidden services M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano The World Wide Web Conference, 105-115, 2019 | 30 | 2019 |
Design, implementation and test of a flexible tor-oriented web mining toolkit A Celestini, S Guarino Proceedings of the 7th International Conference on Web Intelligence, Mining …, 2017 | 15 | 2017 |
Epidemic data survivability in unattended wireless sensor networks: New models and results G Aliberti, R Di Pietro, S Guarino Journal of Network and Computer Applications 99, 146-165, 2017 | 14 | 2017 |
Inferring urban social networks from publicly available data S Guarino, E Mastrostefano, M Bernaschi, A Celestini, M Cianfriglia, ... Future Internet 13 (5), 108, 2021 | 12 | 2021 |
Data confidentiality and availability via secret sharing and node mobility in UWSN R Di Pietro, S Guarino 2013 Proceedings IEEE INFOCOM, 205-209, 2013 | 12 | 2013 |
Onion under Microscope: An in-depth analysis of the Tor Web M Bernaschi, A Celestini, M Cianfriglia, S Guarino, F Lombardi, ... World Wide Web 25 (3), 1287-1313, 2022 | 10 | 2022 |
Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano Traffic Mining Applied to Police Activities: Proceedings of the 1st Italian …, 2018 | 9 | 2018 |
A Novel GPU-Based Implementation of the Cube Attack: Preliminary Results Against Trivium M Cianfriglia, S Guarino, M Bernaschi, F Lombardi, M Pedicini International Conference on Applied Cryptography and Network Security, 184-207, 2017 | 9 | 2017 |
Research data exchange solution LA Møller, A Bechmann | 8 | 2019 |
Multi-word structural topic modelling of ToR drug marketplaces S Guarino, M Santoro 2018 IEEE 12th International Conference on Semantic Computing (ICSC), 269-273, 2018 | 8 | 2018 |
Traffic data: exploratory data analysis with Apache Accumulo M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano Traffic Mining Applied to Police Activities: Proceedings of the 1st Italian …, 2018 | 8 | 2018 |
Provable storage medium for data storage outsourcing S Guarino, ES Canlar, M Conti, R Di Pietro, A Solanas IEEE Transactions on Services Computing 8 (6), 985-997, 2014 | 8 | 2014 |
Confidentiality and availability issues in mobile unattended wireless sensor networks R Di Pietro, S Guarino 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013 | 8 | 2013 |
A model for urban social networks S Guarino, E Mastrostefano, A Celestini, M Bernaschi, M Cianfriglia, ... International Conference on Computational Science, 281-294, 2021 | 7 | 2021 |
Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains M Cianfriglia, S Guarino 2017 International Conference on High Performance Computing & Simulation …, 2017 | 7 | 2017 |