Sfoglia per Corso  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 22 a 41 di 42
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2022 LLMs Evaluation for Android Vulnerability Repair LLMs Evaluation for Android Vulnerability Repair BRACONARO, ELISA
Lauree magistrali 2022 Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment RIZZO, ALESSANDRO
Lauree magistrali 2022 Penetration testing applied to 5G Core Network Penetration testing applied to 5G Core Network GIAMBARTOLOMEI, FILIPPO
Lauree magistrali 2022 Privacy and Security Analysis of mHealth Apps Privacy and Security Analysis of mHealth Apps MANCINI, ELEONORA
Lauree magistrali 2022 Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions STEFANI, CLAUDIO
Lauree magistrali 2021 Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem CESTARO, RICCARDO
Lauree magistrali 2022 Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards KAWAS, MHD NAZEER
Lauree magistrali 2022 Safe Return Journey In A GPS Spoofing Attack Scenario Safe Return Journey In A GPS Spoofing Attack Scenario SCREMIN, NICOLA
Lauree magistrali 2022 SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN HASSAN, RAYYAN
Lauree magistrali 2022 Securing ADS-B Communication Systems Against Location Spoofing Attacks Securing ADS-B Communication Systems Against Location Spoofing Attacks SALAEVA, SITORA
Lauree magistrali 2021 SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. BARDI, SARA
Lauree magistrali 2021 STIXnet: entity and relation extraction from unstructured CTI reports STIXnet: entity and relation extraction from unstructured CTI reports MARCHIORI, FRANCESCO
Lauree magistrali 2022 Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures VAISHNAV, HARSHUL
Lauree magistrali 2022 Sustainable Cybersecurity: The Triple Bottom Line for Success in Business Sustainable Cybersecurity: The Triple Bottom Line for Success in Business RICALDI SAAVEDRA, ROY JUNIOR
Lauree magistrali 2022 Temperature attacks on TRNG and QRNG devices Temperature attacks on TRNG and QRNG devices BARSI, LUDOVICA
Lauree magistrali 2021 Toward Explainable deepfake detectors Toward Explainable deepfake detectors LISSANDRON, FRANCESCO
Lauree magistrali 2021 User Privacy on Spotify: Predicting Personal Data from Music Preferences User Privacy on Spotify: Predicting Personal Data from Music Preferences YE, JIANCHENG
Lauree magistrali 2022 Video Gamers Profiling Based on Controller Usage and Behavioral Data Gamers Profiling through Behavioral Data across Consoles and Games Genres ZIN, RICCARDO
Lauree magistrali 2021 Video Games Analysis for Personal Data Prediction Video Games Analysis for Personal Data Prediction FACCIOLO, LISA
Lauree magistrali 2021 Virtualization-Based Malwares: Can We Defend Against Them? Virtualization-Based Malwares: Can We Defend Against Them? ZERBINI, SIMONE
Mostrati risultati da 22 a 41 di 42
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile