Sfoglia per Corso
Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools
2023/2024 CIFTPINAR, NURI BERK
Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools
2022/2023 UYSAL, MUHAMMED EMIR
Enhancing Tor Privacy: A Study on State-of-the-Art Session Correlation Methods and Possible Countermeasures
2024/2025 LATINI, LUDOVICO
Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing
2023/2024 DRAGO, FRANCESCO
Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts
2021/2022 CATTAI, CHRISTIAN
FairDrop: a Confidential Fair Exchange Protocol for Media Workers
2021/2022 GALVANI, EGON
Flow correlation attack on Tor: A critical Analysis of ESPRESSO and possible countermeasures
2024/2025 CIPOLLETTA, LEONARDO
From Gateway to Dashboard: A Secure Microservices Architecture for Data Provisioning to Odoo ERP
2024/2025 ZAMINI, ALI
Fuzzy Searchable Symmetric Encryption: Design and Implementation of a Novel Scheme Toward Real-World Applications
2024/2025 RAGUSA, SIMONE
Generative Fingerprint Augmentation against Membership Inference Attacks
2022/2023 CAVASIN, SAVERIO
IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques
2021/2022 BARON, ALEX
In-field experiment of Intermodal Quantum Key Distribution over a 18km-long free-space link with Adaptive Optics for fiber-injection
2024/2025 NARDI, MARCO
Inferring personal attributes with a millimeter wave radar
2022/2023 TAMAYO GONZALEZ, CINTHYA CELINA
Investigating Hidden Watermarks in Camera Noise for Identification
2023/2024 TAMIAZZO, MATTIA
Leveraging Drones' Propeller Vibration as a Covert Channel for Authentication
2024/2025 DRAGIŠIĆ, NEMANJA
LLMs Evaluation for Android Vulnerability Repair
2022/2023 BRACONARO, ELISA
Model Selection Hijacking Attack
2023/2024 PETRUCCI, RICCARDO
Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment
2022/2023 RIZZO, ALESSANDRO
On the use of hypercube-based quantum walks in one-way quantum key distribution protocols
2024/2025 POLZONI, DAVID
Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models
2024/2025 MIELE, RICCARDO
| Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
|---|---|---|---|---|---|
| Lauree magistrali | 2023 | Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools | Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools | CIFTPINAR, NURI BERK | |
| Lauree magistrali | 2022 | Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools | Enhancing Network Security and Facilitating Firewall Rule management through Automated Firewall Rule management tool and integration with Discovery tools | UYSAL, MUHAMMED EMIR | |
| Lauree magistrali | 2024 | Enhancing Tor Privacy: A Study on State-of-the-Art Session Correlation Methods and Possible Countermeasures | Enhancing Tor Privacy: A Study on State-of-the-Art Session Correlation Methods and Possible Countermeasures | LATINI, LUDOVICO | |
| Lauree magistrali | 2023 | Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing | Exploring IPv6 Extension Headers Security: From Manual Analysis to Differential Fuzzing | DRAGO, FRANCESCO | |
| Lauree magistrali | 2021 | Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts | Extorsionware: Bringing Ransomware Attacks to Blockchain Smart Contracts | CATTAI, CHRISTIAN | |
| Lauree magistrali | 2021 | FairDrop: a Confidential Fair Exchange Protocol for Media Workers | FairDrop: a Confidential Fair Exchange Protocol for Media Workers | GALVANI, EGON | |
| Lauree magistrali | 2024 | Flow correlation attack on Tor: A critical Analysis of ESPRESSO and possible countermeasures | Flow correlation attack on Tor: A critical Analysis of ESPRESSO and possible countermeasures | CIPOLLETTA, LEONARDO | |
| Lauree magistrali | 2024 | From Gateway to Dashboard: A Secure Microservices Architecture for Data Provisioning to Odoo ERP | From Gateway to Dashboard: A Secure Microservices Architecture for Data Provisioning to Odoo ERP | ZAMINI, ALI | |
| Lauree magistrali | 2024 | Fuzzy Searchable Symmetric Encryption: Design and Implementation of a Novel Scheme Toward Real-World Applications | Fuzzy Searchable Symmetric Encryption: Design and Implementation of a Novel Scheme Toward Real-World Applications | RAGUSA, SIMONE | |
| Lauree magistrali | 2022 | Generative Fingerprint Augmentation against Membership Inference Attacks | Generative Fingerprint Augmentation against Membership Inference Attacks | CAVASIN, SAVERIO | |
| Lauree magistrali | 2021 | IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques | IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques | BARON, ALEX | |
| Lauree magistrali | 2024 | In-field experiment of Intermodal Quantum Key Distribution over a 18km-long free-space link with Adaptive Optics for fiber-injection | In-field experiment of Intermodal Quantum Key Distribution over a 18km-long free-space link with Adaptive Optics for fiber-injection | NARDI, MARCO | |
| Lauree magistrali | 2022 | Inferring personal attributes with a millimeter wave radar | Inferring personal attributes with a millimeter wave radar | TAMAYO GONZALEZ, CINTHYA CELINA | |
| Lauree magistrali | 2023 | Investigating Hidden Watermarks in Camera Noise for Identification | Investigating Hidden Watermarks in Camera Noise for Identification | TAMIAZZO, MATTIA | |
| Lauree magistrali | 2024 | Leveraging Drones' Propeller Vibration as a Covert Channel for Authentication | Leveraging Drones' Propeller Vibration as a Covert Channel for Authentication | DRAGIŠIĆ, NEMANJA | |
| Lauree magistrali | 2022 | LLMs Evaluation for Android Vulnerability Repair | LLMs Evaluation for Android Vulnerability Repair | BRACONARO, ELISA | |
| Lauree magistrali | 2023 | Model Selection Hijacking Attack | Model Selection Hijacking Attack | PETRUCCI, RICCARDO | |
| Lauree magistrali | 2022 | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | RIZZO, ALESSANDRO | |
| Lauree magistrali | 2024 | On the use of hypercube-based quantum walks in one-way quantum key distribution protocols | On the use of hypercube-based quantum walks in one-way quantum key distribution protocols | POLZONI, DAVID | |
| Lauree magistrali | 2024 | Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models | Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models | MIELE, RICCARDO |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile