Sfoglia per Corso  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 76 a 95 di 103
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2024 Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy BOMBONATI, LUCA
Lauree magistrali 2024 Security of cyberphysical systems quantified through age of information Security of cyberphysical systems quantified through age of information MATO, KRISTJANA
Lauree magistrali 2021 SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. BARDI, SARA
Lauree magistrali 2024 Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments JAMSHIDI, BAHAREH
Lauree magistrali 2021 STIXnet: entity and relation extraction from unstructured CTI reports STIXnet: entity and relation extraction from unstructured CTI reports MARCHIORI, FRANCESCO
Lauree magistrali 2022 Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures VAISHNAV, HARSHUL
Lauree magistrali 2022 Sustainable Cybersecurity: The Triple Bottom Line for Success in Business Sustainable Cybersecurity: The Triple Bottom Line for Success in Business RICALDI SAAVEDRA, ROY JUNIOR
Lauree magistrali 2024 Synthetic Data Generation For Email Phishing Detection Synthetic Data Generation For Email Phishing Detection CARIPOTI, EUGENIO
Lauree magistrali 2023 Synthetic Media in Cybercrime: The Role of AI in Blackmail and Extortion Synthetic Media in Cybercrime: The Role of AI in Blackmail and Extortion DAQA, MUSTAFA MOHAMMAD MUSTAFA
Lauree magistrali 2023 TeLL Me what you can't see - a forensic analysis for images data augmentation TeLL Me what you can't see - a forensic analysis for images data augmentation BIASETTON, PIETRO
Lauree magistrali 2022 Temperature attacks on TRNG and QRNG devices Temperature attacks on TRNG and QRNG devices BARSI, LUDOVICA
Lauree magistrali 2024 The Impact of Large Language Models on Academic Writing The Impact of Large Language Models on Academic Writing RACCUGLIA, SIMONA
Lauree magistrali 2024 The White-Box Approach to IoT Security: Generating MUD Profiles with RAG The White-Box Approach to IoT Security: Generating MUD Profiles with RAG ALMENHALI, ABDULLA RASHEED ABDULLA SAEED
Lauree magistrali 2024 Time-based attacks for phishing detection evasion Time-based attacks for phishing detection evasion RADO, CRISTIANO ALEX
Lauree magistrali 2021 Toward Explainable deepfake detectors Toward Explainable deepfake detectors LISSANDRON, FRANCESCO
Lauree magistrali 2024 Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization BOSCOLO MENEGUOLO, LUCA
Lauree magistrali 2023 Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates AMRAJI, MAHTA
Lauree magistrali 2024 Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis ROSA, NICOLÒ
Lauree magistrali 2021 User Privacy on Spotify: Predicting Personal Data from Music Preferences User Privacy on Spotify: Predicting Personal Data from Music Preferences YE, JIANCHENG
Lauree magistrali 2023 VICTIM: Vulnerabilities In Cyber Threat Intelligence Models VICTIM: Vulnerabilities In Cyber Threat Intelligence Models SANTAGATI, ANDREA
Mostrati risultati da 76 a 95 di 103
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile