Sfoglia per Corso
From Gateway to Dashboard: A Secure Microservices Architecture for Data Provisioning to Odoo ERP
2024/2025 ZAMINI, ALI
Fuzzy Searchable Symmetric Encryption: Design and Implementation of a Novel Scheme Toward Real-World Applications
2024/2025 RAGUSA, SIMONE
Generative Fingerprint Augmentation against Membership Inference Attacks
2022/2023 CAVASIN, SAVERIO
IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques
2021/2022 BARON, ALEX
In-field experiment of Intermodal Quantum Key Distribution over a 18km-long free-space link with Adaptive Optics for fiber-injection
2024/2025 NARDI, MARCO
Inferring personal attributes with a millimeter wave radar
2022/2023 TAMAYO GONZALEZ, CINTHYA CELINA
Investigating Hidden Watermarks in Camera Noise for Identification
2023/2024 TAMIAZZO, MATTIA
Leveraging Drones' Propeller Vibration as a Covert Channel for Authentication
2024/2025 DRAGIŠIĆ, NEMANJA
LLMs Evaluation for Android Vulnerability Repair
2022/2023 BRACONARO, ELISA
Model Selection Hijacking Attack
2023/2024 PETRUCCI, RICCARDO
Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment
2022/2023 RIZZO, ALESSANDRO
On the use of hypercube-based quantum walks in one-way quantum key distribution protocols
2024/2025 POLZONI, DAVID
Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models
2024/2025 MIELE, RICCARDO
Penetration testing applied to 5G Core Network
2022/2023 GIAMBARTOLOMEI, FILIPPO
Privacy and Security Analysis of mHealth Apps
2022/2023 MANCINI, ELEONORA
Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus
2022/2023 STEFANI, CLAUDIO
Ransomware Detection Techniques: A Comparative Study
2023/2024 UMBRELLA, GIULIO
Ransomware detection with Machine Learning algorithms using file segments and statistics
2023/2024 MIOTTO, EMANUELE
Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem
2021/2022 CESTARO, RICCARDO
Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards
2022/2023 KAWAS, MHD NAZEER
| Tipologia | Anno | Titolo | Titolo inglese | Autore | File |
|---|---|---|---|---|---|
| Lauree magistrali | 2024 | From Gateway to Dashboard: A Secure Microservices Architecture for Data Provisioning to Odoo ERP | From Gateway to Dashboard: A Secure Microservices Architecture for Data Provisioning to Odoo ERP | ZAMINI, ALI | |
| Lauree magistrali | 2024 | Fuzzy Searchable Symmetric Encryption: Design and Implementation of a Novel Scheme Toward Real-World Applications | Fuzzy Searchable Symmetric Encryption: Design and Implementation of a Novel Scheme Toward Real-World Applications | RAGUSA, SIMONE | |
| Lauree magistrali | 2022 | Generative Fingerprint Augmentation against Membership Inference Attacks | Generative Fingerprint Augmentation against Membership Inference Attacks | CAVASIN, SAVERIO | |
| Lauree magistrali | 2021 | IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques | IMAT: A Lightweight IoT Network Intrusion Detection System based on Machine Learning techniques | BARON, ALEX | |
| Lauree magistrali | 2024 | In-field experiment of Intermodal Quantum Key Distribution over a 18km-long free-space link with Adaptive Optics for fiber-injection | In-field experiment of Intermodal Quantum Key Distribution over a 18km-long free-space link with Adaptive Optics for fiber-injection | NARDI, MARCO | |
| Lauree magistrali | 2022 | Inferring personal attributes with a millimeter wave radar | Inferring personal attributes with a millimeter wave radar | TAMAYO GONZALEZ, CINTHYA CELINA | |
| Lauree magistrali | 2023 | Investigating Hidden Watermarks in Camera Noise for Identification | Investigating Hidden Watermarks in Camera Noise for Identification | TAMIAZZO, MATTIA | |
| Lauree magistrali | 2024 | Leveraging Drones' Propeller Vibration as a Covert Channel for Authentication | Leveraging Drones' Propeller Vibration as a Covert Channel for Authentication | DRAGIŠIĆ, NEMANJA | |
| Lauree magistrali | 2022 | LLMs Evaluation for Android Vulnerability Repair | LLMs Evaluation for Android Vulnerability Repair | BRACONARO, ELISA | |
| Lauree magistrali | 2023 | Model Selection Hijacking Attack | Model Selection Hijacking Attack | PETRUCCI, RICCARDO | |
| Lauree magistrali | 2022 | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | Oblivious Password Recovery for Genesis Wallets in a decentralized, trustless environment | RIZZO, ALESSANDRO | |
| Lauree magistrali | 2024 | On the use of hypercube-based quantum walks in one-way quantum key distribution protocols | On the use of hypercube-based quantum walks in one-way quantum key distribution protocols | POLZONI, DAVID | |
| Lauree magistrali | 2024 | Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models | Penetration Testing and Large Language Models: A Study on LLM-based PT with Local and Remote Models | MIELE, RICCARDO | |
| Lauree magistrali | 2022 | Penetration testing applied to 5G Core Network | Penetration testing applied to 5G Core Network | GIAMBARTOLOMEI, FILIPPO | |
| Lauree magistrali | 2022 | Privacy and Security Analysis of mHealth Apps | Privacy and Security Analysis of mHealth Apps | MANCINI, ELEONORA | |
| Lauree magistrali | 2022 | Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus | A review of electric vehicles charge while driving authentication protocols and CAN bus covert channel solutions | STEFANI, CLAUDIO | |
| Lauree magistrali | 2023 | Ransomware Detection Techniques: A Comparative Study | Ransomware Detection Techniques: A Comparative Study | UMBRELLA, GIULIO | |
| Lauree magistrali | 2023 | Ransomware detection with Machine Learning algorithms using file segments and statistics | Ransomware detection with Machine Learning algorithms using file segments and statistics | MIOTTO, EMANUELE | |
| Lauree magistrali | 2021 | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | Reversing, Analyzing, and Attacking Xiaomi’s Electric Scooter Ecosystem | CESTARO, RICCARDO | |
| Lauree magistrali | 2022 | Review on IoT Cybersecurity Standards: Design security tests for IoT devices based on the ETSI framework standards | Review on IoT Cybersecurity Standards and Design of security tests for IoT devices based on the ETSI framework standards | KAWAS, MHD NAZEER |
Legenda icone
- file ad accesso aperto
- file ad accesso riservato
- file sotto embargo
- nessun file disponibile