Sfoglia per Relatore
Un approccio sistematico all'analisi forense di dischi a stato solido
2011/2012 VIGLIONE, MARCO
Attack detection in industrial robot controllers using Arm TrustZone
2021/2022 JANNONE, JACOPO
Automated collection and analysis of runtime generated strings in a Web browser
2010/2011 FOSSEMO', MANUEL
Automated malware behavioral analysis
POLINO, MARIO
Banksealer : a transaction monitoring system for Internet banking fraud detection
2012/2013 CARON, ROBERTO
Benchmarking framework for the intrusion detection systems in controller area networks
2020/2021 COSTA CAÑONES, TERESA
Binary function vulnerability discover through LLVM IR
2018/2019 MARSELLA, DANIELE
BitAnalyzer : a framework for extracting intelligence from the blockchain
2017/2018 GNECCO, ENRICO
BitIodine : extracting intelligence from the Bitcoin network
2012/2013 SPAGNUOLO, MICHELE
BN-Hermes : a decompilation and analysis plugin for react native's Hermes bytecode
2022/2023 Falvo, Cristian
BURN : baring unknown rogue networks. Analisi e visualizzazione del comportamento di reti malevole
2010/2011 DI MARIO, LUCA
CANguru : a reliable intrusion detection system for CAN and CAN FD networks
2021/2022 Galletti, Gregorio
CANova, a classification-based modular intrusion detection system for CAN
2019/2020 Nichelini, Alessandro
CANPass : an extensible framework for bypassing CAN peripherals on unmodified microcontrollers
2020/2021 De FAVERI TRON, ALVISE
Chaos : un framework basato su algoritmi evolutivi per il fuzzing di input file complessi
2009/2010 DE FULGENTIS, LUCA
Characterization of SSD covert channels and application fingerprinting
2022/2023 La Manna, Giuseppe
Characterizing in-the-wild traffic targeted to industrial control systems using honeypots
2018/2019 FERRETTI, PIETRO
Compact and privacy protected packet attribution
2009/2010 MACRI', GIUSEPPE
Comparison and benchmarking of automatic malware unpacking techniques
2010/2011 GETU, TEWFIK ADEM
Concepts of privacy at the intersection of technology and law
2011/2012 BERHANE RUSSOM, MIRIAM
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili