Sfoglia per Corso
Ransomware Detection Techniques: A Comparative Study
2023/2024 UMBRELLA, GIULIO
Ransomware detection with Machine Learning algorithms using file segments and statistics
2023/2024 MIOTTO, EMANUELE
Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem
2021/2022 CESTARO, RICCARDO
Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards
2022/2023 KAWAS, MHD NAZEER
Safe Return Journey In A GPS Spoofing Attack Scenario
2022/2023 SCREMIN, NICOLA
SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN
2022/2023 HASSAN, RAYYAN
Securing ADS-B Communication Systems Against Location Spoofing Attacks
2022/2023 SALAEVA, SITORA
SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM.
2021/2022 BARDI, SARA
STIXnet: entity and relation extraction from unstructured CTI reports
2021/2022 MARCHIORI, FRANCESCO
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures
2022/2023 VAISHNAV, HARSHUL
Sustainable Cybersecurity: The Triple Bottom Line for Success in Business
2022/2023 RICALDI SAAVEDRA, ROY JUNIOR
Temperature attacks on TRNG and QRNG devices
2022/2023 BARSI, LUDOVICA
Toward Explainable deepfake detectors
2021/2022 LISSANDRON, FRANCESCO
Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates
2023/2024 AMRAJI, MAHTA
User Privacy on Spotify: Predicting Personal Data from Music Preferences
2021/2022 YE, JIANCHENG
VICTIM: Vulnerabilities In Cyber Threat Intelligence Models
2023/2024 SANTAGATI, ANDREA
Video Gamers Profiling Based on Controller Usage and Behavioral Data
2022/2023 ZIN, RICCARDO
Video Games Analysis for Personal Data Prediction
2021/2022 FACCIOLO, LISA
Virtualization-Based Malwares: Can We Defend Against Them?
2021/2022 ZERBINI, SIMONE
VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems.
2023/2024 CHIDANANDA, NIKHIL KARAKUCHI
Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
---|---|---|---|---|---|
Lauree magistrali | 2023 | Ransomware Detection Techniques: A Comparative Study | Ransomware Detection Techniques: A Comparative Study | UMBRELLA, GIULIO | |
Lauree magistrali | 2023 | Ransomware detection with Machine Learning algorithms using file segments and statistics | Ransomware detection with Machine Learning algorithms using file segments and statistics | MIOTTO, EMANUELE | |
Lauree magistrali | 2021 | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | CESTARO, RICCARDO | |
Lauree magistrali | 2022 | Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards | Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards | KAWAS, MHD NAZEER | |
Lauree magistrali | 2022 | Safe Return Journey In A GPS Spoofing Attack Scenario | Safe Return Journey In A GPS Spoofing Attack Scenario | SCREMIN, NICOLA | |
Lauree magistrali | 2022 | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | HASSAN, RAYYAN | |
Lauree magistrali | 2022 | Securing ADS-B Communication Systems Against Location Spoofing Attacks | Securing ADS-B Communication Systems Against Location Spoofing Attacks | SALAEVA, SITORA | |
Lauree magistrali | 2021 | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | BARDI, SARA | |
Lauree magistrali | 2021 | STIXnet: entity and relation extraction from unstructured CTI reports | STIXnet: entity and relation extraction from unstructured CTI reports | MARCHIORI, FRANCESCO | |
Lauree magistrali | 2022 | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | VAISHNAV, HARSHUL | |
Lauree magistrali | 2022 | Sustainable Cybersecurity: The Triple Bottom Line for Success in Business | Sustainable Cybersecurity: The Triple Bottom Line for Success in Business | RICALDI SAAVEDRA, ROY JUNIOR | |
Lauree magistrali | 2022 | Temperature attacks on TRNG and QRNG devices | Temperature attacks on TRNG and QRNG devices | BARSI, LUDOVICA | |
Lauree magistrali | 2021 | Toward Explainable deepfake detectors | Toward Explainable deepfake detectors | LISSANDRON, FRANCESCO | |
Lauree magistrali | 2023 | Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates | Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates | AMRAJI, MAHTA | |
Lauree magistrali | 2021 | User Privacy on Spotify: Predicting Personal Data from Music Preferences | User Privacy on Spotify: Predicting Personal Data from Music Preferences | YE, JIANCHENG | |
Lauree magistrali | 2023 | VICTIM: Vulnerabilities In Cyber Threat Intelligence Models | VICTIM: Vulnerabilities In Cyber Threat Intelligence Models | SANTAGATI, ANDREA | |
Lauree magistrali | 2022 | Video Gamers Profiling Based on Controller Usage and Behavioral Data | Gamers Profiling through Behavioral Data across Consoles and Games Genres | ZIN, RICCARDO | |
Lauree magistrali | 2021 | Video Games Analysis for Personal Data Prediction | Video Games Analysis for Personal Data Prediction | FACCIOLO, LISA | |
Lauree magistrali | 2021 | Virtualization-Based Malwares: Can We Defend Against Them? | Virtualization-Based Malwares: Can We Defend Against Them? | ZERBINI, SIMONE | |
Lauree magistrali | 2023 | VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. | VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. | CHIDANANDA, NIKHIL KARAKUCHI |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile