diff --git a/package-lock.json b/package-lock.json index c794674..ceac82c 100644 --- a/package-lock.json +++ b/package-lock.json @@ -12,7 +12,6 @@ "@docusaurus/plugin-content-docs": "^3.1.1", "@docusaurus/preset-classic": "^3.1.1", "@docusaurus/theme-mermaid": "^3.1.1", - "@iconify/react": "^4.1.1", "@mdx-js/react": "^3.0.0", "clsx": "^2.0.0", "docusaurus-plugin-openapi-docs": "^2.1.0", @@ -2658,25 +2657,6 @@ "react-hook-form": "^7.0.0" } }, - "node_modules/@iconify/react": { - "version": "4.1.1", - "resolved": "https://registry.npmjs.org/@iconify/react/-/react-4.1.1.tgz", - "integrity": "sha512-jed14EjvKjee8mc0eoscGxlg7mSQRkwQG3iX3cPBCO7UlOjz0DtlvTqxqEcHUJGh+z1VJ31Yhu5B9PxfO0zbdg==", - "dependencies": { - "@iconify/types": "^2.0.0" - }, - "funding": { - "url": "https://github.com/sponsors/cyberalien" - }, - "peerDependencies": { - "react": ">=16" - } - }, - "node_modules/@iconify/types": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/@iconify/types/-/types-2.0.0.tgz", - "integrity": "sha512-+wluvCrRhXrhyOmRDJ3q8mux9JkKy5SJ/v8ol2tu4FVjyYvtEzkc/3pK15ET6RKg4b4w4BmTk1+gsCUhf21Ykg==" - }, "node_modules/@isaacs/cliui": { "version": "8.0.2", "resolved": "https://registry.npmjs.org/@isaacs/cliui/-/cliui-8.0.2.tgz", diff --git a/src/pages/publications.md b/src/pages/publications.md index e453c32..dea0c80 100644 --- a/src/pages/publications.md +++ b/src/pages/publications.md @@ -8,7 +8,7 @@ hide_table_of_contents: true ## White Paper -L. Giorgino and A. Vesco, "The Mediterraneus Protocol: building an SSI native decentralised ecosystem of digital services" arXive, 2024. \ +L. Giorgino and A. Vesco, "The Mediterraneus Protocol: building an SSI native decentralised ecosystem of digital services" white paper v1.0, arXive, 2024.\ [Online]. Available: https://doi.org/10.48550/arXiv.2403.13510 ## Journals @@ -18,7 +18,8 @@ L. Perugini and A. Vesco, "On the integration of Self-Sovereign Identity with TL D. G. Berbecaru, S. Sisinni, A. Lioy, B. Rat, D. Margaria, and A. Vesco, "Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network," *IEEE Access*, vol. 11, pp. 50 510–50 527, 2023. -E. Calia, M. Mezzalama, and A. Vesco, "Cybersecurity per Internet of Things e Infrastrutture Critiche," *Memorie dell’Accademia delle Scienze di Torino*, vol. 2, 2023. +E. Calia, M. Mezzalama, and A. Vesco, "Cybersecurity per Internet of Things e Infrastrutture Critiche," *Memorie dell’Accademia delle Scienze di Torino*, vol. 2, 2023. \ +[Online]. Available: https://www.accademiadellescienze.it/book/06ff1c47-7356-45a8-aed2-623ff75898bf S. Sisinni, D. Margaria, I. Pedone, A. Lioy, and A. Vesco, "Integrity Verification of Distributed Nodes in Critical Infrastructures," *Sensors*, vol. 22, no. 18, 2022. \ [Online]. Available: https://www.mdpi.com/1424-8220/22/18/6950