Sfoglia per Corso  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 85 a 103 di 103
Tipologia Anno Titolo Titolo inglese Autore File
Lauree magistrali 2023 TeLL Me what you can't see - a forensic analysis for images data augmentation TeLL Me what you can't see - a forensic analysis for images data augmentation BIASETTON, PIETRO
Lauree magistrali 2022 Temperature attacks on TRNG and QRNG devices Temperature attacks on TRNG and QRNG devices BARSI, LUDOVICA
Lauree magistrali 2024 The Impact of Large Language Models on Academic Writing The Impact of Large Language Models on Academic Writing RACCUGLIA, SIMONA
Lauree magistrali 2024 The White-Box Approach to IoT Security: Generating MUD Profiles with RAG The White-Box Approach to IoT Security: Generating MUD Profiles with RAG ALMENHALI, ABDULLA RASHEED ABDULLA SAEED
Lauree magistrali 2024 Time-based attacks for phishing detection evasion Time-based attacks for phishing detection evasion RADO, CRISTIANO ALEX
Lauree magistrali 2021 Toward Explainable deepfake detectors Toward Explainable deepfake detectors LISSANDRON, FRANCESCO
Lauree magistrali 2024 Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization BOSCOLO MENEGUOLO, LUCA
Lauree magistrali 2023 Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates AMRAJI, MAHTA
Lauree magistrali 2024 Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis ROSA, NICOLÒ
Lauree magistrali 2021 User Privacy on Spotify: Predicting Personal Data from Music Preferences User Privacy on Spotify: Predicting Personal Data from Music Preferences YE, JIANCHENG
Lauree magistrali 2023 VICTIM: Vulnerabilities In Cyber Threat Intelligence Models VICTIM: Vulnerabilities In Cyber Threat Intelligence Models SANTAGATI, ANDREA
Lauree magistrali 2022 Video Gamers Profiling Based on Controller Usage and Behavioral Data Gamers Profiling through Behavioral Data across Consoles and Games Genres ZIN, RICCARDO
Lauree magistrali 2021 Video Games Analysis for Personal Data Prediction Video Games Analysis for Personal Data Prediction FACCIOLO, LISA
Lauree magistrali 2021 Virtualization-Based Malwares: Can We Defend Against Them? Virtualization-Based Malwares: Can We Defend Against Them? ZERBINI, SIMONE
Lauree magistrali 2023 VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. CHIDANANDA, NIKHIL KARAKUCHI
Lauree magistrali 2023 Visible Light Communication Attacks on Autonomous Vehicle vSLAM Systems Visible Light Communication Attacks on Autonomous Vehicle vSLAM Systems ALAGAPPAN, VINU VARSHITH
Lauree magistrali 2024 Vision-based defect detection and quality control for semiconductor industry Vision-based defect detection and quality control for semiconductor industry BELTRAME, MIRCO
Lauree magistrali 2024 Vulnerability Management: A Risk-Based Optimization Vulnerability Management: A Risk-Based Optimization RIEPPI, MICHELE
Lauree magistrali 2022 Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure CORRADIN, FEDERICO
Mostrati risultati da 85 a 103 di 103
Legenda icone

  •  file ad accesso aperto
  •  file ad accesso riservato
  •  file sotto embargo
  •  nessun file disponibile