Sfoglia per Relatore
Threat hunting : detection of LoLBin attacks in a large distributed enterprise infrastructure
2022/2023 COLOMBRINO, FULVIO
ThYPon. Hypervisor less secure reference monitor
2015/2016 BRANCALEONI, ANDREA
Toward live memory forensics for malware identification
2016/2017 MAZZOTTA, GABRIELE
Towards advanced path prioritization in symbolic execution
2019/2020 RUARO, NICOLA
Towards automated cutting of binaries
2018/2019 TERMIGNONE, GABRIELE
Towards automatic firmware extraction from update applications
2017/2018 FERRER, MARK EDWARD
Towards big scale firmware analysis
2017/2018 MKHATVARI, NIKOLOZ
Towards understanding alternative and mainstream news dissemination on social media : the case of the 2018 Italian election
2018/2019 PATUELLI, SIMONE
TriggerOne : backdoor-injection attacks on pre-trained models for malware detection
2020/2021 Di CESARE, FEDERICO
Two-factor authentication : analysis of the diffusion on web services
2018/2019 DAVIDE, MATTEO
TZ logger. A multi-platform TEE logger
2017/2018 DRAGANO, MASSIMO
WMD : a scalable Web-malware detection system
2018/2019 JEGHER, ANDREA
Xss peeker : an analysis of black box web scanners on detecting cross site scripting vulnerabilities
2012/2013 BAZZOLI, ENRICO
YBoost : a framework to accelerate YARA rules pattern matching using FPGAs
2020/2021 Furlan, Andrea
Zarathustra : detecting banking trojans via automatic, platform independent WebInjects extraction
2011/2012 BOSATELLI, FABIO
Zero-touch disasters. KNP analysis for real-world CWMP deployments
2019/2020 PICCIRILLO, LUCA
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili