Sfoglia per Corso  CYBERSECURITY Laurea Magistrale (D.M. 270/2004)

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 17 a 36 di 56
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2022 Design and Implementation of a Cloud Architectural System for an IoT Sensor Network Design and Implementation of a Cloud Architectural System for an IoT Sensor Network DAL GRANDE, MATTEO
Lauree magistrali 2023 Designing a privacy preserving solution on programmable switches Designing a privacy preserving solution on programmable switches COREGGIOLI, CRISTIAN
Lauree magistrali 2022 Distributed Intrusion Detection System for Heterogeneous Data in Industrial Control Systems Distributed Intrusion Detection System for Heterogeneous Data in Industrial Control Systems FREDA, FRANCESCO
Lauree magistrali 2021 Divergent: niente è come sembra. Una nuova difesa contro attacchi di tipo Website fingerprinting Divergent: nothing as it seems. A novel defence against Website Fingerprinting attacks VAROTTO, FRANCESCO
Lauree magistrali 2023 Enhancing Cybersecurity for SMEs: A Structured Framework for IT Security Assessment Enhancing Cybersecurity for SMEs: A Structured Framework for IT Security Assessment CUSINATO, ALESSANDRO
Lauree magistrali 2023 Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools CIFTPINAR, NURI BERK
Lauree magistrali 2022 Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools UYSAL, MUHAMMED EMIR
Lauree magistrali 2023 Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing DRAGO, FRANCESCO
Lauree magistrali 2021 Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts CATTAI, CHRISTIAN
Lauree magistrali 2021 FairDrop: a Confidential Fair Exchange Protocol for Media Workers FairDrop: a Confidential Fair Exchange Protocol for Media Workers GALVANI, EGON
Lauree magistrali 2022 Generative Fingerprint Augmentation against Membership Inference Attacks Generative Fingerprint Augmentation against Membership Inference Attacks CAVASIN, SAVERIO
Lauree magistrali 2021 IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques BARON, ALEX
Lauree magistrali 2022 Inferring personal attributes with a millimeter wave radar Inferring personal attributes with a millimeter wave radar TAMAYO GONZALEZ, CINTHYA CELINA
Lauree magistrali 2022 LLMs Evaluation for Android Vulnerability Repair LLMs Evaluation for Android Vulnerability Repair BRACONARO, ELISA
Lauree magistrali 2023 Model Selection Hijacking Attack Model Selection Hijacking Attack PETRUCCI, RICCARDO
Lauree magistrali 2022 Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment RIZZO, ALESSANDRO
Lauree magistrali 2022 Penetration testing applied to 5G Core Network Penetration testing applied to 5G Core Network GIAMBARTOLOMEI, FILIPPO
Lauree magistrali 2022 Privacy and Security Analysis of mHealth Apps Privacy and Security Analysis of mHealth Apps MANCINI, ELEONORA
Lauree magistrali 2022 Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions STEFANI, CLAUDIO
Lauree magistrali 2023 Ransomware Detection Techniques: A Comparative Study Ransomware Detection Techniques: A Comparative Study UMBRELLA, GIULIO
Mostrati risultati da 17 a 36 di 56
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile