Sfoglia per Corso
A correctness/incorrectness program logic on Kleene Algebra
2021/2022 MILANESE, MARCO
Analysis of a commercial QKD System with different Single Photon Detectors
2021/2022 VENTURINI, MARCO
Analysis of airgap security attack vectors and mitigating strategies
2022/2023 SURESH BABU, NAVEEN KUMAR
Backdoor Attacks and Defences on Neural Networks
2021/2022 BELLUOMINI, MASSIMILIANO
Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons
2022/2023 COSTANTINI, LORENZO
Design and Implementation of a Cloud Architectural System for an IoT Sensor Network
2022/2023 DAL GRANDE, MATTEO
Divergent: niente è come sembra. Una nuova difesa contro attacchi di tipo Website fingerprinting
2021/2022 VAROTTO, FRANCESCO
Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts
2021/2022 CATTAI, CHRISTIAN
FairDrop: a Confidential Fair Exchange Protocol for Media Workers
2021/2022 GALVANI, EGON
IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques
2021/2022 BARON, ALEX
Penetration testing applied to 5G Core Network
2022/2023 GIAMBARTOLOMEI, FILIPPO
Privacy and Security Analysis of mHealth Apps
2022/2023 MANCINI, ELEONORA
Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus
2022/2023 STEFANI, CLAUDIO
Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem
2021/2022 CESTARO, RICCARDO
Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards
2022/2023 KAWAS, MHD NAZEER
SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN
2022/2023 HASSAN, RAYYAN
SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM.
2021/2022 BARDI, SARA
STIXnet: entity and relation extraction from unstructured CTI reports
2021/2022 MARCHIORI, FRANCESCO
Temperature attacks on TRNG and QRNG devices
2022/2023 BARSI, LUDOVICA
Toward Explainable deepfake detectors
2021/2022 LISSANDRON, FRANCESCO
Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
---|---|---|---|---|---|
Lauree magistrali | 2021 | A correctness/incorrectness program logic on Kleene Algebra | A correctness/incorrectness program logic on Kleene Algebra | MILANESE, MARCO | |
Lauree magistrali | 2021 | Analysis of a commercial QKD System with different Single Photon Detectors | Analysis of a commercial QKD System with different Single Photon Detectors | VENTURINI, MARCO | |
Lauree magistrali | 2022 | Analysis of airgap security attack vectors and mitigating strategies | Analysis of airgap security attack vectors and mitigating strategies | SURESH BABU, NAVEEN KUMAR | |
Lauree magistrali | 2021 | Backdoor Attacks and Defences on Neural Networks | Backdoor Attacks and Defences on Neural Networks | BELLUOMINI, MASSIMILIANO | |
Lauree magistrali | 2022 | Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons | Contextual Based Attack Detection and Resiliency Policies for Autonomous Vehicles Platoons | COSTANTINI, LORENZO | |
Lauree magistrali | 2022 | Design and Implementation of a Cloud Architectural System for an IoT Sensor Network | Design and Implementation of a Cloud Architectural System for an IoT Sensor Network | DAL GRANDE, MATTEO | |
Lauree magistrali | 2021 | Divergent: niente è come sembra. Una nuova difesa contro attacchi di tipo Website fingerprinting | Divergent: nothing as it seems. A novel defence against Website Fingerprinting attacks | VAROTTO, FRANCESCO | |
Lauree magistrali | 2021 | Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts | Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts | CATTAI, CHRISTIAN | |
Lauree magistrali | 2021 | FairDrop: a Confidential Fair Exchange Protocol for Media Workers | FairDrop: a Confidential Fair Exchange Protocol for Media Workers | GALVANI, EGON | |
Lauree magistrali | 2021 | IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques | IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques | BARON, ALEX | |
Lauree magistrali | 2022 | Penetration testing applied to 5G Core Network | Penetration testing applied to 5G Core Network | GIAMBARTOLOMEI, FILIPPO | |
Lauree magistrali | 2022 | Privacy and Security Analysis of mHealth Apps | Privacy and Security Analysis of mHealth Apps | MANCINI, ELEONORA | |
Lauree magistrali | 2022 | Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus | A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions | STEFANI, CLAUDIO | |
Lauree magistrali | 2021 | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | CESTARO, RICCARDO | |
Lauree magistrali | 2022 | Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards | Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards | KAWAS, MHD NAZEER | |
Lauree magistrali | 2022 | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | HASSAN, RAYYAN | |
Lauree magistrali | 2021 | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | BARDI, SARA | |
Lauree magistrali | 2021 | STIXnet: entity and relation extraction from unstructured CTI reports | STIXnet: entity and relation extraction from unstructured CTI reports | MARCHIORI, FRANCESCO | |
Lauree magistrali | 2022 | Temperature attacks on TRNG and QRNG devices | Temperature attacks on TRNG and QRNG devices | BARSI, LUDOVICA | |
Lauree magistrali | 2021 | Toward Explainable deepfake detectors | Toward Explainable deepfake detectors | LISSANDRON, FRANCESCO |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile