Sfoglia per Corso CYBERSECURITY Laurea Magistrale (D.M. 270/2004)
Safe Return Journey In A GPS Spoofing Attack Scenario
2022/2023 SCREMIN, NICOLA
SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN
2022/2023 HASSAN, RAYYAN
Securing ADS-B Communication Systems Against Location Spoofing Attacks
2022/2023 SALAEVA, SITORA
Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships
2024/2025 VALENTE, ANDREA
Security challenges for immersive media: threats and possible mitigations
2024/2025 KAVARI, AMIN
Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy
2024/2025 BOMBONATI, LUCA
Security of cyberphysical systems quantified through age of information
2024/2025 MATO, KRISTJANA
SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM.
2021/2022 BARDI, SARA
Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments
2024/2025 JAMSHIDI, BAHAREH
STIXnet: entity and relation extraction from unstructured CTI reports
2021/2022 MARCHIORI, FRANCESCO
Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures
2022/2023 VAISHNAV, HARSHUL
Sustainable Cybersecurity: The Triple Bottom Line for Success in Business
2022/2023 RICALDI SAAVEDRA, ROY JUNIOR
Synthetic Data Generation For Email Phishing Detection
2024/2025 CARIPOTI, EUGENIO
Synthetic Media in Cybercrime: The Role of AI in Blackmail and Extortion
2023/2024 DAQA, MUSTAFA MOHAMMAD MUSTAFA
TeLL Me what you can't see - a forensic analysis for images data augmentation
2023/2024 BIASETTON, PIETRO
Temperature attacks on TRNG and QRNG devices
2022/2023 BARSI, LUDOVICA
The Impact of Large Language Models on Academic Writing
2024/2025 RACCUGLIA, SIMONA
Toward Explainable deepfake detectors
2021/2022 LISSANDRON, FRANCESCO
Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization
2024/2025 BOSCOLO MENEGUOLO, LUCA
Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates
2023/2024 AMRAJI, MAHTA
| Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
|---|---|---|---|---|---|
| Lauree magistrali | 2022 | Safe Return Journey In A GPS Spoofing Attack Scenario | Safe Return Journey In A GPS Spoofing Attack Scenario | SCREMIN, NICOLA | |
| Lauree magistrali | 2022 | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | SECURING 5G NETWORKS WITH FEDERATED LEARNING AND GAN | HASSAN, RAYYAN | |
| Lauree magistrali | 2022 | Securing ADS-B Communication Systems Against Location Spoofing Attacks | Securing ADS-B Communication Systems Against Location Spoofing Attacks | SALAEVA, SITORA | |
| Lauree magistrali | 2024 | Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships | Securing Ship Routes: A Cross-System Approach to Anomaly Detection in Ships | VALENTE, ANDREA | |
| Lauree magistrali | 2024 | Security challenges for immersive media: threats and possible mitigations | Security challenges for immersive media: threats and possible mitigations | KAVARI, AMIN | |
| Lauree magistrali | 2024 | Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy | Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy | BOMBONATI, LUCA | |
| Lauree magistrali | 2024 | Security of cyberphysical systems quantified through age of information | Security of cyberphysical systems quantified through age of information | MATO, KRISTJANA | |
| Lauree magistrali | 2021 | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | SOCIAL HONEYPOTS ON INSTAGRAM: A STUDY ON TECHNOLOGIES AND METHODOLOGIES TO AUTOMATE THEM. | BARDI, SARA | |
| Lauree magistrali | 2024 | Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments | Stealth Light: Encoding Metadata with Infrared Projection in Physical Environments | JAMSHIDI, BAHAREH | |
| Lauree magistrali | 2021 | STIXnet: entity and relation extraction from unstructured CTI reports | STIXnet: entity and relation extraction from unstructured CTI reports | MARCHIORI, FRANCESCO | |
| Lauree magistrali | 2022 | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Invasions of Critical Infrastructures | VAISHNAV, HARSHUL | |
| Lauree magistrali | 2022 | Sustainable Cybersecurity: The Triple Bottom Line for Success in Business | Sustainable Cybersecurity: The Triple Bottom Line for Success in Business | RICALDI SAAVEDRA, ROY JUNIOR | |
| Lauree magistrali | 2024 | Synthetic Data Generation For Email Phishing Detection | Synthetic Data Generation For Email Phishing Detection | CARIPOTI, EUGENIO | |
| Lauree magistrali | 2023 | Synthetic Media in Cybercrime: The Role of AI in Blackmail and Extortion | Synthetic Media in Cybercrime: The Role of AI in Blackmail and Extortion | DAQA, MUSTAFA MOHAMMAD MUSTAFA | |
| Lauree magistrali | 2023 | TeLL Me what you can't see - a forensic analysis for images data augmentation | TeLL Me what you can't see - a forensic analysis for images data augmentation | BIASETTON, PIETRO | |
| Lauree magistrali | 2022 | Temperature attacks on TRNG and QRNG devices | Temperature attacks on TRNG and QRNG devices | BARSI, LUDOVICA | |
| Lauree magistrali | 2024 | The Impact of Large Language Models on Academic Writing | The Impact of Large Language Models on Academic Writing | RACCUGLIA, SIMONA | |
| Lauree magistrali | 2021 | Toward Explainable deepfake detectors | Toward Explainable deepfake detectors | LISSANDRON, FRANCESCO | |
| Lauree magistrali | 2024 | Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization | Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization | BOSCOLO MENEGUOLO, LUCA | |
| Lauree magistrali | 2023 | Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates | Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates | AMRAJI, MAHTA |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile