Stefano Guarino
Stefano Guarino
Research Fellow, IAC - CNR
Verified email at iac.cnr.it
Title
Cited by
Cited by
Year
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
1552014
Data confidentiality and availability via secret sharing and node mobility in UWSN
R Di Pietro, S Guarino
2013 Proceedings IEEE INFOCOM, 205-209, 2013
122013
Provable storage medium for data storage outsourcing
S Guarino, ES Canlar, M Conti, R Di Pietro, A Solanas
IEEE Transactions on Services Computing 8 (6), 985-997, 2014
82014
Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results
G Aliberti, R Di Pietro, S Guarino
Journal of Network and Computer Applications 99, 146-165, 2017
72017
Exploring and analyzing the Tor hidden services graph
M Bernaschi, A Celestini, S Guarino, F Lombardi
ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017
72017
Confidentiality and availability issues in mobile unattended wireless sensor networks
R Di Pietro, S Guarino
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
72013
Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Italian Conference for the Traffic Police, 97-114, 2017
62017
Traffic data: exploratory data analysis with Apache Accumulo
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Italian Conference for the Traffic Police, 129-143, 2017
52017
A novel GPU-based implementation of the cube attack
M Cianfriglia, S Guarino, M Bernaschi, F Lombardi, M Pedicini
International Conference on Applied Cryptography and Network Security, 184-207, 2017
42017
Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains
M Cianfriglia, S Guarino
2017 International Conference on High Performance Computing & Simulation …, 2017
32017
Design, implementation and test of a flexible tor-oriented web mining toolkit
A Celestini, S Guarino
Proceedings of the 7th International Conference on Web Intelligence, Mining …, 2017
32017
Reliable and perfectly secret communication over the generalized Ozarow-Wyner’s wire-tap channel
G Aliberti, R Di Pietro, S Guarino
Computer Networks 109, 21-30, 2016
32016
Beyond Fact-Checking: Network Analysis Tools for Monitoring Disinformation in Social Media
S Guarino, N Trino, A Chessa, G Riotta
International Conference on Complex Networks and Their Applications, 436-447, 2019
22019
Multi-word structural topic modelling of ToR drug marketplaces
S Guarino, M Santoro
2018 IEEE 12th International Conference on Semantic Computing (ICSC), 269-273, 2018
22018
Cyber Security in Montenegro: Practice, Framework and Challenges
R Šendelj, F Lombardi, I Ognjanović, S Guarino
INFOFEST, 2014
22014
Characterizing networks of propaganda on Twitter: a case study
S Guarino, N Trino, A Celestini, A Chessa, G Riotta
arXiv preprint arXiv:2005.10004, 2020
12020
Spiders like Onions: on the Network of Tor Hidden Services
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
The World Wide Web Conference, 105-115, 2019
12019
Ciphertext-only reconstruction of LFSR-based stream ciphers
S Guarino, M Pedicini
Facoltá di Scienze Matematiche Fisiche e Naturali, Universitá degli studi di …, 2010
12010
Information disorders on Italian Facebook during COVID-19 infodemic
A Celestini, M Di Giovanni, S Guarino, F Pierri
arXiv preprint arXiv:2007.11302, 2020
2020
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
M Cianfriglia, S Guarino, M Bernaschi, F Lombardi, M Pedicini
Journal of Cryptographic Engineering 9 (4), 375-392, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20