Scientific Articles

In SIFIS-Home, both academic and industrial partners work hard contributing to the scientific community through research and thus publications.

In the following, we provide a variety of research results exploited in this project, which led to publications on high-impact international journals, conferences, and workshops. To emphasize the cohesion of the consortium, we like to highlight that some of the published papers are collaborations among different project partners.

Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things

Authors:

M. Gunnarsson, K. M. Malarski, R. Höglund, and M. Tiloca

Journal:

ACM Transactions on Internet of Things

Privacy preserving data sharing and analysis for edge-based architectures

Authors:

M. Sheikhalishahi, A. Saracino, F. Martinelli, and A. La Marra

Journal:

International Journal of Information Security

Evaluating the Performance of the OSCORE Security Protocol in Constrained IoT Environments

Authors:

M. Gunnarsson, J. Brorsson, F. Palombini, L. Seitz, and M. Tiloca

Journal:

Internet of Things – Engineering Cyber Physical Human Systems

Exploiting If This Then That and Usage Control obligations for Smart Home security and management

Authors:

G. Giorgi, A. La Marra, F. Martinelli, P. Mori, A. Rizos, and A. Saracino

Journal:

Concurrency and Computation: Practice and Experience

On-demand Key Distribution for Cloud Networks

Authors:

N. Paladi, M. Tiloca, P. Nikbakht Bideh, and M. Hell

Conference:

Proceedings of the 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track

Using recurrent neural networks for continuous authentication through gait analysis

Authors:

G. Giorgi, A. Saracino, and F. Martinelli

Journal:

Elsevier Pattern Recognition Letters

Flowrider: Fast On-Demand Key Provisioning for Cloud Networks

Authors:

N. Paladi, M. Tiloca, P. Nikbakht Bideh, and M. Hell

Conference:

17th EAI International Conference on Security and Privacy in Communication Networks (EAI SecureComm 2021)

Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project

Authors:

L. Ardito, L. Barbato, P. Mori, and A. Saracino

Magazine:

IEEE Security And Privacy

Quality Assessment Methods for Textual Conversational Interfaces: A Multivocal Literature Review

Authors:

L. Ardito, L. Barbato, P. Mori, and A. Saracino

Journal:

MDPI Information

A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection

Authors:

S. Petrocchi, G. Giorgi, and M. G. C. A. Cimino

Conference:

The 16th International Conference on Availability, Reliability and Security (ARES 2021)

Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments

Authors:

G. Giorgi, W. Alabbasi, and A. Saracino

Journal:

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 13 Issue 1

An application of Netspot to Detect Anomalies in IoT

Authors:

T. Tuunainen, O. Isohanni, and M. R. Jose

Conference:

2022 IEEE 8th International Conference on Network Softwarization (NetSoft)

Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems

Authors:

W. Alabbasi, P. Mori, A. Saracino, and V. Frascolla

Conference:

12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022)

Vulnerabilities of the 6P Protocol for the Industrial Internet of Things: Impact Analysis and Mitigation

Authors:

F. Righetti, C. Vallati, M. Tiloca, and G. Anastasi

Journal:

Elsevier Computer Communications

Privacy-Preserving Speaker Verification and Speech Recognition

Authors:

W. Alabbasi

Conference:

Emerging Technologies for Authorization and Authentication (ETAA 2022)

Lightweight Authenticated Key Exchange With EDHOC

Authors:

M. Vučinić, G. Selander, J. Preuss Mattsson, and T. Watteyne

Journal:

Computer, Vol. 55, Issue 4: 94-100

An Ontology-Based Approach for Setting Security Policies in Smart Homes

Authors:

A. Monge Roffarello and L. De Russis

Conference:

Emerging Technologies for Authorization and Authentication (ETAA 2022)

Secure Software Updates for IoT based on Industry Requirements

Authors:

L. Seitz, M. Tiloca, M. Gunnarsson, and R. Höglund

Conference:

9th International Conference on Information Systems Security and Privacy (ICISSP 2023)

On using the same key pair for Ed25519 and an X25519 based KEM

Author:

Erik Thormarker

ePrint Archive

Cryptology ePrint Archive, Paper 2021/509

Key Update for the IoT Security Standard OSCORE

Authors:

R. Höglund, M. Tiloca, S. Bouget and S. Raza

Conference:

2023 IEEE International Conference on Cyber Security and Resilience (CSR 2023)

Research, Implementation and Analysis of Source Code Metrics In Rust-Code-Analysis

Authors:

L. Ardito, M. Ballario, M. Valsesia

Journal:

The 23rd IEEE International Conference on Software Quality, Reliability, and Security (QRS 2023)

Available:

TBD

The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis

Authors:

W. Abbasi, P. Mori and A. Saracino

Conference:

The 20th International Conference on Security and Cryptography – SECRYPT 2023

Available:

https://www.scitepress.org/Link.aspx?doi=10.5220/0012137800003555

Privacy-Preserving Object Recognition with Explainability in Smart Systems

Authors:

W. Abbasi, P. Mori and A. Saracino

Conference:

PriST-AI 2023

Available:

TBD

An Artificial Intelligence-Based Approach to Detect the Quality of Wooden Panels using Convolutional Neural Networks

Author:

T. Tuunainen, O. Isohanni, M. Jose

Journal:

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Demo: Usage Control using Controlled Privacy Aware Face Recognition

Authors:

A. Müller, W. Abbasi

Conference:

12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022)