Sfoglia per Relatore
On the security of connected automotive systems
2020/2021 Longari, Stefano
On the security of connected vehicles
2016/2017 LONGARI, STEFANO
On the use of callgraphs for binary analysis
2016/2017 FERRIGNO, JACOPO
PinDemonium : a DBI-based generic unpacker for Windows executables
2015/2016 D'ALESSIO, STEFANO
PinShield : a dynamic layer of protection against anti-instrumentation attacks
2014/2015 FONTANA, LORENZO
A practical approach to enhance web APIs security using a stateless, open-source, pluggable API gateway
2022/2023 Dei Cas, Federico
PuppetDroid : a remote execution environment and UI exerciser for Android malware analysis
2012/2013 GIANAZZA, ANDREA
Quantum Least Squares Support Vector Machines
2022/2023 MEGLER, FEDERICO
Quantum matching pursuit algorithms
2021/2022 VANERIO, STEFANO
Quantum singular value estimation techniques for data representation
2019/2020 Bellante, Armando
RansomScan : extracting intelligence from ransomware families
2017/2018 BUCCI, GIOVANNI
Recognition of inlined binary functions from template classes
2019/2020 Binosi, Lorenzo
Replatforming and migration of an identity and access management system
2020/2021 Reylander, Roland
RFQuack : a research platform for radio frequency security analysis
2019/2020 GUGLIELMINI, ANDREA
ScriptShark : analisi semistatica del codice JavaScript per la protezione da attacchi informatici
2010/2011 ZUCCHINALI, RICCARDO
Securing a web application : a case study
2019/2020 ROSSETTI, DANIELE
Security aspects in evolution of enterprise business applications framework
2010/2011 ALI, HASHIM
Security evaluation of a ransomware detection system
2016/2017 AMEL ZENDEHDEL, GHAZALE
Security of industrial control systems for manufacturing
POGLIANI, MARCELLO
Semi-automated identification and handling of input parsing routines for efficient fuzzing and symbolic execution
2018/2019 BRUCATO, ALESSANDRO
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili