Sfoglia per Relatore
Implementation of a GRC tool within an italian company
2021/2022 GALAZZINI, ANDREA
Implementation of the TIBER-EU framework in a threat intelligence-led red team test
2019/2020 MANDRINI, FILIPPO
Improving JackDaw : algorithm linearization, streaming and visualization
2015/2016 ALEOTTI, FEDERICO
Improving the extraction of knowledge from the blockchain
2017/2018 PERILLO, SALVATORE
Inline views : protecting against SQL injection attacks while providing access to aggregate values
2014/2015 BRUZZO, PAOLO
Internet banking dataset generator for fraud detection benchmarking
2014/2015 MARIANI, EMANUELE
Internet banking fraud analysis and detection
CARMINATI, MICHELE
Jackdaw : automatic behavior extractor and semantic tagger
2012/2013 SCORTI, ANDREA
JavaScript threats : a systematization study
2012/2013 PRIMON, ALESSANDRO
Labelless concept drift detection and explanation
2018/2019 ZHENG, SHIHAO
Less is more (secure) deprecator : automated reduction of the attack surface in modern browsers
2016/2017 INNOCENTI, TOMMASO
A long short-term memory based approach for reverse engineering and classification of CAN signals
2018/2019 TRICARICO, ANDREA
Malware behaviors: uncover dataflow dependencies among called API
2015/2016 AMENDOLA, ANDREA
Malware evasion techniques : how to bypass endpoint detection and response solutions
2022/2023 Pellizzer, Massimiliano
MALwhere : a memory forensics platform for financial malware analysis and classification
2018/2019 GIOSSI, GABRIELE OLIVIERO
Metamorfosi di un sistema informativo. Il caso A.S.S.T. Franciacorta
2016/2017 BONETTI, ALEX
A methodology to reconstruct information and enable static analysis in raw binaries
2018/2019 REMIGIO, RICCARDO
Una metodologia di analisi di malware utilizzati per la creazione di bot
2009/2010 PESSINA, MAURO
Model for the economic optimization of the vulnerability management process
2018/2019 GENTILINI, GIACOMO
Modellazione e simulazione della propagazione di malware bluetooth
2009/2010 CARONIA, CLAUDIO
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili