Sfoglia per Relatore
Mostrati risultati da 1 a 16 di 16
Analisi della complessità dei circuiti quantistici
2022/2023 CASADO MORENO, ALBERTO
Analysis of airgap security attack vectors and mitigating strategies
2022/2023 SURESH BABU, NAVEEN KUMAR
Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases
2021/2022 SHAHBAZI, ZEINAB
Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons
2022/2023 COSTANTINI, LORENZO
EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities
2022/2023 PREATONI, RICCARDO
Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts
2021/2022 CATTAI, CHRISTIAN
I protocolli di consenso nelle differenti implementazioni della tecnologia blockchain
2022/2023 MARSICH, MANUELE
Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario
2021/2022 BIANCHI, TOMMASO
Implementazione dell'algoritmo eMana per la sicurezza della rete IOTA
2021/2022 D'ALBERTON, ENRICO
Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment
2022/2023 RIZZO, ALESSANDRO
Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction
2021/2022 CASONATO, MATTEO
Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus
2022/2023 STEFANI, CLAUDIO
Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards
2022/2023 KAWAS, MHD NAZEER
SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN
2022/2023 HASSAN, RAYYAN
Securing ADS-B Communication Systems Against Location Spoofing Attacks
2022/2023 SALAEVA, SITORA
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures
2022/2023 VAISHNAV, HARSHUL
Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
---|---|---|---|---|---|
Lauree triennali | 2022 | Analisi della complessità dei circuiti quantistici | Analysis of the complexity of quantum circuits | CASADO MORENO, ALBERTO | |
Lauree magistrali | 2022 | Analysis of airgap security attack vectors and mitigating strategies | Analysis of airgap security attack vectors and mitigating strategies | SURESH BABU, NAVEEN KUMAR | |
Lauree magistrali | 2021 | Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases | Analysis of security at the Near-real-time RIC xApps based on O-RAN-defined use cases | SHAHBAZI, ZEINAB | |
Lauree magistrali | 2022 | Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons | Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons | COSTANTINI, LORENZO | |
Lauree magistrali | 2022 | EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities | EF-CF Fuzzer and Extorsionware: Uncovering and Exploiting Smart Contract Vulnerabilities | PREATONI, RICCARDO | |
Lauree magistrali | 2021 | Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts | Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts | CATTAI, CHRISTIAN | |
Lauree triennali | 2022 | I protocolli di consenso nelle differenti implementazioni della tecnologia blockchain | Consensus protocols in the different implementations of blockchain technology | MARSICH, MANUELE | |
Lauree magistrali | 2021 | Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario | Identity-Based Authentication Protocol for On-Demand Dynamic Wireless Charging in Electric Vehicle Scenario | BIANCHI, TOMMASO | |
Lauree triennali | 2021 | Implementazione dell'algoritmo eMana per la sicurezza della rete IOTA | Implementation of eMana algorithm for IOTA network security | D'ALBERTON, ENRICO | |
Lauree magistrali | 2022 | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | RIZZO, ALESSANDRO | |
Lauree triennali | 2021 | Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction | Owning your data through Self-Sovereign Identity: agents implementation for Verifiable Credentials interaction | CASONATO, MATTEO | |
Lauree magistrali | 2022 | Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus | A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions | STEFANI, CLAUDIO | |
Lauree magistrali | 2022 | Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards | Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards | KAWAS, MHD NAZEER | |
Lauree magistrali | 2022 | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | HASSAN, RAYYAN | |
Lauree magistrali | 2022 | Securing ADS-B Communication Systems Against Location Spoofing Attacks | Securing ADS-B Communication Systems Against Location Spoofing Attacks | SALAEVA, SITORA | |
Lauree magistrali | 2022 | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | VAISHNAV, HARSHUL |
Mostrati risultati da 1 a 16 di 16
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile