
Mauro Conti
Wallenberg Guest Professor
AASS Research Center
School of Science and Technology
Örebro University
70182 Örebro, Sweden
Room: No Room Available
Phone: No Phone Number Available
Email: No Email Address Available
Publications
| [1] | T. Devgun, G. Kumar, R. Saha, A. Brighente and M. Conti. AWOSE : Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. In ASIA CCS '25 : Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, pages 955-970, 2025 [ BibTeX | DiVA ] |
| [2] | H. Luo, G. Li, A. Brighente, M. Conti, Y. Xing, A. Hu and X. Wang. Channel-Robust RF Fingerprint Identification for Multi-Antenna 5G User Equipments. IEEE Transactions on Information Forensics and Security, 20:10761-10776, 2025 [ BibTeX | DiVA ] |
| [3] | G. Kumar, R. Saha, M. Conti and T. H. Kim. DAWS : A Comprehensive Solution Against De-Anonymization Attacks in Blockchains. IEEE Transactions on Network and Service Management, 22(5):4747-4761, 2025 [ BibTeX | DiVA ] |
| [4] | M. Venturini, F. Freda, E. Miotto, M. Conti and A. Giaretta. Differential Area Analysis for Ransomware : Attacks, Countermeasures, and Limitations. IEEE Transactions on Dependable and Secure Computing, 22(4):3449-3464, 2025 [ BibTeX | DiVA ] |
| [5] | M. Li, H. Ding, Y. Chen, Y. Qiao, Z. Zhang, L. Zhu and M. Conti. Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing. IEEE Transactions on Information Forensics and Security, 20:9477-9491, 2025 [ BibTeX | DiVA ] |
| [6] | G. Kumar, R. Saha, M. Conti and T. H. Kim. ZAKON : A decentralized framework for digital forensic admissibility and justification. Information Processing & Management, 62(6), 2025 [ BibTeX | DiVA ] |
| [7] | Y. Zhu, Z. Chen, Q. Yan, S. Wang, A. Giaretta, E. Li, L. Peng, C. Zhao and M. Conti. Devils in the Clouds : An Evolutionary Study of Telnet Bot Loaders. In ICC 2023 - IEEE International Conference on Communications, pages 2338-2344, 2023 [ BibTeX | DiVA ] |
| [8] | F. Tavella, A. Giaretta, M. Conti and S. Balasubramaniam. A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Computer Communications, 187:59-70, 2022 [ BibTeX | DiVA ] |
| [9] | J. Pirayesh, A. Giaretta, M. Conti and P. Keshavarzi. A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216, 2022 [ BibTeX | DiVA ] |
| [10] | F. Tavella, A. Giaretta, T. M. Dooley-Cullinane, M. Conti, L. Coffey and S. Balasubramaniam. DNA Molecular Storage System : Transferring Digitally Encoded Information through Bacterial Nanonetworks. IEEE Transactions on Emerging Topics in Computing, 9(3):1566-1580, 2021 [ BibTeX | DiVA ] |
| [11] | M. Conti, N. Dragoni and V. Lesyk. A Survey of Man In The Middle Attacks. IEEE Communications Surveys and Tutorials, 18(3):2027-2051, 2016 [ BibTeX | DiVA ] |
| [12] | A. Giaretta, S. Balasubramaniam and M. Conti. Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks. IEEE Transactions on Information Forensics and Security, 11(4):665-676, 2016 [ BibTeX | DiVA ] |