Follow
Stefano Guarino
Stefano Guarino
Researcher, IAC - CNR
Verified email at iac.cnr.it
Title
Cited by
Cited by
Year
Security in wireless ad-hoc networks–a survey
R Di Pietro, S Guarino, NV Verde, J Domingo-Ferrer
Computer Communications 51, 1-20, 2014
2032014
Information disorders during the COVID-19 infodemic: The case of Italian Facebook
S Guarino, F Pierri, M Di Giovanni, A Celestini
Online Social Networks and Media 22, 100124, 2021
58*2021
Characterizing networks of propaganda on twitter: a case study
S Guarino, N Trino, A Celestini, A Chessa, G Riotta
Applied Network Science 5 (1), 1-22, 2020
532020
Exploring and analyzing the tor hidden services graph
M Bernaschi, A Celestini, S Guarino, F Lombardi
ACM Transactions on the Web (TWEB) 11 (4), 1-26, 2017
362017
Spiders like onions: on the network of tor hidden services
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
The World Wide Web Conference, 105-115, 2019
302019
Beyond fact-checking: Network analysis tools for monitoring disinformation in social media
S Guarino, N Trino, A Chessa, G Riotta
Complex Networks and Their Applications VIII: Volume 1 Proceedings of the …, 2020
292020
Design, implementation and test of a flexible tor-oriented web mining toolkit
A Celestini, S Guarino
Proceedings of the 7th International Conference on Web Intelligence, Mining …, 2017
132017
Inferring urban social networks from publicly available data
S Guarino, E Mastrostefano, M Bernaschi, A Celestini, M Cianfriglia, ...
Future Internet 13 (5), 108, 2021
122021
Epidemic data survivability in unattended wireless sensor networks: New models and results
G Aliberti, R Di Pietro, S Guarino
Journal of Network and Computer Applications 99, 146-165, 2017
122017
Data confidentiality and availability via secret sharing and node mobility in UWSN
R Di Pietro, S Guarino
2013 Proceedings IEEE INFOCOM, 205-209, 2013
122013
Research data exchange solution
LA Møller, A Bechmann
82019
A Novel GPU-Based Implementation of the Cube Attack: Preliminary Results Against Trivium
M Cianfriglia, S Guarino, M Bernaschi, F Lombardi, M Pedicini
Applied Cryptography and Network Security: 15th International Conference …, 2017
82017
Provable storage medium for data storage outsourcing
S Guarino, ES Canlar, M Conti, R Di Pietro, A Solanas
IEEE Transactions on Services Computing 8 (6), 985-997, 2014
82014
Confidentiality and availability issues in mobile unattended wireless sensor networks
R Di Pietro, S Guarino
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
82013
A model for urban social networks
S Guarino, E Mastrostefano, A Celestini, M Bernaschi, M Cianfriglia, ...
International Conference on Computational Science, 281-294, 2021
72021
Multi-word structural topic modelling of ToR drug marketplaces
S Guarino, M Santoro
2018 IEEE 12th International Conference on Semantic Computing (ICSC), 269-273, 2018
72018
Unsupervised Classification of Routes and Plates from the Trap-2017 Dataset
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Traffic Mining Applied to Police Activities: Proceedings of the 1st Italian …, 2018
72018
Traffic data: exploratory data analysis with Apache Accumulo
M Bernaschi, A Celestini, S Guarino, F Lombardi, E Mastrostefano
Traffic Mining Applied to Police Activities: Proceedings of the 1st Italian …, 2018
62018
Cryptanalysis on GPUs with the cube attack: design, optimization and performances gains
M Cianfriglia, S Guarino
2017 International Conference on High Performance Computing & Simulation …, 2017
62017
Onion under Microscope: An in-depth analysis of the Tor Web
M Bernaschi, A Celestini, M Cianfriglia, S Guarino, F Lombardi, ...
World Wide Web 25 (3), 1287-1313, 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20