In SIFIS-Home, both academic and industrial partners work hard contributing to the scientific community through research and thus publications.
In the following, we provide a variety of research results exploited in this project, which led to publications on high-impact international journals, conferences, and workshops. To emphasize the cohesion of the consortium, we like to highlight that some of the published papers are collaborations among different project partners.
Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things
Authors:
M. Gunnarsson, K. M. Malarski, R. Höglund, and M. Tiloca
Journal:
ACM Transactions on Internet of Things
Available:
Privacy preserving data sharing and analysis for edge-based architectures
Authors:
M. Sheikhalishahi, A. Saracino, F. Martinelli, and A. La Marra
Journal:
International Journal of Information Security
Available:
Evaluating the Performance of the OSCORE Security Protocol in Constrained IoT Environments
Authors:
M. Gunnarsson, J. Brorsson, F. Palombini, L. Seitz, and M. Tiloca
Journal:
Internet of Things – Engineering Cyber Physical Human Systems
Available:
Exploiting If This Then That and Usage Control obligations for Smart Home security and management
Authors:
G. Giorgi, A. La Marra, F. Martinelli, P. Mori, A. Rizos, and A. Saracino
Journal:
Concurrency and Computation: Practice and Experience
Available:
On-demand Key Distribution for Cloud Networks
Authors:
N. Paladi, M. Tiloca, P. Nikbakht Bideh, and M. Hell
Conference:
Proceedings of the 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track
Available:
Using recurrent neural networks for continuous authentication through gait analysis
Authors:
G. Giorgi, A. Saracino, and F. Martinelli
Journal:
Elsevier Pattern Recognition Letters
Available:
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
Authors:
N. Paladi, M. Tiloca, P. Nikbakht Bideh, and M. Hell
Conference:
17th EAI International Conference on Security and Privacy in Communication Networks (EAI SecureComm 2021)
Available:
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project
Authors:
L. Ardito, L. Barbato, P. Mori, and A. Saracino
Magazine:
IEEE Security And Privacy
Quality Assessment Methods for Textual Conversational Interfaces: A Multivocal Literature Review
Authors:
L. Ardito, L. Barbato, P. Mori, and A. Saracino
Journal:
MDPI Information
Available:
A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection
Authors:
S. Petrocchi, G. Giorgi, and M. G. C. A. Cimino
Conference:
The 16th International Conference on Availability, Reliability and Security (ARES 2021)
Available:
Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments
Authors:
G. Giorgi, W. Alabbasi, and A. Saracino
Journal:
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 13 Issue 1
An application of Netspot to Detect Anomalies in IoT
Authors:
T. Tuunainen, O. Isohanni, and M. R. Jose
Conference:
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems
Authors:
W. Alabbasi, P. Mori, A. Saracino, and V. Frascolla
Conference:
12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022)
Vulnerabilities of the 6P Protocol for the Industrial Internet of Things: Impact Analysis and Mitigation
Authors:
F. Righetti, C. Vallati, M. Tiloca, and G. Anastasi
Journal:
Elsevier Computer Communications
Available:
Privacy-Preserving Speaker Verification and Speech Recognition
Authors:
W. Alabbasi
Conference:
Emerging Technologies for Authorization and Authentication (ETAA 2022)
Available:
An Ontology-Based Approach for Setting Security Policies in Smart Homes
Authors:
A. Monge Roffarello and L. De Russis
Conference:
Emerging Technologies for Authorization and Authentication (ETAA 2022)
Available:
Lightweight Authenticated Key Exchange With EDHOC
Authors:
M. Vučinić, G. Selander, J. Preuss Mattsson, and T. Watteyne
Journal:
Computer, Vol. 55, Issue 4: 94-100
Available:
Secure Software Updates for IoT based on Industry Requirements
Authors:
L. Seitz, M. Tiloca, M. Gunnarsson, and R. Höglund
Conference:
9th International Conference on Information Systems Security and Privacy (ICISSP 2023)
Available:
On using the same key pair for Ed25519 and an X25519 based KEM
Author:
Erik Thormarker
ePrint Archive:
Cryptology ePrint Archive, Paper 2021/509
Available:
Key Update for the IoT Security Standard OSCORE
Authors:
R. Höglund, M. Tiloca, S. Bouget and S. Raza
Conference:
2023 IEEE International Conference on Cyber Security and Resilience (CSR 2023)
Available:
Research, Implementation and Analysis of Source Code Metrics In Rust-Code-Analysis
Authors:
L. Ardito, M. Ballario, and M. Valsesia
Journal:
The 23rd IEEE International Conference on Software Quality, Reliability, and Security (QRS 2023)
Available:
The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis
Authors:
W. Abbasi, P. Mori, and A. Saracino
Conference:
The 20th International Conference on Security and Cryptography (SECRYPT 2023)
Available:
Privacy-Preserving Object Recognition with Explainability in Smart Systems
Authors:
W. Abbasi, P. Mori and A. Saracino
Conference:
2023 European Symposium on Research in Computer Security (ESORICS 2023)
Available:
An Artificial Intelligence-Based Approach to Detect the Quality of Wooden Panels using Convolutional Neural Networks
Author:
T. Tuunainen, O. Isohanni, M. Jose
Journal:
International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)
Demo: Usage Control using Controlled Privacy Aware Face Recognition
Authors:
A. Müller, W. Abbasi
Conference:
12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022)
Using the ACE Framework to Enforce Access and Usage Control with Notifications of Revoked Access Rights
Authors:
M. Rasori, A. Saracino, P. Mori, and M. Tiloca
Journal:
International Journal of Information Security
Available: