Stefano Guarino
Stefano Guarino
Research Fellow, IAC - CNR
Verified email at
Cited by
Cited by
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
Exploring and analyzing the tor hidden services graph
M Bernaschi, A Celestini, S Guarino, F Lombardi
ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017
Data confidentiality and availability via secret sharing and node mobility in UWSN
R Di Pietro, S Guarino
2013 Proceedings IEEE INFOCOM, 205-209, 2013
Provable storage medium for data storage outsourcing
S Guarino, ES Canlar, M Conti, R Di Pietro, A Solanas
IEEE Transactions on Services Computing 8 (6), 985-997, 2014
Confidentiality and availability issues in mobile unattended wireless sensor networks
R Di Pietro, S Guarino
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
Spiders like onions: on the network of tor hidden services
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
The World Wide Web Conference, 105-115, 2019
Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results
G Aliberti, R Di Pietro, S Guarino
Journal of Network and Computer Applications 99, 146-165, 2017
Beyond fact-checking: Network analysis tools for monitoring disinformation in social media
S Guarino, N Trino, A Chessa, G Riotta
International Conference on Complex Networks and Their Applications, 436-447, 2019
Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Italian Conference for the Traffic Police, 97-114, 2017
Characterizing networks of propaganda on twitter: a case study
S Guarino, N Trino, A Celestini, A Chessa, G Riotta
Applied Network Science 5 (1), 1-22, 2020
Traffic data: exploratory data analysis with Apache Accumulo
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Italian Conference for the Traffic Police, 129-143, 2017
Design, implementation and test of a flexible tor-oriented web mining toolkit
A Celestini, S Guarino
Proceedings of the 7th International Conference on Web Intelligence, Mining …, 2017
A novel GPU-based implementation of the cube attack
M Cianfriglia, S Guarino, M Bernaschi, F Lombardi, M Pedicini
International Conference on Applied Cryptography and Network Security, 184-207, 2017
Multi-word structural topic modelling of ToR drug marketplaces
S Guarino, M Santoro
2018 IEEE 12th International Conference on Semantic Computing (ICSC), 269-273, 2018
Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains
M Cianfriglia, S Guarino
2017 International Conference on High Performance Computing & Simulation …, 2017
Reliable and perfectly secret communication over the generalized Ozarow-Wyner’s wire-tap channel
G Aliberti, R Di Pietro, S Guarino
Computer Networks 109, 21-30, 2016
Information disorders during the COVID-19 infodemic: The case of Italian Facebook
S Guarino, F Pierri, M Di Giovanni, A Celestini
Online Social Networks and Media 22, 100124, 2021
Information disorders on Italian Facebook during COVID-19 infodemic
A Celestini, M Di Giovanni, S Guarino, F Pierri
arXiv preprint arXiv:2007.11302, 2020
Cyber Security in Montenegro: Practice, Framework and Challenges
R Šendelj, F Lombardi, I Ognjanović, S Guarino
A Model for Urban Social Networks
S Guarino, E Mastrostefano, M Bernaschi, A Celestini, M Cianfriglia, ...
arXiv preprint arXiv:2012.06652, 2020
The system can't perform the operation now. Try again later.
Articles 1–20