Sfoglia per Relatore  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 45 a 64 di 70
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2022 Safe Return Journey In A GPS Spoofing Attack Scenario Safe Return Journey In A GPS Spoofing Attack Scenario SCREMIN, NICOLA
Lauree magistrali 2024 Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships VALENTE, ANDREA
Lauree magistrali 2021 Security attacks and solutions on SDN control plane: A survey Security attacks and solutions on SDN control plane: A survey DE OLIVEIRA GOMES, THAIS
Lauree magistrali 2023 Security in Machine Learning: Exposing LLM Vulnerabilities through Poisoned Vector Databases in RAG-based System Security in Machine Learning: Exposing LLM Vulnerabilities through Poisoned Vector Databases in RAG-based System DARYABAR, NIMA
Lauree magistrali 2021 SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. BARDI, SARA
Lauree magistrali 2021 SPRITZ-PS: Validation of synthetic face images using a large dataset of printed documents SPRITZ-PS: Validation of synthetic face images using a large dataset of printed documents SHOARI, SEYEDSADRA
Lauree magistrali 2024 Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments JAMSHIDI, BAHAREH
Lauree magistrali 2021 STIXnet: entity and relation extraction from unstructured CTI reports STIXnet: entity and relation extraction from unstructured CTI reports MARCHIORI, FRANCESCO
Lauree magistrali 2023 Strengthening AI Security: An Exploration of Advanced Adversarial Defense Techniques Strengthening AI Security: An Exploration of Advanced Adversarial Defense Techniques YASEEN, MUTAHIR
Lauree triennali 2020 Studio e realizzazione di un orchestratore di honeypot Study and development of a honeypot orchestrator DELLO IACOVO, MARCO
Lauree triennali 2020 Studio e sviluppo di un web crawler intelligente per dark web e surface web Study and development of a smart web crawler for the dark web and the surface web GIACHETTO, DANIELE
Lauree magistrali 2020 Study and Implementation of Blockchain Compression - Maso, Matteo
Lauree triennali 2023 Sviluppo di Moduli per la Rilevazione di Attacchi Phishing: Studio, Analisi e Implementazione Development of Phishing Detection Modules: Study, Analysis, and Implementation LAGO, LEONARDO
Lauree magistrali 2021 TEE Against Backdoor Attack in Federate Learning TEE Against Backdoor Attack in Federate Learning BASTIANON, MATTIA
Lauree magistrali 2023 TeLL Me what you can't see - a forensic analysis for images data augmentation TeLL Me what you can't see - a forensic analysis for images data augmentation BIASETTON, PIETRO
Lauree magistrali 2022 Temperature attacks on TRNG and QRNG devices Temperature attacks on TRNG and QRNG devices BARSI, LUDOVICA
Lauree magistrali 2024 Time-based attacks for phishing detection evasion Time-based attacks for phishing detection evasion RADO, CRISTIANO ALEX
Lauree magistrali 2021 Toward Explainable deepfake detectors Toward Explainable deepfake detectors LISSANDRON, FRANCESCO
Lauree magistrali 2023 UAF and race conditions - An efficient combination for Android privilege escalation UAF and race conditions - An efficient combination for Android privilege escalation GOBBO, RICCARDO
Lauree magistrali 2024 Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis ROSA, NICOLÒ
Mostrati risultati da 45 a 64 di 70
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile