Sfoglia per Relatore
Mostrati risultati da 1 a 16 di 16
AAMO : automatic Android malware obfuscation
2013/2014 PELLEGATTA, FEDERICO
ADMIRE : Android developers & marketplaces intelligence and reputation engine
2014/2015 DANELLI, MATTEO
Apollo : eliciting and analyzing advanced WebInject-based malware
2015/2016 RODI, SAMUELE
Cerberus. Detection and characterization of automatically generated malicious domains
2013/2014 COLOMBO, EDOARDO GIOVANNI
DriveDroid : a remote execution environment and UI exerciser for Android malware analysis
2014/2015 ULIANA, EMANUELE
Droydseuss. A mobile banking trojan tracking service
2013/2014 COLETTA, ALBERTO
Grab'n run : practical and safe dynamic code loading in Android
2013/2014 FALSINA, LUCA
Heldroid : fast and efficient linguistic based ransomware detection
2014/2015 ANDRONIO, NICOLÒ
iSpy : a real time application of shoulder surfing attacks
2013/2014 SALTOGLU, NAZ
OpenST : feasibility study and prototype of a low cost, hardware-based system call tracer
2014/2015 ZHENG, CHENGYU
PANDORA : a flexible and transparent Windows native API tracer
2014/2015 MAZZONI, SIMONE
PRIVMUL : PRIVilege separation for Multi-user Logic applications
2013/2014 MAMBRETTI, ANDREA
Prometheus : a Web-based platform for analyzing banking trojans
2013/2014 BRASCHI, ANDREA
RADAR : a ransomware detection and remediation system
2014/2015 GUAGNELLI, ALESSANDRO
Talos : precise and fast detection of modern mobile ransomware
2015/2016 DELLAROCCA, NICOLA
Three-factor, ECG-based authentication : security analysis of the Nymi wristband
2014/2015 WU, JIANG
Mostrati risultati da 1 a 16 di 16
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili