Sfoglia per Corso  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 57 a 76 di 90
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2023 Ransomware Detection Techniques: A Comparative Study Ransomware Detection Techniques: A Comparative Study UMBRELLA, GIULIO
Lauree magistrali 2023 Ransomware detection with Machine Learning algorithms using file segments and statistics Ransomware detection with Machine Learning algorithms using file segments and statistics MIOTTO, EMANUELE
Lauree magistrali 2021 Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem CESTARO, RICCARDO
Lauree magistrali 2022 Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards KAWAS, MHD NAZEER
Lauree magistrali 2022 Safe Return Journey In A GPS Spoofing Attack Scenario Safe Return Journey In A GPS Spoofing Attack Scenario SCREMIN, NICOLA
Lauree magistrali 2022 SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN HASSAN, RAYYAN
Lauree magistrali 2022 Securing ADS-B Communication Systems Against Location Spoofing Attacks Securing ADS-B Communication Systems Against Location Spoofing Attacks SALAEVA, SITORA
Lauree magistrali 2024 Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships VALENTE, ANDREA
Lauree magistrali 2024 Security challenges for immersive media: threats and possible mitigations Security challenges for immersive media: threats and possible mitigations KAVARI, AMIN
Lauree magistrali 2024 Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy BOMBONATI, LUCA
Lauree magistrali 2024 Security of cyberphysical systems quantified through age of information Security of cyberphysical systems quantified through age of information MATO, KRISTJANA
Lauree magistrali 2021 SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. BARDI, SARA
Lauree magistrali 2024 Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments JAMSHIDI, BAHAREH
Lauree magistrali 2021 STIXnet: entity and relation extraction from unstructured CTI reports STIXnet: entity and relation extraction from unstructured CTI reports MARCHIORI, FRANCESCO
Lauree magistrali 2022 Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures VAISHNAV, HARSHUL
Lauree magistrali 2022 Sustainable Cybersecurity: The Triple Bottom Line for Success in Business Sustainable Cybersecurity: The Triple Bottom Line for Success in Business RICALDI SAAVEDRA, ROY JUNIOR
Lauree magistrali 2024 Synthetic Data Generation For Email Phishing Detection Synthetic Data Generation For Email Phishing Detection CARIPOTI, EUGENIO
Lauree magistrali 2023 Synthetic Media in Cybercrime: The Role of AI in Blackmail and Extortion Synthetic Media in Cybercrime: The Role of AI in Blackmail and Extortion DAQA, MUSTAFA MOHAMMAD MUSTAFA
Lauree magistrali 2023 TeLL Me what you can't see - a forensic analysis for images data augmentation TeLL Me what you can't see - a forensic analysis for images data augmentation BIASETTON, PIETRO
Lauree magistrali 2022 Temperature attacks on TRNG and QRNG devices Temperature attacks on TRNG and QRNG devices BARSI, LUDOVICA
Mostrati risultati da 57 a 76 di 90
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile