Sfoglia per Corso
Generative Fingerprint Augmentation against Membership Inference Attacks
2022/2023 CAVASIN, SAVERIO
IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques
2021/2022 BARON, ALEX
Inferring personal attributes with a millimeter wave radar
2022/2023 TAMAYO GONZALEZ, CINTHYA CELINA
LLMs Evaluation for Android Vulnerability Repair
2022/2023 BRACONARO, ELISA
Model Selection Hijacking Attack
2023/2024 PETRUCCI, RICCARDO
Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment
2022/2023 RIZZO, ALESSANDRO
Privacy and Security Analysis of mHealth Apps
2022/2023 MANCINI, ELEONORA
Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus
2022/2023 STEFANI, CLAUDIO
Ransomware Detection Techniques: A Comparative Study
2023/2024 UMBRELLA, GIULIO
Ransomware detection with Machine Learning algorithms using file segments and statistics
2023/2024 MIOTTO, EMANUELE
Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem
2021/2022 CESTARO, RICCARDO
Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards
2022/2023 KAWAS, MHD NAZEER
Safe Return Journey In A GPS Spoofing Attack Scenario
2022/2023 SCREMIN, NICOLA
SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN
2022/2023 HASSAN, RAYYAN
Securing ADS-B Communication Systems Against Location Spoofing Attacks
2022/2023 SALAEVA, SITORA
SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM.
2021/2022 BARDI, SARA
STIXnet: entity and relation extraction from unstructured CTI reports
2021/2022 MARCHIORI, FRANCESCO
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures
2022/2023 VAISHNAV, HARSHUL
Sustainable Cybersecurity: The Triple Bottom Line for Success in Business
2022/2023 RICALDI SAAVEDRA, ROY JUNIOR
Temperature attacks on TRNG and QRNG devices
2022/2023 BARSI, LUDOVICA
Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
---|---|---|---|---|---|
Lauree magistrali | 2022 | Generative Fingerprint Augmentation against Membership Inference Attacks | Generative Fingerprint Augmentation against Membership Inference Attacks | CAVASIN, SAVERIO | |
Lauree magistrali | 2021 | IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques | IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques | BARON, ALEX | |
Lauree magistrali | 2022 | Inferring personal attributes with a millimeter wave radar | Inferring personal attributes with a millimeter wave radar | TAMAYO GONZALEZ, CINTHYA CELINA | |
Lauree magistrali | 2022 | LLMs Evaluation for Android Vulnerability Repair | LLMs Evaluation for Android Vulnerability Repair | BRACONARO, ELISA | |
Lauree magistrali | 2023 | Model Selection Hijacking Attack | Model Selection Hijacking Attack | PETRUCCI, RICCARDO | |
Lauree magistrali | 2022 | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | RIZZO, ALESSANDRO | |
Lauree magistrali | 2022 | Privacy and Security Analysis of mHealth Apps | Privacy and Security Analysis of mHealth Apps | MANCINI, ELEONORA | |
Lauree magistrali | 2022 | Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus | A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions | STEFANI, CLAUDIO | |
Lauree magistrali | 2023 | Ransomware Detection Techniques: A Comparative Study | Ransomware Detection Techniques: A Comparative Study | UMBRELLA, GIULIO | |
Lauree magistrali | 2023 | Ransomware detection with Machine Learning algorithms using file segments and statistics | Ransomware detection with Machine Learning algorithms using file segments and statistics | MIOTTO, EMANUELE | |
Lauree magistrali | 2021 | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | CESTARO, RICCARDO | |
Lauree magistrali | 2022 | Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards | Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards | KAWAS, MHD NAZEER | |
Lauree magistrali | 2022 | Safe Return Journey In A GPS Spoofing Attack Scenario | Safe Return Journey In A GPS Spoofing Attack Scenario | SCREMIN, NICOLA | |
Lauree magistrali | 2022 | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | HASSAN, RAYYAN | |
Lauree magistrali | 2022 | Securing ADS-B Communication Systems Against Location Spoofing Attacks | Securing ADS-B Communication Systems Against Location Spoofing Attacks | SALAEVA, SITORA | |
Lauree magistrali | 2021 | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | BARDI, SARA | |
Lauree magistrali | 2021 | STIXnet: entity and relation extraction from unstructured CTI reports | STIXnet: entity and relation extraction from unstructured CTI reports | MARCHIORI, FRANCESCO | |
Lauree magistrali | 2022 | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | VAISHNAV, HARSHUL | |
Lauree magistrali | 2022 | Sustainable Cybersecurity: The Triple Bottom Line for Success in Business | Sustainable Cybersecurity: The Triple Bottom Line for Success in Business | RICALDI SAAVEDRA, ROY JUNIOR | |
Lauree magistrali | 2022 | Temperature attacks on TRNG and QRNG devices | Temperature attacks on TRNG and QRNG devices | BARSI, LUDOVICA |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile