Sfoglia per Relatore
RansomScan : extracting intelligence from ransomware families
2017/2018 BUCCI, GIOVANNI
Recognition of inlined binary functions from template classes
2019/2020 Binosi, Lorenzo
Replatforming and migration of an identity and access management system
2020/2021 Reylander, Roland
RFQuack : a research platform for radio frequency security analysis
2019/2020 GUGLIELMINI, ANDREA
ScriptShark : analisi semistatica del codice JavaScript per la protezione da attacchi informatici
2010/2011 ZUCCHINALI, RICCARDO
Securing a web application : a case study
2019/2020 ROSSETTI, DANIELE
Security aspects in evolution of enterprise business applications framework
2010/2011 ALI, HASHIM
Security evaluation of a ransomware detection system
2016/2017 AMEL ZENDEHDEL, GHAZALE
Security of industrial control systems for manufacturing
POGLIANI, MARCELLO
Semi-automated identification and handling of input parsing routines for efficient fuzzing and symbolic execution
2018/2019 BRUCATO, ALESSANDRO
SimDroidUI : a new method of UI-based Clustering of Android applications
2013/2014 PALESE, GIUSEPPE
Social authentication : vulnerabilities, mitigations and redesign
2012/2013 LANCINI, MARCO
Solid state drive (SSD). Digital forensics construction
2011/2012 GEBREMARYAM, FKREZGY YOHANNES
Static detection and automatic exploitation of intent message vulnerabilities in Android applications
2012/2013 GALLINGANI, DANIELE
Uno studio sistematico delle inconsistenze nei nomi dei malware
2009/2010 BELLINI, ANDREA
Supervised learning approaches to assist the static analysis of executable files
2016/2017 DE NICOLAO, PIETRO
SysTaint : assisting reversing of malicious network communications
2016/2017 VIGLIANISI, GABRIELE
Threat hunting : detection of LoLBin attacks in a large distributed enterprise infrastructure
2022/2023 COLOMBRINO, FULVIO
ThYPon. Hypervisor less secure reference monitor
2015/2016 BRANCALEONI, ANDREA
Toward live memory forensics for malware identification
2016/2017 MAZZOTTA, GABRIELE
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili