A biologically-inspired type-2 fuzzy set based algorithm for detecting misbehaving nodes in ad-hoc wireless networks A Visconti, H Tahayori International journal for infonomics 3 (2), 373-82, 2010 | 5 | 2010 |
A Biologically–Inspired type-2 fuzzy set based algorithm for detecting misbehaving nodes in ad hoc networks A Visconti, H Tahayori International Journal for Infonomics 3 (2), 270-277, 2010 | 5 | 2010 |
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium R La Scala, F Pintore, SK Tiwari, A Visconti Finite Fields and Their Applications 98, 102452, 2024 | | 2024 |
A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS C Lepore, M Ceria, A Visconti, UP Rao, KA Shah, L Zanolini Mathematics 8 (10), 1782, 2020 | 112 | 2020 |
A troyan Diffie-Hellman-like protocol based on proof of gullibility M Ceria, A De Piccoli, T Moriarty, A Visconti 2024 International Conference on Artificial Intelligence, Computer, Data …, 2024 | | 2024 |
A type-2 fuzzy set recognition algorithm for artificial immune systems A Visconti, H Tahayori International Workshop on Hybrid Artificial Intelligence Systems, 491-498, 2008 | 1 | 2008 |
An algebraic attack to the Bluetooth stream cipher E0 R La Scala, S Polese, SK Tiwari, A Visconti Finite Fields and Their Applications 84, 102102, 2022 | 5 | 2022 |
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size. CV Schiavo, A Visconti SECRYPT, 302-307, 2012 | | 2012 |
An innate immune system for the protection of computer networks A Pagnoni, A Visconti Proc. of the 4th International Symposium on Information and Communication …, 2005 | 28 | 2005 |
An iot inventory before deployment: a survey on iot protocols, communication technologies, vulnerabilities, attacks, and future research directions AO Bang, UP Rao, A Visconti, A Brighente, M Conti Computers & Security 123, 102914, 2022 | 30 | 2022 |
Artificial immune system based on interval type-2 fuzzy set paradigm A Visconti, H Tahayori Applied Soft Computing 11 (6), 4055-4063, 2011 | 35 | 2011 |
Augmented interval type-2 fuzzy set methodologies for email granulation H Tahayori, A Visconti, G Degli Antoni 2007 2nd International Workshop on Soft Computing Applications, 193-198, 2007 | 2 | 2007 |
Blockchain-based patient-driven Inter-OperableModel for healthcare 5.0 system K Shah, L Garg, D Kachoria, V Shah, S Darbar, A Visconti, C Bhatt, ... | | 2023 |
Blockchain, Web 3.0 e NFTs: i profili tecnici A Visconti, L Pelizzola IL MERCATO DEI NON FUNGIBLE TOKENS TRA ARTE, MODA E GAMIFICATION, 11, 0 | | |
Computation of $ H\rightarrow gg $ in $\scriptsize {DRED} $ and $\scriptsize {FDH} $: renormalization, operator mixing, and explicit two-loop results A Broggio, C Gnendiger, A Signer, D Stöckinger, A Visconti Eur. Phys. JC 75 (arXiv: 1503.09103), 418, 2015 | 2 | 2015 |
Concave type-2 fuzzy sets: properties and operations H Tahayori, AGB Tettamanzi, G Degli Antoni, A Visconti, M Moharrer Soft Computing 14, 749-756, 2010 | 31 | 2010 |
Content Popularity in Named Data Networking: Prediction Models And Security Applications M Conti, A Visconti, F Berto | | |
Crittografia: tra successi e fallimenti A Visconti @ DIGITCULT 4 (3), 9-14, 2019 | | 2019 |
De Cifris Cryptanalysis: selected papers from the ITASEC2020 workshop" Cryptanalysis: a key tool in securing and breaking ciphers" R LA SCALA, M Pedicini, A Visconti COLLECTIO CIPHRARUM 2, 2022 | | 2022 |
Degröbnerization and its applications: a new approach for data modelling M Ceria, T Mora, A Visconti preprint, 2022 | 3 | 2022 |