Sfoglia per Relatore
A Machine Learning Approach For Predicting Vulnerability Assessment Requests
2021/2022 SHENA, SARA
A Privacy-preserving and Communication-Efficient Federated Learning solution for Industrial Applications
2022/2023 MOHAMMADI, MOHAMMADREZA
AGIR: Automatic Generation of Intelligence Reports
2022/2023 PERRINA, FILIPPO
Analyzing social dynamics and linguistic features of online extremism: the case of Gab
2020/2021 Etta, Gabriele
Assessment of the blocking cards effectiveness in protecting Mifare Classic smart card
2021/2022 ALECCI, MARCO
Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints
2023/2024 SOLETI, MARTINA
Backdoor Attacks and Defences on Neural Networks
2021/2022 BELLUOMINI, MASSIMILIANO
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks
2022/2023 LOTTO, ALESSANDRO
Cybersecurity: Vulnerabilità nei Sistemi di Guida Autonoma
2021/2022 POLATO, ANDREA
Demistificare la visualizzazione delle immagini dei malware: migliorare la riproducibilità e la spiegabilità
2022/2023 BROSOLO, MATTEO
Deployment di strumenti di sicurezza in IaaS
2021/2022 KOKOLLARI, DARDAN
Designing a privacy preserving solution on programmable switches
2023/2024 COREGGIOLI, CRISTIAN
Development of a neural network to identify CS:GO players
2020/2021 KOSTADINOV, SAMUEL
Distributed Intrusion Detection System for Heterogeneous Data in Industrial Control Systems
2022/2023 FREDA, FRANCESCO
Divergent: niente è come sembra. Una nuova difesa contro attacchi di tipo Website fingerprinting
2021/2022 VAROTTO, FRANCESCO
Dr. Jekyll and Mr. Hyde: Two Faces of LLMs
2023/2024 COLLU, MATTEO GIOELE
Evaluation of UEBA and SIEM tools for enhancing data security and management
2021/2022 ALIAKBARZADEH, SHABNAM
Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing
2023/2024 DRAGO, FRANCESCO
Facebook Friend Requests' Analysis: development of tools for data collection and analysis
2020/2021 ZUCCOLO, GIADA
FairDrop: a Confidential Fair Exchange Protocol for Media Workers
2021/2022 GALVANI, EGON
Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
---|---|---|---|---|---|
Lauree magistrali | 2021 | A Machine Learning Approach For Predicting Vulnerability Assessment Requests | A Machine Learning Approach For Predicting Vulnerability Assessment Requests | SHENA, SARA | |
Lauree magistrali | 2022 | A Privacy-preserving and Communication-Efficient Federated Learning solution for Industrial Applications | A Privacy-preserving and Communication-Efficient Federated Learning solution for Industrial Applications | MOHAMMADI, MOHAMMADREZA | |
Lauree magistrali | 2022 | AGIR: Automatic Generation of Intelligence Reports | AGIR: Automatic Generation of Intelligence Reports | PERRINA, FILIPPO | |
Lauree magistrali | 2020 | Analyzing social dynamics and linguistic features of online extremism: the case of Gab | - | Etta, Gabriele | |
Lauree magistrali | 2021 | Assessment of the blocking cards effectiveness in protecting Mifare Classic smart card | Assessment of the blocking cards effectiveness in protecting Mifare Classic smart card | ALECCI, MARCO | |
Lauree magistrali | 2023 | Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints | Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints | SOLETI, MARTINA | |
Lauree magistrali | 2021 | Backdoor Attacks and Defences on Neural Networks | Backdoor Attacks and Defences on Neural Networks | BELLUOMINI, MASSIMILIANO | |
Lauree magistrali | 2022 | BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks | BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks | LOTTO, ALESSANDRO | |
Lauree triennali | 2021 | Cybersecurity: Vulnerabilità nei Sistemi di Guida Autonoma | Cybersecurity: Autonomous Driving Systems Vulnerabilities | POLATO, ANDREA | |
Lauree magistrali | 2022 | Demistificare la visualizzazione delle immagini dei malware: migliorare la riproducibilità e la spiegabilità | Demystifying Malware Image Visualization: Enhancing Reproducibility and Explainability | BROSOLO, MATTEO | |
Lauree triennali | 2021 | Deployment di strumenti di sicurezza in IaaS | Deployment of key security tools in IaaS | KOKOLLARI, DARDAN | |
Lauree magistrali | 2023 | Designing a privacy preserving solution on programmable switches | Designing a privacy preserving solution on programmable switches | COREGGIOLI, CRISTIAN | |
Lauree triennali | 2020 | Development of a neural network to identify CS:GO players | Development of a neural network to identify CS:GO players | KOSTADINOV, SAMUEL | |
Lauree magistrali | 2022 | Distributed Intrusion Detection System for Heterogeneous Data in Industrial Control Systems | Distributed Intrusion Detection System for Heterogeneous Data in Industrial Control Systems | FREDA, FRANCESCO | |
Lauree magistrali | 2021 | Divergent: niente è come sembra. Una nuova difesa contro attacchi di tipo Website fingerprinting | Divergent: nothing as it seems. A novel defence against Website Fingerprinting attacks | VAROTTO, FRANCESCO | |
Lauree magistrali | 2023 | Dr. Jekyll and Mr. Hyde: Two Faces of LLMs | Dr. Jekyll and Mr. Hyde: Two Faces of LLMs | COLLU, MATTEO GIOELE | |
Lauree magistrali | 2021 | Evaluation of UEBA and SIEM tools for enhancing data security and management | Evaluation of UEBA and SIEM tools for enhancing data security and management | ALIAKBARZADEH, SHABNAM | |
Lauree magistrali | 2023 | Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing | Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing | DRAGO, FRANCESCO | |
Lauree triennali | 2020 | Facebook Friend Requests' Analysis: development of tools for data collection and analysis | Facebook Friend Requests' Analysis: development of tools for data collection and analysis | ZUCCOLO, GIADA | |
Lauree magistrali | 2021 | FairDrop: a Confidential Fair Exchange Protocol for Media Workers | FairDrop: a Confidential Fair Exchange Protocol for Media Workers | GALVANI, EGON |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile