AIELLO, MAURIZIO

AIELLO, MAURIZIO  

Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT  

Mostra records
Risultati 1 - 20 di 282 (tempo di esecuzione: 0.486 secondi).
Titolo Data di pubblicazione Autore(i) File
A multi-organ-on-chip to recapitulate the infiltration and the cytotoxic activity of circulating NK cells in 3D matrix-based tumor model 1-gen-2022 Marzagalli, Monica; Pelizzoni, Giorgia; Fedi, Arianna; Vitale, Chiara; Fontana, Fabrizio; Bruno, Silvia; Poggi, Alessandro; Dondero, Alessandra; Aiello, Maurizio; Castriconi, Roberta; Bottino, Cristina; Scaglione, Silvia
ESP-01 Programming Instructions Using the Arduino IDE 1-gen-2022 Zhansaya Amangeldiyeva; Maurizio Aiello; Enrico Cambiaso
Hosting services listening on all available ports with UFW 1-gen-2022 Andrew Prince, Jefferson; Aiello, Maurizio; Cambiaso, Enrico
Web security and data dumping: The Cookidump case 1-gen-2022 Cambiaso, Enrico; Aiello, Maurizio
3D fluid-dynamic ovarian cancer model resembling systemic drug administration for efficacy assay 1-gen-2021 Marrella, Alessandra; Varani, Gabriele; Aiello, Maurizio; Vaccari, Ivan; Vitale, Chiara; Mojzisek, Martin; Degrassi, Cristina; Scaglione, Silvia
An Innovative 0-Day Attack against ZigBee: Exploitation and Protection System Analysis 1-gen-2021 Vaccari, Ivan; Aiello, Maurizio; Cambiaso, Enrico
Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service 1-gen-2021 Narteni S.; Vaccari I.; Mongelli M.; Aiello M.; Cambiaso E.
Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities 1-gen-2021 Vaccari, I; Narteni, S; Aiello, M; Mongelli, M; Cambiaso, E
On the feasibility of covert channels through Short-Message-Service 1-gen-2021 Sara Narteni; Ivan Vaccari; Maurizio Mongelli; Maurizio Aiello; Enrico Cambiaso
Perpetrate cyber-attacks using IoT devices as attack vector: The ESP8266 use case 1-gen-2021 Vaccari I.; Narteni S.; Mongelli M.; Aiello M.; Cambiaso E.
Perpetrate cyber-threats using IoT devices as attack vector: the ESP8266 use case 1-gen-2021 Vaccari, Ivan; Narteni, Sara; Mongelli, Maurizio; Aiello, Maurizio; Cambiaso, Enrico
3D fluid-dynamic ovarian cancer model resembling systemic drug administration for efficacy assay 1-gen-2020 Marrella, Alessandra; Varani, Gabriele; Aiello, Maurizio; Vaccari, Ivan; Vitale, Chiara; Mojzisek, Martin; Degrassi, Cristina; Scaglione, Silvia
A 3D fluid-dynamic cancer model to resemble the in vivo drug administration as a new platform for drug testing 1-gen-2020 Arianna Fedi; Chiara Vitale; Alessandra Marrella; Cristina Degrassi; Maurizio Aiello; Silvia Scaglione
Adaptive and Intelligent Data Collection and Analytics for Securing Critical Financial Infrastructure 1-gen-2020 Habtamu Abie; Svetlana Boudko; Omri Soceanu; Lev Greenberg; Aidan Shribman; Beatriz GallegoNicasio; Enrico Cambiaso; Ivan Vaccari;Maurizio Aiello
Detection and classification of slow DoS attacks targeting network servers 1-gen-2020 Enrico Cambiaso; Maurizio Aiello; Maurizio Mongelli; Ivan Vaccari
Detection of Innovative Low-rate Denial of Service Attacks Against Critical Infrastructures 1-gen-2020 Cambiaso, Enrico; Vaccari, Ivan; Aiello, Maurizio
FINSTIX: a Cyber-Physical Data Model for Financial Critical Infrastructures 1-gen-2020 G. Gazzarata; E. Troiano; L. Verderame; M. Aiello; I. Vaccari; E. Cambiaso;A. Merlo
In vitro demonstration of intestinal absorption mechanisms of different sugars using 3D organotypic tissues in a fluidic device 1-gen-2020 Marrella, Alessandra; Buratti, Paolo; Markus, Jan; Firpo, Giuseppe; Pesenti, Mario; Landry, Tim; Ayehunie, Seyoum; Scaglione, Silvia; Kandarova, Helena; Aiello, Maurizio
Innovative Protection System Against Remote AT Command Attacks on ZigBee Networks 1-gen-2020 Ivan Vaccari; Maurizio Aiello; Enrico Cambiaso
IoT-Flock: guida all'installazione ed utilizzo di un tool per generare traffico IoT attraverso protocolli MQTT e CoAP 1-gen-2020 Vaccari, I; Cambiaso, E; Aiello, M