Sfoglia per Relatore
Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling
2022/2023 COSUTI, LUCA
Algoritmi di rilevamento anomalie per sistemi mobili wireless
2024/2025 SULTANOV, RAUF
Analisi dell'Interazione fra Blockchain ed Intelligenza Artificiale: implicazioni legali dell'integrazione delle due tecnologie
2023/2024 DE BENI, MARTINA
Analisi della complessità dei circuiti quantistici
2022/2023 CASADO MORENO, ALBERTO
Analisi di vulnerabilità e implementazione di applicazioni malevole nell'architettura 5G O-RAN
2024/2025 BENEDETTI, DAVIDE
Analysis of airgap security attack vectors and mitigating strategies
2022/2023 SURESH BABU, NAVEEN KUMAR
Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases
2021/2022 SHAHBAZI, ZEINAB
Automating Security Advisory evaluation through Large Language Models.
2024/2025 KUMAR, VINAYAK
Automating the Maturity Model for Audit and Compliance: An NLP and Retrieval-Augmented Generation (RAG) Approach
2024/2025 PASCA, MARCO
Breaking Shared Perception: Experimental Adversarial Attacks on Cooperative Autonomous Vehicle Systems
2024/2025 BERNARDI, MARCO
Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments
2023/2024 IONESCU, VLAD-GEORGE
Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes
2022/2023 JAFFAR, MUHAMMAD ASAD JAHANGIR
Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons
2022/2023 COSTANTINI, LORENZO
Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy
2023/2024 DARDOURI, LEILA
Detection of Attacks to ADS-B Protocol through Graph Neural Networks and Anomaly Detection Techniques using Crowdsourced Sensors Network
2024/2025 DE GIUDICI, FRANCESCO
Drone Wireless Charging Profiling and Fingerpriting
2023/2024 AMADORI, ELEONORA
EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities
2022/2023 PREATONI, RICCARDO
Energy Depletion Attacks on Battery-powered IoT Devices
2024/2025 MARJOUEI, KOUROSH
Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools
2023/2024 CIFTPINAR, NURI BERK
Enhancing Tor Privacy: A Study on State-of-the-Art Session Correlation Methods and Possible Countermeasures
2024/2025 LATINI, LUDOVICO
| Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
|---|---|---|---|---|---|
| Lauree magistrali | 2022 | Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling | Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling | COSUTI, LUCA | |
| Lauree magistrali | 2024 | Algoritmi di rilevamento anomalie per sistemi mobili wireless | Anomaly detection algorithms for wireless mobile systems | SULTANOV, RAUF | |
| Lauree triennali | 2023 | Analisi dell'Interazione fra Blockchain ed Intelligenza Artificiale: implicazioni legali dell'integrazione delle due tecnologie | Analysis of the Interaction between Blockchain and Artificial Intelligence: legal implications of the integration of the two technologies | DE BENI, MARTINA | |
| Lauree triennali | 2022 | Analisi della complessità dei circuiti quantistici | Analysis of the complexity of quantum circuits | CASADO MORENO, ALBERTO | |
| Lauree triennali | 2024 | Analisi di vulnerabilità e implementazione di applicazioni malevole nell'architettura 5G O-RAN | Security Analysis and Implementation of Malicious Applications in 5G O-RAN Architecture | BENEDETTI, DAVIDE | |
| Lauree magistrali | 2022 | Analysis of airgap security attack vectors and mitigating strategies | Analysis of airgap security attack vectors and mitigating strategies | SURESH BABU, NAVEEN KUMAR | |
| Lauree magistrali | 2021 | Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases | Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases | SHAHBAZI, ZEINAB | |
| Lauree magistrali | 2024 | Automating Security Advisory evaluation through Large Language Models. | Automating Security Advisory evaluation through Large Language Models. | KUMAR, VINAYAK | |
| Lauree magistrali | 2024 | Automating the Maturity Model for Audit and Compliance: An NLP and Retrieval-Augmented Generation (RAG) Approach | Automating the Maturity Model for Audit and Compliance: An NLP and Retrieval-Augmented Generation (RAG) Approach | PASCA, MARCO | |
| Lauree magistrali | 2024 | Breaking Shared Perception: Experimental Adversarial Attacks on Cooperative Autonomous Vehicle Systems | Breaking Shared Perception: Experimental Adversarial Attacks on Cooperative Autonomous Vehicle Systems | BERNARDI, MARCO | |
| Lauree magistrali | 2023 | Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments | Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments | IONESCU, VLAD-GEORGE | |
| Lauree magistrali | 2022 | Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes | Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes | JAFFAR, MUHAMMAD ASAD JAHANGIR | |
| Lauree magistrali | 2022 | Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons | Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons | COSTANTINI, LORENZO | |
| Lauree magistrali | 2023 | Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy | Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy | DARDOURI, LEILA | |
| Lauree magistrali | 2024 | Detection of Attacks to ADS-B Protocol through Graph Neural Networks and Anomaly Detection Techniques using Crowdsourced Sensors Network | Detection of Attacks to ADS-B Protocol through Graph Neural Networks and Anomaly Detection Techniques using Crowdsourced Sensors Network | DE GIUDICI, FRANCESCO | |
| Lauree triennali | 2023 | Drone Wireless Charging Profiling and Fingerpriting | Drone Wireless Charging Profiling and Fingerpriting | AMADORI, ELEONORA | |
| Lauree magistrali | 2022 | EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities | EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities | PREATONI, RICCARDO | |
| Lauree magistrali | 2024 | Energy Depletion Attacks on Battery-powered IoT Devices | Energy Depletion Attacks on Battery-powered IoT Devices | MARJOUEI, KOUROSH | |
| Lauree magistrali | 2023 | Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools | Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools | CIFTPINAR, NURI BERK | |
| Lauree magistrali | 2024 | Enhancing Tor Privacy: A Study on State-of-the-Art Session Correlation Methods and Possible Countermeasures | Enhancing Tor Privacy: A Study on State-of-the-Art Session Correlation Methods and Possible Countermeasures | LATINI, LUDOVICO |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile