Sfoglia per Corso
TeLL Me what you can't see - a forensic analysis for images data augmentation
2023/2024 BIASETTON, PIETRO
Temperature attacks on TRNG and QRNG devices
2022/2023 BARSI, LUDOVICA
The Impact of Large Language Models on Academic Writing
2024/2025 RACCUGLIA, SIMONA
The White-Box Approach to IoT Security: Generating MUD Profiles with RAG
2024/2025 ALMENHALI, ABDULLA RASHEED ABDULLA SAEED
Time-based attacks for phishing detection evasion
2024/2025 RADO, CRISTIANO ALEX
Toward Explainable deepfake detectors
2021/2022 LISSANDRON, FRANCESCO
Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization
2024/2025 BOSCOLO MENEGUOLO, LUCA
Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates
2023/2024 AMRAJI, MAHTA
Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis
2024/2025 ROSA, NICOLÒ
User Privacy on Spotify: Predicting Personal Data from Music Preferences
2021/2022 YE, JIANCHENG
VICTIM: Vulnerabilities In Cyber Threat Intelligence Models
2023/2024 SANTAGATI, ANDREA
Video Gamers Profiling Based on Controller Usage and Behavioral Data
2022/2023 ZIN, RICCARDO
Video Games Analysis for Personal Data Prediction
2021/2022 FACCIOLO, LISA
Virtualization-Based Malwares: Can We Defend Against Them?
2021/2022 ZERBINI, SIMONE
VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems.
2023/2024 CHIDANANDA, NIKHIL KARAKUCHI
Visible Light Communication Attacks on Autonomous Vehicle vSLAM Systems
2023/2024 ALAGAPPAN, VINU VARSHITH
Vision-based defect detection and quality control for semiconductor industry
2024/2025 BELTRAME, MIRCO
Vulnerability Management: A Risk-Based Optimization
2024/2025 RIEPPI, MICHELE
Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure
2022/2023 CORRADIN, FEDERICO
| Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
|---|---|---|---|---|---|
| Lauree magistrali | 2023 | TeLL Me what you can't see - a forensic analysis for images data augmentation | TeLL Me what you can't see - a forensic analysis for images data augmentation | BIASETTON, PIETRO | |
| Lauree magistrali | 2022 | Temperature attacks on TRNG and QRNG devices | Temperature attacks on TRNG and QRNG devices | BARSI, LUDOVICA | |
| Lauree magistrali | 2024 | The Impact of Large Language Models on Academic Writing | The Impact of Large Language Models on Academic Writing | RACCUGLIA, SIMONA | |
| Lauree magistrali | 2024 | The White-Box Approach to IoT Security: Generating MUD Profiles with RAG | The White-Box Approach to IoT Security: Generating MUD Profiles with RAG | ALMENHALI, ABDULLA RASHEED ABDULLA SAEED | |
| Lauree magistrali | 2024 | Time-based attacks for phishing detection evasion | Time-based attacks for phishing detection evasion | RADO, CRISTIANO ALEX | |
| Lauree magistrali | 2021 | Toward Explainable deepfake detectors | Toward Explainable deepfake detectors | LISSANDRON, FRANCESCO | |
| Lauree magistrali | 2024 | Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization | Towards Secure Virtual Apps: Bringing Application-Level Isolation to Android Virtualization | BOSCOLO MENEGUOLO, LUCA | |
| Lauree magistrali | 2023 | Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates | Unmasking the Orchestra: Quantifying the Impact of Coordinated Accounts in Online Debates | AMRAJI, MAHTA | |
| Lauree magistrali | 2024 | Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis | Unveiling Linux Malware Behavior: The Importance of Execution Environments in Dynamic Analysis | ROSA, NICOLÒ | |
| Lauree magistrali | 2021 | User Privacy on Spotify: Predicting Personal Data from Music Preferences | User Privacy on Spotify: Predicting Personal Data from Music Preferences | YE, JIANCHENG | |
| Lauree magistrali | 2023 | VICTIM: Vulnerabilities In Cyber Threat Intelligence Models | VICTIM: Vulnerabilities In Cyber Threat Intelligence Models | SANTAGATI, ANDREA | |
| Lauree magistrali | 2022 | Video Gamers Profiling Based on Controller Usage and Behavioral Data | Gamers Profiling through Behavioral Data across Consoles and Games Genres | ZIN, RICCARDO | |
| Lauree magistrali | 2021 | Video Games Analysis for Personal Data Prediction | Video Games Analysis for Personal Data Prediction | FACCIOLO, LISA | |
| Lauree magistrali | 2021 | Virtualization-Based Malwares: Can We Defend Against Them? | Virtualization-Based Malwares: Can We Defend Against Them? | ZERBINI, SIMONE | |
| Lauree magistrali | 2023 | VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. | VIRTUEPOT: A High-Fidelity and High-Interaction Virtual Honeypot for Industrial Control Systems. | CHIDANANDA, NIKHIL KARAKUCHI | |
| Lauree magistrali | 2023 | Visible Light Communication Attacks on Autonomous Vehicle vSLAM Systems | Visible Light Communication Attacks on Autonomous Vehicle vSLAM Systems | ALAGAPPAN, VINU VARSHITH | |
| Lauree magistrali | 2024 | Vision-based defect detection and quality control for semiconductor industry | Vision-based defect detection and quality control for semiconductor industry | BELTRAME, MIRCO | |
| Lauree magistrali | 2024 | Vulnerability Management: A Risk-Based Optimization | Vulnerability Management: A Risk-Based Optimization | RIEPPI, MICHELE | |
| Lauree magistrali | 2022 | Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure | Weaknesses of virtualization in 5G networks: attacks to O-CLOUD infrastructure | CORRADIN, FEDERICO |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile