In SIFIS-Home, both academic and industrial partners work hard contributing to the scientific community through research and thus publications.
In the following, we provide a variety of research results exploited in this project, which led to publications on high-impact international journals, conferences, and workshops. To emphasize the cohesion of the consortium, we like to highlight that some of the published papers are collaborations among different project partners.
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things
Authors:
M. Gunnarsson, K. M. Malarski, R. Höglund, and M. Tiloca
Journal:
ACM Transactions on Internet of Things
Available:
Privacy preserving data sharing and analysis for edge-based architectures
Authors:
M. Sheikhalishahi, A. Saracino, F. Martinelli, and A. La Marra
Journal:
International Journal of Information Security
Available:
Evaluating the Performance of the OSCORE Security Protocol in Constrained IoT Environments
Authors:
M. Gunnarsson, J. Brorsson, F. Palombini, L. Seitz, and M. Tiloca
Journal:
Internet of Things – Engineering Cyber Physical Human Systems
Available:
Exploiting If This Then That and Usage Control obligations for Smart Home security and management
Authors:
G. Giorgi, A. La Marra, F. Martinelli, P. Mori, A. Rizos, and A. Saracino
Journal:
Concurrency and Computation: Practice and Experience
Available:
On-demand Key Distribution for Cloud Networks
Authors:
N. Paladi, M. Tiloca, P. Nikbakht Bideh, and M. Hell
Conference:
Proceedings of the 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track
Available:
Using recurrent neural networks for continuous authentication through gait analysis
Authors:
G. Giorgi, A. Saracino, and F. Martinelli
Journal:
Elsevier Pattern Recognition Letters
Available:
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
Authors:
N. Paladi, M. Tiloca, P. Nikbakht Bideh, and M. Hell
Conference:
17th EAI International Conference on Security and Privacy in Communication Networks (EAI SecureComm 2021)
Available:
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project
Authors:
L. Ardito, L. Barbato, P. Mori, and A. Saracino
Magazine:
IEEE Security And Privacy
Quality Assessment Methods for Textual Conversational Interfaces: A Multivocal Literature Review
Authors:
L. Ardito, L. Barbato, P. Mori, and A. Saracino
Journal:
MDPI Information
Available:
A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection
Authors:
S. Petrocchi, G. Giorgi, and M. G. C. A. Cimino
Conference:
The 16th International Conference on Availability, Reliability and Security (ARES 2021)
Available:
Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments
Authors:
G. Giorgi, W. Alabbasi, and A. Saracino
Journal:
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 13 Issue 1
An application of Netspot to Detect Anomalies in IoT
Authors:
T. Tuunainen, O. Isohanni, and M. R. Jose
Conference:
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems
Authors:
W. Alabbasi, P. Mori, A. Saracino, and V. Frascolla
Conference:
12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022)
Vulnerabilities of the 6P Protocol for the Industrial Internet of Things: Impact Analysis and Mitigation
Authors:
F. Righetti, C. Vallati, M. Tiloca, and G. Anastasi
Journal:
Elsevier Computer Communications
Available:
Privacy-Preserving Speaker Verification and Speech Recognition
Authors:
W. Alabbasi
Conference:
Emerging Technologies for Authorization and Authentication (ETAA 2022)
Available:
Lightweight Authenticated Key Exchange With EDHOC
Authors:
M. Vučinić, G. Selander, J. Preuss Mattsson, and T. Watteyne
Journal:
Computer, Vol. 55, Issue 4: 94-100
Available:
An Ontology-Based Approach for Setting Security Policies in Smart Homes
Authors:
A. Monge Roffarello and L. De Russis
Conference:
Emerging Technologies for Authorization and Authentication (ETAA 2022)
Available: