Sfoglia per Corso
Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models
2024/2025 MIELE, RICCARDO
Penetration testing applied to 5G Core Network
2022/2023 GIAMBARTOLOMEI, FILIPPO
Privacy and Security Analysis of mHealth Apps
2022/2023 MANCINI, ELEONORA
Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus
2022/2023 STEFANI, CLAUDIO
Ransomware Detection Techniques: A Comparative Study
2023/2024 UMBRELLA, GIULIO
Ransomware detection with Machine Learning algorithms using file segments and statistics
2023/2024 MIOTTO, EMANUELE
Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem
2021/2022 CESTARO, RICCARDO
Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards
2022/2023 KAWAS, MHD NAZEER
Safe Return Journey In A GPS Spoofing Attack Scenario
2022/2023 SCREMIN, NICOLA
SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN
2022/2023 HASSAN, RAYYAN
Securing ADS-B Communication Systems Against Location Spoofing Attacks
2022/2023 SALAEVA, SITORA
Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships
2024/2025 VALENTE, ANDREA
Security challenges for immersive media: threats and possible mitigations
2024/2025 KAVARI, AMIN
Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy
2024/2025 BOMBONATI, LUCA
Security of cyberphysical systems quantified through age of information
2024/2025 MATO, KRISTJANA
SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM.
2021/2022 BARDI, SARA
Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments
2024/2025 JAMSHIDI, BAHAREH
STIXnet: entity and relation extraction from unstructured CTI reports
2021/2022 MARCHIORI, FRANCESCO
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures
2022/2023 VAISHNAV, HARSHUL
Sustainable Cybersecurity: The Triple Bottom Line for Success in Business
2022/2023 RICALDI SAAVEDRA, ROY JUNIOR
| Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
|---|---|---|---|---|---|
| Lauree magistrali | 2024 | Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models | Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models | MIELE, RICCARDO | |
| Lauree magistrali | 2022 | Penetration testing applied to 5G Core Network | Penetration testing applied to 5G Core Network | GIAMBARTOLOMEI, FILIPPO | |
| Lauree magistrali | 2022 | Privacy and Security Analysis of mHealth Apps | Privacy and Security Analysis of mHealth Apps | MANCINI, ELEONORA | |
| Lauree magistrali | 2022 | Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus | A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions | STEFANI, CLAUDIO | |
| Lauree magistrali | 2023 | Ransomware Detection Techniques: A Comparative Study | Ransomware Detection Techniques: A Comparative Study | UMBRELLA, GIULIO | |
| Lauree magistrali | 2023 | Ransomware detection with Machine Learning algorithms using file segments and statistics | Ransomware detection with Machine Learning algorithms using file segments and statistics | MIOTTO, EMANUELE | |
| Lauree magistrali | 2021 | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | CESTARO, RICCARDO | |
| Lauree magistrali | 2022 | Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards | Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards | KAWAS, MHD NAZEER | |
| Lauree magistrali | 2022 | Safe Return Journey In A GPS Spoofing Attack Scenario | Safe Return Journey In A GPS Spoofing Attack Scenario | SCREMIN, NICOLA | |
| Lauree magistrali | 2022 | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | HASSAN, RAYYAN | |
| Lauree magistrali | 2022 | Securing ADS-B Communication Systems Against Location Spoofing Attacks | Securing ADS-B Communication Systems Against Location Spoofing Attacks | SALAEVA, SITORA | |
| Lauree magistrali | 2024 | Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships | Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships | VALENTE, ANDREA | |
| Lauree magistrali | 2024 | Security challenges for immersive media: threats and possible mitigations | Security challenges for immersive media: threats and possible mitigations | KAVARI, AMIN | |
| Lauree magistrali | 2024 | Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy | Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy | BOMBONATI, LUCA | |
| Lauree magistrali | 2024 | Security of cyberphysical systems quantified through age of information | Security of cyberphysical systems quantified through age of information | MATO, KRISTJANA | |
| Lauree magistrali | 2021 | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | BARDI, SARA | |
| Lauree magistrali | 2024 | Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments | Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments | JAMSHIDI, BAHAREH | |
| Lauree magistrali | 2021 | STIXnet: entity and relation extraction from unstructured CTI reports | STIXnet: entity and relation extraction from unstructured CTI reports | MARCHIORI, FRANCESCO | |
| Lauree magistrali | 2022 | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | VAISHNAV, HARSHUL | |
| Lauree magistrali | 2022 | Sustainable Cybersecurity: The Triple Bottom Line for Success in Business | Sustainable Cybersecurity: The Triple Bottom Line for Success in Business | RICALDI SAAVEDRA, ROY JUNIOR |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile