Sfoglia per Relatore  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 1 a 20 di 44
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2022 Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling COSUTI, LUCA
Lauree magistrali 2024 Algoritmi di rilevamento anomalie per sistemi mobili wireless Anomaly detection algorithms for wireless mobile systems SULTANOV, RAUF
Lauree triennali 2023 Analisi dell'Interazione fra Blockchain ed Intelligenza Artificiale: implicazioni legali dell'integrazione delle due tecnologie Analysis of the Interaction between Blockchain and Artificial Intelligence: legal implications of the integration of the two technologies DE BENI, MARTINA
Lauree triennali 2022 Analisi della complessità dei circuiti quantistici Analysis of the complexity of quantum circuits CASADO MORENO, ALBERTO
Lauree triennali 2024 Analisi di vulnerabilità e implementazione di applicazioni malevole nell'architettura 5G O-RAN Security Analysis and Implementation of Malicious Applications in 5G O-RAN Architecture BENEDETTI, DAVIDE
Lauree magistrali 2022 Analysis of airgap security attack vectors and mitigating strategies Analysis of airgap security attack vectors and mitigating strategies SURESH BABU, NAVEEN KUMAR
Lauree magistrali 2021 Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases SHAHBAZI, ZEINAB
Lauree magistrali 2024 Automating Security Advisory evaluation through Large Language Models. Automating Security Advisory evaluation through Large Language Models. KUMAR, VINAYAK
Lauree magistrali 2024 Automating the Maturity Model for Audit and Compliance: An NLP and Retrieval-Augmented Generation (RAG) Approach Automating the Maturity Model for Audit and Compliance: An NLP and Retrieval-Augmented Generation (RAG) Approach PASCA, MARCO
Lauree magistrali 2024 Breaking Shared Perception: Experimental Adversarial Attacks on Cooperative Autonomous Vehicle Systems Breaking Shared Perception: Experimental Adversarial Attacks on Cooperative Autonomous Vehicle Systems BERNARDI, MARCO
Lauree magistrali 2023 Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments IONESCU, VLAD-GEORGE
Lauree magistrali 2022 Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes JAFFAR, MUHAMMAD ASAD JAHANGIR
Lauree magistrali 2022 Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons COSTANTINI, LORENZO
Lauree magistrali 2023 Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy DARDOURI, LEILA
Lauree magistrali 2024 Detection of Attacks to ADS-B Protocol through Graph Neural Networks and Anomaly Detection Techniques using Crowdsourced Sensors Network Detection of Attacks to ADS-B Protocol through Graph Neural Networks and Anomaly Detection Techniques using Crowdsourced Sensors Network DE GIUDICI, FRANCESCO
Lauree triennali 2023 Drone Wireless Charging Profiling and Fingerpriting Drone Wireless Charging Profiling and Fingerpriting AMADORI, ELEONORA
Lauree magistrali 2022 EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities PREATONI, RICCARDO
Lauree magistrali 2024 Energy Depletion Attacks on Battery-powered IoT Devices Energy Depletion Attacks on Battery-powered IoT Devices MARJOUEI, KOUROSH
Lauree magistrali 2023 Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools CIFTPINAR, NURI BERK
Lauree magistrali 2024 Enhancing Tor Privacy: A Study on State-of-the-Art Session Correlation Methods and Possible Countermeasures Enhancing Tor Privacy: A Study on State-of-the-Art Session Correlation Methods and Possible Countermeasures LATINI, LUDOVICO
Mostrati risultati da 1 a 20 di 44
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile