Sfoglia per Corso  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 35 a 54 di 55
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2023 Ransomware Detection Techniques: A Comparative Study Ransomware Detection Techniques: A Comparative Study UMBRELLA, GIULIO
Lauree magistrali 2023 Ransomware detection with Machine Learning algorithms using file segments and statistics Ransomware detection with Machine Learning algorithms using file segments and statistics MIOTTO, EMANUELE
Lauree magistrali 2021 Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem CESTARO, RICCARDO
Lauree magistrali 2022 Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards KAWAS, MHD NAZEER
Lauree magistrali 2022 Safe Return Journey In A GPS Spoofing Attack Scenario Safe Return Journey In A GPS Spoofing Attack Scenario SCREMIN, NICOLA
Lauree magistrali 2022 SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN HASSAN, RAYYAN
Lauree magistrali 2022 Securing ADS-B Communication Systems Against Location Spoofing Attacks Securing ADS-B Communication Systems Against Location Spoofing Attacks SALAEVA, SITORA
Lauree magistrali 2021 SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. BARDI, SARA
Lauree magistrali 2021 STIXnet: entity and relation extraction from unstructured CTI reports STIXnet: entity and relation extraction from unstructured CTI reports MARCHIORI, FRANCESCO
Lauree magistrali 2022 Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures VAISHNAV, HARSHUL
Lauree magistrali 2022 Sustainable Cybersecurity: The Triple Bottom Line for Success in Business Sustainable Cybersecurity: The Triple Bottom Line for Success in Business RICALDI SAAVEDRA, ROY JUNIOR
Lauree magistrali 2022 Temperature attacks on TRNG and QRNG devices Temperature attacks on TRNG and QRNG devices BARSI, LUDOVICA
Lauree magistrali 2021 Toward Explainable deepfake detectors Toward Explainable deepfake detectors LISSANDRON, FRANCESCO
Lauree magistrali 2023 Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates AMRAJI, MAHTA
Lauree magistrali 2021 User Privacy on Spotify: Predicting Personal Data from Music Preferences User Privacy on Spotify: Predicting Personal Data from Music Preferences YE, JIANCHENG
Lauree magistrali 2023 VICTIM: Vulnerabilities In Cyber Threat Intelligence Models VICTIM: Vulnerabilities In Cyber Threat Intelligence Models SANTAGATI, ANDREA
Lauree magistrali 2022 Video Gamers Profiling Based on Controller Usage and Behavioral Data Gamers Profiling through Behavioral Data across Consoles and Games Genres ZIN, RICCARDO
Lauree magistrali 2021 Video Games Analysis for Personal Data Prediction Video Games Analysis for Personal Data Prediction FACCIOLO, LISA
Lauree magistrali 2021 Virtualization-Based Malwares: Can We Defend Against Them? Virtualization-Based Malwares: Can We Defend Against Them? ZERBINI, SIMONE
Lauree magistrali 2023 VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. CHIDANANDA, NIKHIL KARAKUCHI
Mostrati risultati da 35 a 54 di 55
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile