Sfoglia per Relatore
Malware behaviors: uncover dataflow dependencies among called API
2015/2016 AMENDOLA, ANDREA
Malware evasion techniques : how to bypass endpoint detection and response solutions
2022/2023 Pellizzer, Massimiliano
MALwhere : a memory forensics platform for financial malware analysis and classification
2018/2019 GIOSSI, GABRIELE OLIVIERO
Metamorfosi di un sistema informativo. Il caso A.S.S.T. Franciacorta
2016/2017 BONETTI, ALEX
A methodology to reconstruct information and enable static analysis in raw binaries
2018/2019 REMIGIO, RICCARDO
Una metodologia di analisi di malware utilizzati per la creazione di bot
2009/2010 PESSINA, MAURO
Model for the economic optimization of the vulnerability management process
2018/2019 GENTILINI, GIACOMO
Modellazione e simulazione della propagazione di malware bluetooth
2009/2010 CARONIA, CLAUDIO
MoKey : exploiting multiple sensors for keylogging from smartphones
2013/2014 BENEFICO, SIMONE
Named entity recognition network for cyber risk assessment in healthcare domain
2022/2023 BANCALE, LORENZO
A natural language processing approach to fraud detection
2019/2020 Fernandez Rodriguez, Javier
NetQuack : a distributed system for collecting and searching radio signals
2019/2020 Fiorillo, Alessandro
Network traffic generator. Migliorare il realismo delle esercitazioni di sicurezza informatica
2012/2013 SPIGOLON, ROBERTO
NoSQL breakdown : a large-scale analysis of misconfigured NoSQL services
2018/2019 FERRARI, DARIO
A novel software architecture to secure real-time control systems
2019/2020 Pozone, Alessandro
On the security of connected automotive systems
2020/2021 Longari, Stefano
On the security of connected vehicles
2016/2017 LONGARI, STEFANO
On the use of callgraphs for binary analysis
2016/2017 FERRIGNO, JACOPO
PinDemonium : a DBI-based generic unpacker for Windows executables
2015/2016 D'ALESSIO, STEFANO
PinShield : a dynamic layer of protection against anti-instrumentation attacks
2014/2015 FONTANA, LORENZO
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili