Sfoglia per Relatore
PinDemonium : a DBI-based generic unpacker for Windows executables
2015/2016 D'ALESSIO, STEFANO
PinShield : a dynamic layer of protection against anti-instrumentation attacks
2014/2015 FONTANA, LORENZO
A practical approach to enhance web APIs security using a stateless, open-source, pluggable API gateway
2022/2023 Dei Cas, Federico
PuppetDroid : a remote execution environment and UI exerciser for Android malware analysis
2012/2013 GIANAZZA, ANDREA
Quantum Least Squares Support Vector Machines
2022/2023 MEGLER, FEDERICO
Quantum matching pursuit algorithms
2021/2022 VANERIO, STEFANO
Quantum singular value estimation techniques for data representation
2019/2020 Bellante, Armando
RansomScan : extracting intelligence from ransomware families
2017/2018 BUCCI, GIOVANNI
Recognition of inlined binary functions from template classes
2019/2020 Binosi, Lorenzo
Replatforming and migration of an identity and access management system
2020/2021 Reylander, Roland
RFQuack : a research platform for radio frequency security analysis
2019/2020 GUGLIELMINI, ANDREA
ScriptShark : analisi semistatica del codice JavaScript per la protezione da attacchi informatici
2010/2011 ZUCCHINALI, RICCARDO
Securing a web application : a case study
2019/2020 ROSSETTI, DANIELE
Security aspects in evolution of enterprise business applications framework
2010/2011 ALI, HASHIM
Security evaluation of a ransomware detection system
2016/2017 AMEL ZENDEHDEL, GHAZALE
Security of industrial control systems for manufacturing
POGLIANI, MARCELLO
Semi-automated identification and handling of input parsing routines for efficient fuzzing and symbolic execution
2018/2019 BRUCATO, ALESSANDRO
SimDroidUI : a new method of UI-based Clustering of Android applications
2013/2014 PALESE, GIUSEPPE
Social authentication : vulnerabilities, mitigations and redesign
2012/2013 LANCINI, MARCO
Solid state drive (SSD). Digital forensics construction
2011/2012 GEBREMARYAM, FKREZGY YOHANNES
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili