Trusting telemedicine: a discussion on risks, safety, legal implications and liability of involved stakeholders E Parimbelli, B Bottalico, E Losiouk, M Tomasi, A Santosuosso, G Lanzola, ... International journal of medical informatics 112, 90-98, 2018 | 132 | 2018 |
Randomized summer camp crossover trial in 5-to 9-year-old children: outpatient wearable artificial pancreas is feasible and safe S Del Favero, F Boscari, M Messori, I Rabbone, R Bonfanti, A Sabbion, ... Diabetes Care 39 (7), 1180-1185, 2016 | 103 | 2016 |
Remote Blood Glucose Monitoring in mHealth Scenarios: A Review G Lanzola, E Losiouk, S Del Favero, A Facchinetti, A Galderisi, S Quaglini, ... Sensors 16 (12), 1983, 2016 | 63 | 2016 |
The road ahead for networking: A survey on icn-ip coexistence solutions M Conti, A Gangwal, M Hassan, C Lal, E Losiouk IEEE Communications Surveys & Tutorials 22 (3), 2104-2129, 2020 | 54 | 2020 |
Evaluating the experience of children with type 1 diabetes and their parents taking part in an artificial pancreas clinical trial over multiple days in a diabetes camp setting A Troncone, R Bonfanti, D Iafusco, I Rabbone, A Sabbion, R Schiaffini, ... Diabetes Care 39 (12), 2158-2164, 2016 | 40 | 2016 |
{ScaRR}: Scalable Runtime Remote Attestation for Complex Systems F Toffalini, E Losiouk, A Biondo, J Zhou, M Conti 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 29 | 2019 |
Parental evaluation of a telemonitoring service for children with type 1 diabetes E Losiouk, G Lanzola, S Del Favero, F Boscari, M Messori, I Rabbone, ... Journal of telemedicine and telecare 24 (3), 230-237, 2018 | 23 | 2018 |
How do interval scales help us with better understanding IR evaluation measures? M Ferrante, N Ferro, E Losiouk Information Retrieval Journal 23, 289-317, 2020 | 21 | 2020 |
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN A Benarfa, M Hassan, E Losiouk, A Compagno, MB Yagoubi, M Conti | 21 | 2020 |
Vulnerabilities in Android webview objects: Still not the end! MA El-Zawawy, E Losiouk, M Conti Computers & Security 109, 102395, 2021 | 19 | 2021 |
Contact Tracing Made Un-relay-able M Casagrande, M Conti, E Losiouk Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 16 | 2021 |
{HideMyApp}: Hiding the presence of sensitive apps on android A Pham, I Dacosta, E Losiouk, J Stephan, K Huguenin, JP Hubaux 28th usenix security symposium (usenix security 19), 711-728, 2019 | 16 | 2019 |
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps MA El-Zawawy, E Losiouk, M Conti International Journal of Information Security 20 (1), 39-58, 2021 | 14 | 2021 |
A proactive cache privacy attack on NDN A Compagno, M Conti, E Losiouk, G Tsudik, S Valle NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2020 | 13 | 2020 |
Chokifa: A new detection and mitigation approach against interest flooding attacks in ndn A Benarfa, M Hassan, A Compagno, E Losiouk, MB Yagoubi, M Conti Wired/Wireless Internet Communications: 17th IFIP WG 6.2 International …, 2019 | 13 | 2019 |
GNN4IFA: Interest flooding attack detection with graph neural networks A Agiollo, E Bardhi, M Conti, R Lazzeretti, E Losiouk, A Omicini 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 615-630, 2023 | 12 | 2023 |
Breakmi: Reversing, exploiting and fixing xiaomi fitness tracking ecosystem M Casagrande, E Losiouk, M Conti, M Payer, D Antonioli IACR Transactions on Cryptographic Hardware and Embedded Systems, 330-366, 2022 | 11 | 2022 |
Continuous glucose monitoring linked to an artificial intelligence risk index: early footprints of intraventricular hemorrhage in preterm neonates A Galderisi, L Zammataro, E Losiouk, G Lanzola, K Kraemer, A Facchinetti, ... Diabetes technology & therapeutics 21 (3), 146-153, 2019 | 10 | 2019 |
Repack me if you can: An Anti-Repackaging solution based on Android Virtualization A Ruggia, E Losiouk, L Verderame, M Conti, A Merlo Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 9 | 2021 |
Side-channel attacks on mobile and IoT devices for Cyber–Physical systems M Conti, E Losiouk, R Poovendran, R Spolaor Computer Networks 207, 108858, 2022 | 8 | 2022 |