Sfoglia per Relatore
Safe Return Journey In A GPS Spoofing Attack Scenario
2022/2023 SCREMIN, NICOLA
Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships
2024/2025 VALENTE, ANDREA
Security attacks and solutions on SDN control plane: A survey
2021/2022 DE OLIVEIRA GOMES, THAIS
Security in Machine Learning: Exposing LLM Vulnerabilities through Poisoned Vector Databases in RAG-based System
2023/2024 DARYABAR, NIMA
SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM.
2021/2022 BARDI, SARA
SPRITZ-PS: Validation of synthetic face images using a large dataset of printed documents
2021/2022 SHOARI, SEYEDSADRA
Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments
2024/2025 JAMSHIDI, BAHAREH
STIXnet: entity and relation extraction from unstructured CTI reports
2021/2022 MARCHIORI, FRANCESCO
Strengthening AI Security: An Exploration of Advanced Adversarial Defense Techniques
2023/2024 YASEEN, MUTAHIR
Studio e realizzazione di un orchestratore di honeypot
2020/2021 DELLO IACOVO, MARCO
Studio e sviluppo di un web crawler intelligente per dark web e surface web
2020/2021 GIACHETTO, DANIELE
Study and Implementation of Blockchain Compression
2020/2021 Maso, Matteo
Sviluppo di Moduli per la Rilevazione di Attacchi Phishing: Studio, Analisi e Implementazione
2023/2024 LAGO, LEONARDO
TEE Against Backdoor Attack in Federate Learning
2021/2022 BASTIANON, MATTIA
TeLL Me what you can't see - a forensic analysis for images data augmentation
2023/2024 BIASETTON, PIETRO
Temperature attacks on TRNG and QRNG devices
2022/2023 BARSI, LUDOVICA
Time-based attacks for phishing detection evasion
2024/2025 RADO, CRISTIANO ALEX
Toward Explainable deepfake detectors
2021/2022 LISSANDRON, FRANCESCO
UAF and race conditions - An efficient combination for Android privilege escalation
2023/2024 GOBBO, RICCARDO
Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis
2024/2025 ROSA, NICOLÒ
| Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
|---|---|---|---|---|---|
| Lauree magistrali | 2022 | Safe Return Journey In A GPS Spoofing Attack Scenario | Safe Return Journey In A GPS Spoofing Attack Scenario | SCREMIN, NICOLA | |
| Lauree magistrali | 2024 | Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships | Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships | VALENTE, ANDREA | |
| Lauree magistrali | 2021 | Security attacks and solutions on SDN control plane: A survey | Security attacks and solutions on SDN control plane: A survey | DE OLIVEIRA GOMES, THAIS | |
| Lauree magistrali | 2023 | Security in Machine Learning: Exposing LLM Vulnerabilities through Poisoned Vector Databases in RAG-based System | Security in Machine Learning: Exposing LLM Vulnerabilities through Poisoned Vector Databases in RAG-based System | DARYABAR, NIMA | |
| Lauree magistrali | 2021 | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | BARDI, SARA | |
| Lauree magistrali | 2021 | SPRITZ-PS: Validation of synthetic face images using a large dataset of printed documents | SPRITZ-PS: Validation of synthetic face images using a large dataset of printed documents | SHOARI, SEYEDSADRA | |
| Lauree magistrali | 2024 | Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments | Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments | JAMSHIDI, BAHAREH | |
| Lauree magistrali | 2021 | STIXnet: entity and relation extraction from unstructured CTI reports | STIXnet: entity and relation extraction from unstructured CTI reports | MARCHIORI, FRANCESCO | |
| Lauree magistrali | 2023 | Strengthening AI Security: An Exploration of Advanced Adversarial Defense Techniques | Strengthening AI Security: An Exploration of Advanced Adversarial Defense Techniques | YASEEN, MUTAHIR | |
| Lauree triennali | 2020 | Studio e realizzazione di un orchestratore di honeypot | Study and development of a honeypot orchestrator | DELLO IACOVO, MARCO | |
| Lauree triennali | 2020 | Studio e sviluppo di un web crawler intelligente per dark web e surface web | Study and development of a smart web crawler for the dark web and the surface web | GIACHETTO, DANIELE | |
| Lauree magistrali | 2020 | Study and Implementation of Blockchain Compression | - | Maso, Matteo | |
| Lauree triennali | 2023 | Sviluppo di Moduli per la Rilevazione di Attacchi Phishing: Studio, Analisi e Implementazione | Development of Phishing Detection Modules: Study, Analysis, and Implementation | LAGO, LEONARDO | |
| Lauree magistrali | 2021 | TEE Against Backdoor Attack in Federate Learning | TEE Against Backdoor Attack in Federate Learning | BASTIANON, MATTIA | |
| Lauree magistrali | 2023 | TeLL Me what you can't see - a forensic analysis for images data augmentation | TeLL Me what you can't see - a forensic analysis for images data augmentation | BIASETTON, PIETRO | |
| Lauree magistrali | 2022 | Temperature attacks on TRNG and QRNG devices | Temperature attacks on TRNG and QRNG devices | BARSI, LUDOVICA | |
| Lauree magistrali | 2024 | Time-based attacks for phishing detection evasion | Time-based attacks for phishing detection evasion | RADO, CRISTIANO ALEX | |
| Lauree magistrali | 2021 | Toward Explainable deepfake detectors | Toward Explainable deepfake detectors | LISSANDRON, FRANCESCO | |
| Lauree magistrali | 2023 | UAF and race conditions - An efficient combination for Android privilege escalation | UAF and race conditions - An efficient combination for Android privilege escalation | GOBBO, RICCARDO | |
| Lauree magistrali | 2024 | Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis | Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis | ROSA, NICOLÒ |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile