Sfoglia per Corso  CYBERSECURITY Laurea Magistrale (D.M. 270/2004)

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 40 a 56 di 56
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2022 Safe Return Journey In A GPS Spoofing Attack Scenario Safe Return Journey In A GPS Spoofing Attack Scenario SCREMIN, NICOLA
Lauree magistrali 2022 SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN HASSAN, RAYYAN
Lauree magistrali 2022 Securing ADS-B Communication Systems Against Location Spoofing Attacks Securing ADS-B Communication Systems Against Location Spoofing Attacks SALAEVA, SITORA
Lauree magistrali 2021 SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. BARDI, SARA
Lauree magistrali 2021 STIXnet: entity and relation extraction from unstructured CTI reports STIXnet: entity and relation extraction from unstructured CTI reports MARCHIORI, FRANCESCO
Lauree magistrali 2022 Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures VAISHNAV, HARSHUL
Lauree magistrali 2022 Sustainable Cybersecurity: The Triple Bottom Line for Success in Business Sustainable Cybersecurity: The Triple Bottom Line for Success in Business RICALDI SAAVEDRA, ROY JUNIOR
Lauree magistrali 2022 Temperature attacks on TRNG and QRNG devices Temperature attacks on TRNG and QRNG devices BARSI, LUDOVICA
Lauree magistrali 2021 Toward Explainable deepfake detectors Toward Explainable deepfake detectors LISSANDRON, FRANCESCO
Lauree magistrali 2023 Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates AMRAJI, MAHTA
Lauree magistrali 2021 User Privacy on Spotify: Predicting Personal Data from Music Preferences User Privacy on Spotify: Predicting Personal Data from Music Preferences YE, JIANCHENG
Lauree magistrali 2023 VICTIM: Vulnerabilities In Cyber Threat Intelligence Models VICTIM: Vulnerabilities In Cyber Threat Intelligence Models SANTAGATI, ANDREA
Lauree magistrali 2022 Video Gamers Profiling Based on Controller Usage and Behavioral Data Gamers Profiling through Behavioral Data across Consoles and Games Genres ZIN, RICCARDO
Lauree magistrali 2021 Video Games Analysis for Personal Data Prediction Video Games Analysis for Personal Data Prediction FACCIOLO, LISA
Lauree magistrali 2021 Virtualization-Based Malwares: Can We Defend Against Them? Virtualization-Based Malwares: Can We Defend Against Them? ZERBINI, SIMONE
Lauree magistrali 2023 VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. CHIDANANDA, NIKHIL KARAKUCHI
Lauree magistrali 2022 Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure CORRADIN, FEDERICO
Mostrati risultati da 40 a 56 di 56
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile