Sfoglia per Relatore  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 1 a 20 di 30
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2022 Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling Aerial Threat Detection around Critical Infrastructures: Drone Trajectory Analysis and Behavior Profiling COSUTI, LUCA
Lauree triennali 2023 Analisi dell'Interazione fra Blockchain ed Intelligenza Artificiale: implicazioni legali dell'integrazione delle due tecnologie Analysis of the Interaction between Blockchain and Artificial Intelligence: legal implications of the integration of the two technologies DE BENI, MARTINA
Lauree triennali 2022 Analisi della complessità dei circuiti quantistici Analysis of the complexity of quantum circuits CASADO MORENO, ALBERTO
Lauree magistrali 2022 Analysis of airgap security attack vectors and mitigating strategies Analysis of airgap security attack vectors and mitigating strategies SURESH BABU, NAVEEN KUMAR
Lauree magistrali 2021 Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases SHAHBAZI, ZEINAB
Lauree magistrali 2023 Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments Cloud-Native Telecom: The Integration and Security of 5G in Public Cloud Environments IONESCU, VLAD-GEORGE
Lauree magistrali 2022 Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes Comparative Analysis of Malware Behavior in Hardware and Virtual Sandboxes JAFFAR, MUHAMMAD ASAD JAHANGIR
Lauree magistrali 2022 Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons COSTANTINI, LORENZO
Lauree magistrali 2023 Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy Deceptive Defence in Software Security: Injecting Non-Exploitable Bugs Using a Pattern-Based Strategy DARDOURI, LEILA
Lauree triennali 2023 Drone Wireless Charging Profiling and Fingerpriting Drone Wireless Charging Profiling and Fingerpriting AMADORI, ELEONORA
Lauree magistrali 2022 EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities PREATONI, RICCARDO
Lauree magistrali 2023 Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools CIFTPINAR, NURI BERK
Lauree magistrali 2021 Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts CATTAI, CHRISTIAN
Lauree triennali 2022 I protocolli di consenso nelle differenti implementazioni della tecnologia blockchain Consensus protocols in the different implementations of blockchain technology MARSICH, MANUELE
Lauree magistrali 2021 Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario BIANCHI, TOMMASO
Lauree triennali 2021 Implementazione dell'algoritmo eMana per la sicurezza della rete IOTA Implementation of eMana algorithm for IOTA network security D'ALBERTON, ENRICO
Lauree magistrali 2022 O-RAN Threats analysis against Near-RT RIC and E2 nodes O-RAN Threats analysis against Near-RT RIC and E2 nodes ADAMI, NICOLA
Lauree magistrali 2022 Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment RIZZO, ALESSANDRO
Lauree triennali 2021 Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction CASONATO, MATTEO
Lauree magistrali 2023 Profiling drones via wireless power transfer side channel Profiling drones via wireless power transfer side channel CORNACCHIA, MATTEO
Mostrati risultati da 1 a 20 di 30
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile