Sfoglia per Relatore
Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling
2022/2023 COSUTI, LUCA
Analisi dell'Interazione fra Blockchain ed Intelligenza Artificiale: implicazioni legali dell'integrazione delle due tecnologie
2023/2024 DE BENI, MARTINA
Analisi della complessità dei circuiti quantistici
2022/2023 CASADO MORENO, ALBERTO
Analysis of airgap security attack vectors and mitigating strategies
2022/2023 SURESH BABU, NAVEEN KUMAR
Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases
2021/2022 SHAHBAZI, ZEINAB
Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments
2023/2024 IONESCU, VLAD-GEORGE
Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes
2022/2023 JAFFAR, MUHAMMAD ASAD JAHANGIR
Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons
2022/2023 COSTANTINI, LORENZO
Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy
2023/2024 DARDOURI, LEILA
Drone Wireless Charging Profiling and Fingerpriting
2023/2024 AMADORI, ELEONORA
EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities
2022/2023 PREATONI, RICCARDO
Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools
2023/2024 CIFTPINAR, NURI BERK
Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts
2021/2022 CATTAI, CHRISTIAN
I protocolli di consenso nelle differenti implementazioni della tecnologia blockchain
2022/2023 MARSICH, MANUELE
Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario
2021/2022 BIANCHI, TOMMASO
Implementazione dell'algoritmo eMana per la sicurezza della rete IOTA
2021/2022 D'ALBERTON, ENRICO
O-RAN Threats analysis against Near-RT RIC and E2 nodes
2022/2023 ADAMI, NICOLA
Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment
2022/2023 RIZZO, ALESSANDRO
Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction
2021/2022 CASONATO, MATTEO
Profiling drones via wireless power transfer side channel
2023/2024 CORNACCHIA, MATTEO
Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
---|---|---|---|---|---|
Lauree magistrali | 2022 | Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling | Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling | COSUTI, LUCA | |
Lauree triennali | 2023 | Analisi dell'Interazione fra Blockchain ed Intelligenza Artificiale: implicazioni legali dell'integrazione delle due tecnologie | Analysis of the Interaction between Blockchain and Artificial Intelligence: legal implications of the integration of the two technologies | DE BENI, MARTINA | |
Lauree triennali | 2022 | Analisi della complessità dei circuiti quantistici | Analysis of the complexity of quantum circuits | CASADO MORENO, ALBERTO | |
Lauree magistrali | 2022 | Analysis of airgap security attack vectors and mitigating strategies | Analysis of airgap security attack vectors and mitigating strategies | SURESH BABU, NAVEEN KUMAR | |
Lauree magistrali | 2021 | Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases | Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases | SHAHBAZI, ZEINAB | |
Lauree magistrali | 2023 | Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments | Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments | IONESCU, VLAD-GEORGE | |
Lauree magistrali | 2022 | Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes | Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes | JAFFAR, MUHAMMAD ASAD JAHANGIR | |
Lauree magistrali | 2022 | Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons | Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons | COSTANTINI, LORENZO | |
Lauree magistrali | 2023 | Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy | Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy | DARDOURI, LEILA | |
Lauree triennali | 2023 | Drone Wireless Charging Profiling and Fingerpriting | Drone Wireless Charging Profiling and Fingerpriting | AMADORI, ELEONORA | |
Lauree magistrali | 2022 | EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities | EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities | PREATONI, RICCARDO | |
Lauree magistrali | 2023 | Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools | Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools | CIFTPINAR, NURI BERK | |
Lauree magistrali | 2021 | Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts | Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts | CATTAI, CHRISTIAN | |
Lauree triennali | 2022 | I protocolli di consenso nelle differenti implementazioni della tecnologia blockchain | Consensus protocols in the different implementations of blockchain technology | MARSICH, MANUELE | |
Lauree magistrali | 2021 | Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario | Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario | BIANCHI, TOMMASO | |
Lauree triennali | 2021 | Implementazione dell'algoritmo eMana per la sicurezza della rete IOTA | Implementation of eMana algorithm for IOTA network security | D'ALBERTON, ENRICO | |
Lauree magistrali | 2022 | O-RAN Threats analysis against Near-RT RIC and E2 nodes | O-RAN Threats analysis against Near-RT RIC and E2 nodes | ADAMI, NICOLA | |
Lauree magistrali | 2022 | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | RIZZO, ALESSANDRO | |
Lauree triennali | 2021 | Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction | Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction | CASONATO, MATTEO | |
Lauree magistrali | 2023 | Profiling drones via wireless power transfer side channel | Profiling drones via wireless power transfer side channel | CORNACCHIA, MATTEO |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile