Sfoglia per Autore
Internetworking assortativity in Facebook
2013-01-01 Buccafurri, Francesco; Nocera, G; Ursino, D; Lax, Gianluca
Restoring Information Needed for Social Internetworking Analysis from Anonymized Data
2013-01-01 Buccafurri, Francesco; Caridi, D; Nocera, A; Ursino, D; Lax, Gianluca
Measuring Betweenness Centrality in Social Internetworking Scenarios
2013-01-01 Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Ursino, D; Lax, Gianluca
Bridge analysis in a Social Internetworking Scenario
2013-01-01 Buccafurri, F; Foti, V D; Lax, G; Nocera, A; Ursino, D
Attacks on Confidentiality of Communications between Stranger Organizations
2013-01-01 Ates, Mikael; Gianluca, Lax; Lax, Gianluca
Experiences Using BDS: A Crawler for Social Internetworking Scenarios
2014-01-01 Buccafurri, Francesco; Gianluca, Lax; Antonino, Nocera; Domenico, Ursino; Lax, Gianluca
A clustering–based analysis of a social internetworking scenario
2014-01-01 Buccafurri, Francesco; Daniele, Caridi; Lidia, Fotia; Gianluca, Lax; Antonino, Nocera; Domenico, Ursino; Lax, Gianluca
Generating K-Anonymous Logs of People-Tracing Systems in Surveilled Environments
2014-01-01 Buccafurri, Francesco; Lax, Gianluca; Nicolazzo, Serena; Nocera, Antonino
A trust-based approach to clustering agents on the basis of their expertise
2014-01-01 Buccafurri, Francesco; Comi, A; Lax, Gianluca; Rosaci, Domenico
Social Signature: Signing by Tweeting
2014-01-01 Buccafurri, Francesco; Fotia, L; Lax, Gianluca
A model to support multi-social-network applications
2014-01-01 Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Lax, Gianluca
Fortifying TripAdvisor against reputation-system attacks
2014-01-01 Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Lax, Gianluca
A novel pseudo random number generator based on L'Ecuyer's scheme
2014-01-01 Buccafurri, Francesco; Lax, Gianluca
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
2014-01-01 Buccafurri, Francesco; Coppolino, L; D'Antonio, S; Garofalo, A; Nocera, A; Romano, L; Lax, Gianluca
Driving global team formation in social networks to obtain diversity
2014-01-01 Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Ursino, D; Lax, Gianluca
Moving from social networks to social internetworking scenarios: The crawling perspective
2014-01-01 Buccafurri, Francesco; Nocera, A; Ursino, D; Lax, Gianluca
A Privacy-Preserving Solution for Tracking People in Critical Environments
2014-01-01 Buccafurri, Francesco; Lax, Gianluca; Nicolazzo, Serena; Nocera, Antonino
A lightweight electronic signature scheme using Twitter
2015-01-01 Buccafurri, Francesco; Fotia, L; Nicolazzo, S; Nocera, A; Lax, Gianluca
Accountability-preserving anonymous delivery of cloud services
2015-01-01 Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Lax, Gianluca
A model implementing certified reputation and its application to TripAdvisor
2015-01-01 Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Lax, Gianluca
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Internetworking assortativity in Facebook | 1-gen-2013 | Buccafurri, Francesco; Nocera, G; Ursino, D; Lax, Gianluca | |
Restoring Information Needed for Social Internetworking Analysis from Anonymized Data | 1-gen-2013 | Buccafurri, Francesco; Caridi, D; Nocera, A; Ursino, D; Lax, Gianluca | |
Measuring Betweenness Centrality in Social Internetworking Scenarios | 1-gen-2013 | Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Ursino, D; Lax, Gianluca | |
Bridge analysis in a Social Internetworking Scenario | 1-gen-2013 | Buccafurri, F; Foti, V D; Lax, G; Nocera, A; Ursino, D | |
Attacks on Confidentiality of Communications between Stranger Organizations | 1-gen-2013 | Ates, Mikael; Gianluca, Lax; Lax, Gianluca | |
Experiences Using BDS: A Crawler for Social Internetworking Scenarios | 1-gen-2014 | Buccafurri, Francesco; Gianluca, Lax; Antonino, Nocera; Domenico, Ursino; Lax, Gianluca | |
A clustering–based analysis of a social internetworking scenario | 1-gen-2014 | Buccafurri, Francesco; Daniele, Caridi; Lidia, Fotia; Gianluca, Lax; Antonino, Nocera; Domenico, Ursino; Lax, Gianluca | |
Generating K-Anonymous Logs of People-Tracing Systems in Surveilled Environments | 1-gen-2014 | Buccafurri, Francesco; Lax, Gianluca; Nicolazzo, Serena; Nocera, Antonino | |
A trust-based approach to clustering agents on the basis of their expertise | 1-gen-2014 | Buccafurri, Francesco; Comi, A; Lax, Gianluca; Rosaci, Domenico | |
Social Signature: Signing by Tweeting | 1-gen-2014 | Buccafurri, Francesco; Fotia, L; Lax, Gianluca | |
A model to support multi-social-network applications | 1-gen-2014 | Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Lax, Gianluca | |
Fortifying TripAdvisor against reputation-system attacks | 1-gen-2014 | Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Lax, Gianluca | |
A novel pseudo random number generator based on L'Ecuyer's scheme | 1-gen-2014 | Buccafurri, Francesco; Lax, Gianluca | |
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks | 1-gen-2014 | Buccafurri, Francesco; Coppolino, L; D'Antonio, S; Garofalo, A; Nocera, A; Romano, L; Lax, Gianluca | |
Driving global team formation in social networks to obtain diversity | 1-gen-2014 | Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Ursino, D; Lax, Gianluca | |
Moving from social networks to social internetworking scenarios: The crawling perspective | 1-gen-2014 | Buccafurri, Francesco; Nocera, A; Ursino, D; Lax, Gianluca | |
A Privacy-Preserving Solution for Tracking People in Critical Environments | 1-gen-2014 | Buccafurri, Francesco; Lax, Gianluca; Nicolazzo, Serena; Nocera, Antonino | |
A lightweight electronic signature scheme using Twitter | 1-gen-2015 | Buccafurri, Francesco; Fotia, L; Nicolazzo, S; Nocera, A; Lax, Gianluca | |
Accountability-preserving anonymous delivery of cloud services | 1-gen-2015 | Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Lax, Gianluca | |
A model implementing certified reputation and its application to TripAdvisor | 1-gen-2015 | Buccafurri, Francesco; Nicolazzo, S; Nocera, A; Lax, Gianluca |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile