Sfoglia per Relatore
General models and robust countermeasures for position spoofing attacks in Global Navigation Satellite Systems
2020/2021 CROSARA, LAURA
GNSS multiantenna receivers under multiantenna spoofing attacks
2019/2020 Pittaro, Andrea
Household water leak detection using smart metering generated water consumption data
2023/2024 CESARO, GRETA FRANCESCA
Identification of cyber attacks using Next Generation protection tools: NGFW, NG-SIEM, AI and Machine Learning
2021/2022 DORIA, ALVISE
Identification of Lateral Movement Attack Using Next Generation Tools : NGFW, NG-SIEM And Machine Learning
2023/2024 RAO, ABDUL MOEED
Identification of spoofed GNSS signal from carrier phase measurements with multiple antennas
2017/2018 Reginato, Davide
Information reconciliation for biometric-based key agreement in wireless BANs
2020/2021 MURARO, ALBERTO
Integration of Quantum Key Distribution in the SSL/TLS handshake protocol
2013/2014 Tommasi, Nicola
Integrazione di un protocollo di QKD nella suite IPsec
2011/2012 Girardi, Davide
Investigation and application of Machine Learning algorithm for GNSS spoofing detection
2023/2024 CAMPAGNOLO, GIOVANNI
A key Management Scheme for Access Control to GNSS Services
2016/2017 Ceccato, Silvia
L’attacco Parasite Chain per registri distribuiti con struttura Tangle: analisi e contromisure
2022/2023 CONTON, SIMONE
Managing Security of Computer Network Applications using Encryption Techniques
2021/2022 MARTINI, MARCO
Metodi quantistici per il calcolo della posizione
2023/2024 RAYANE, AHLAM
Metriche e meccanismi di anonimizzazione spaziale per location based services
2022/2023 AMOROSO, EMMA
Network anomaly detection using machine learning
2022/2023 LEGGIO, STEFANO
Parametric models for a database of realistic threats to GNSS receivers
2020/2021 Boscaro, Nicola
PULSE SHAPING OPTIMIZATION VIA MACHINE LEARNING FOR OPTICAL FIBER TRANSMISSION
2022/2023 FONTANA, TULLIA
Reti QKD e loro integrazione negli standard di sicurezza
2011/2012 Piazza, Daniele
Security Evaluation of GNSS Signal Quality Monitoring Techniques against Optimal Spoofing Attacks
2018/2019 Chiarello, Leonardo
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile