Sfoglia per Relatore
Named entity recognition network for cyber risk assessment in healthcare domain
2022/2023 BANCALE, LORENZO
A natural language processing approach to fraud detection
2019/2020 Fernandez Rodriguez, Javier
NetQuack : a distributed system for collecting and searching radio signals
2019/2020 Fiorillo, Alessandro
Network traffic generator. Migliorare il realismo delle esercitazioni di sicurezza informatica
2012/2013 SPIGOLON, ROBERTO
NoSQL breakdown : a large-scale analysis of misconfigured NoSQL services
2018/2019 FERRARI, DARIO
A novel software architecture to secure real-time control systems
2019/2020 Pozone, Alessandro
On the security of connected automotive systems
2020/2021 Longari, Stefano
On the security of connected vehicles
2016/2017 LONGARI, STEFANO
On the use of callgraphs for binary analysis
2016/2017 FERRIGNO, JACOPO
PinDemonium : a DBI-based generic unpacker for Windows executables
2015/2016 D'ALESSIO, STEFANO
PinShield : a dynamic layer of protection against anti-instrumentation attacks
2014/2015 FONTANA, LORENZO
A practical approach to enhance web APIs security using a stateless, open-source, pluggable API gateway
2022/2023 Dei Cas, Federico
PuppetDroid : a remote execution environment and UI exerciser for Android malware analysis
2012/2013 GIANAZZA, ANDREA
Quantum Least Squares Support Vector Machines
2022/2023 MEGLER, FEDERICO
Quantum matching pursuit algorithms
2021/2022 VANERIO, STEFANO
Quantum singular value estimation techniques for data representation
2019/2020 Bellante, Armando
RansomScan : extracting intelligence from ransomware families
2017/2018 BUCCI, GIOVANNI
Recognition of inlined binary functions from template classes
2019/2020 Binosi, Lorenzo
Replatforming and migration of an identity and access management system
2020/2021 Reylander, Roland
RFQuack : a research platform for radio frequency security analysis
2019/2020 GUGLIELMINI, ANDREA
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili