Sfoglia per Corso  CYBERSECURITY Laurea Magistrale (D.M. 270/2004)

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 21 a 40 di 56
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2023 Enhancing Cybersecurity for SMEs: A Structured Framework for IT Security Assessment Enhancing Cybersecurity for SMEs: A Structured Framework for IT Security Assessment CUSINATO, ALESSANDRO
Lauree magistrali 2023 Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools CIFTPINAR, NURI BERK
Lauree magistrali 2022 Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools UYSAL, MUHAMMED EMIR
Lauree magistrali 2023 Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing DRAGO, FRANCESCO
Lauree magistrali 2021 Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts CATTAI, CHRISTIAN
Lauree magistrali 2021 FairDrop: a Confidential Fair Exchange Protocol for Media Workers FairDrop: a Confidential Fair Exchange Protocol for Media Workers GALVANI, EGON
Lauree magistrali 2022 Generative Fingerprint Augmentation against Membership Inference Attacks Generative Fingerprint Augmentation against Membership Inference Attacks CAVASIN, SAVERIO
Lauree magistrali 2021 IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques BARON, ALEX
Lauree magistrali 2022 Inferring personal attributes with a millimeter wave radar Inferring personal attributes with a millimeter wave radar TAMAYO GONZALEZ, CINTHYA CELINA
Lauree magistrali 2022 LLMs Evaluation for Android Vulnerability Repair LLMs Evaluation for Android Vulnerability Repair BRACONARO, ELISA
Lauree magistrali 2023 Model Selection Hijacking Attack Model Selection Hijacking Attack PETRUCCI, RICCARDO
Lauree magistrali 2022 Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment RIZZO, ALESSANDRO
Lauree magistrali 2022 Penetration testing applied to 5G Core Network Penetration testing applied to 5G Core Network GIAMBARTOLOMEI, FILIPPO
Lauree magistrali 2022 Privacy and Security Analysis of mHealth Apps Privacy and Security Analysis of mHealth Apps MANCINI, ELEONORA
Lauree magistrali 2022 Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions STEFANI, CLAUDIO
Lauree magistrali 2023 Ransomware Detection Techniques: A Comparative Study Ransomware Detection Techniques: A Comparative Study UMBRELLA, GIULIO
Lauree magistrali 2023 Ransomware detection with Machine Learning algorithms using file segments and statistics Ransomware detection with Machine Learning algorithms using file segments and statistics MIOTTO, EMANUELE
Lauree magistrali 2021 Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem CESTARO, RICCARDO
Lauree magistrali 2022 Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards KAWAS, MHD NAZEER
Lauree magistrali 2022 Safe Return Journey In A GPS Spoofing Attack Scenario Safe Return Journey In A GPS Spoofing Attack Scenario SCREMIN, NICOLA
Mostrati risultati da 21 a 40 di 56
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile