Alberto Compagno
Alberto Compagno
Researcher & Software Engineer at Cisco Systems
Verified email at cisco.com
TitleCited byYear
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
A Compagno, M Conti, P Gasti, G Tsudik
38th annual IEEE conference on local computer networks, 630-638, 2013
3502013
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking
A Compagno, M Conti, C Ghali, G Tsudik
24th International Conference on Computer Communication and Networks (ICCCN …, 2015
342015
OnboardICNg: a secure protocol for on-boarding IoT devices in ICN
A Compagno, M Conti, R Droms
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 166-175, 2016
222016
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking
A Compagno, M Conti, P Gasti, LV Mancini, G Tsudik
13th International Conference on Applied Cryptography and Network Security …, 2015
192015
Virtualized ICN (vICN): Towards a unified network virtualization framework for ICN experimentation
M Sardara, L Muscariello, J Augé, M Enguehard, A Compagno, ...
Proceedings of the 4th ACM Conference on Information-Centric Networking, 109-115, 2017
172017
Secure producer mobility in information-centric network
A Compagno, X Zeng, L Muscariello, G Carofiglio, J Augé
Proceedings of the 4th ACM Conference on Information-Centric Networking, 163-169, 2017
162017
NDN interest flooding attacks and countermeasures
A Compagno, M Conti, P Gasti, G Tsudik
Annual Computer Security Applications Conference, 2012
152012
Don't skype & type!: Acoustic eavesdropping in voice-over-ip
A Compagno, M Conti, D Lain, G Tsudik
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
142017
Hybrid information-centric networking
L Muscariello, G Carofiglio, J Auge, M Papalini
Internet-Draft draft-muscariello-intareahicn-00. Internet Engineering Task …, 2018
102018
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols
A Compagno, M Conti, A D'Amico, G Dini, P Perazzo, L Taponecco
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016
92016
Security and privacy analysis of national science foundation future internet architectures
M Ambrosin, A Compagno, M Conti, C Ghali, G Tsudik
IEEE Communications Surveys & Tutorials 20 (2), 1418-1442, 2018
62018
Boten ELISA: A novel approach for botnet C&C in online social networks
A Compagno, M Conti, D Lain, G Lovisotto, LV Mancini
2015 IEEE Conference on Communications and Network Security (CNS), 74-82, 2015
52015
A transport layer and socket API for (h) ICN: design, implementation and performance analysis
M Sardara, L Muscariello, A Compagno
Proceedings of the 5th ACM Conference on Information-Centric Networking, 137-147, 2018
32018
Security and privacy analysis of nsf future internet architectures
M Ambrosin, A Compagno, M Conti, C Ghali, G Tsudik
arXiv preprint arXiv:1610.00355, 2016
32016
An ICN-Based Authentication Protocol for a Simplified LTE Architecture
A Compagno, M Conti, M Hassan
International Worskhop on Communication Security, 125-140, 2017
22017
ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN
A Benarfa, M Hassan, A Compagno, E Losiouk, MB Yagoubi, M Conti
International Conference on Wired/Wireless Internet Communication, 53-65, 2019
2019
GATE and FENCE: Geo-Blocking Protocols for Named Data Networking
A Compagno, M Conti, S Munari, R Lazzeretti
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 580-588, 2018
2018
IaaS-Aided Access Control for Information-Centric IoT
G Carofiglio, A Compagno, M Conti, F De Gaspari, L Muscariello
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 208-216, 2018
2018
Efficient transport layer and socket API for ICN
M Sardara, L Muscariello, A Compagno
Proceedings of the 5th ACM Conference on Information-Centric Networking, 206-207, 2018
2018
System and method to facilitate an information-centric networking socket and fast in-network authentication
L Muscariello, G Carofiglio, J Augé, A Compagno
US Patent App. 15/658,603, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20