Sfoglia per Corso  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 28 a 47 di 55
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2021 IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques BARON, ALEX
Lauree magistrali 2022 Inferring personal attributes with a millimeter wave radar Inferring personal attributes with a millimeter wave radar TAMAYO GONZALEZ, CINTHYA CELINA
Lauree magistrali 2022 LLMs Evaluation for Android Vulnerability Repair LLMs Evaluation for Android Vulnerability Repair BRACONARO, ELISA
Lauree magistrali 2023 Model Selection Hijacking Attack Model Selection Hijacking Attack PETRUCCI, RICCARDO
Lauree magistrali 2022 Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment RIZZO, ALESSANDRO
Lauree magistrali 2022 Privacy and Security Analysis of mHealth Apps Privacy and Security Analysis of mHealth Apps MANCINI, ELEONORA
Lauree magistrali 2022 Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions STEFANI, CLAUDIO
Lauree magistrali 2023 Ransomware Detection Techniques: A Comparative Study Ransomware Detection Techniques: A Comparative Study UMBRELLA, GIULIO
Lauree magistrali 2023 Ransomware detection with Machine Learning algorithms using file segments and statistics Ransomware detection with Machine Learning algorithms using file segments and statistics MIOTTO, EMANUELE
Lauree magistrali 2021 Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem CESTARO, RICCARDO
Lauree magistrali 2022 Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards KAWAS, MHD NAZEER
Lauree magistrali 2022 Safe Return Journey In A GPS Spoofing Attack Scenario Safe Return Journey In A GPS Spoofing Attack Scenario SCREMIN, NICOLA
Lauree magistrali 2022 SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN HASSAN, RAYYAN
Lauree magistrali 2022 Securing ADS-B Communication Systems Against Location Spoofing Attacks Securing ADS-B Communication Systems Against Location Spoofing Attacks SALAEVA, SITORA
Lauree magistrali 2021 SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. BARDI, SARA
Lauree magistrali 2021 STIXnet: entity and relation extraction from unstructured CTI reports STIXnet: entity and relation extraction from unstructured CTI reports MARCHIORI, FRANCESCO
Lauree magistrali 2022 Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures VAISHNAV, HARSHUL
Lauree magistrali 2022 Sustainable Cybersecurity: The Triple Bottom Line for Success in Business Sustainable Cybersecurity: The Triple Bottom Line for Success in Business RICALDI SAAVEDRA, ROY JUNIOR
Lauree magistrali 2022 Temperature attacks on TRNG and QRNG devices Temperature attacks on TRNG and QRNG devices BARSI, LUDOVICA
Lauree magistrali 2021 Toward Explainable deepfake detectors Toward Explainable deepfake detectors LISSANDRON, FRANCESCO
Mostrati risultati da 28 a 47 di 55
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile