Sfoglia per Autore
Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-Rate Sensor
2019-01-01 Soderi, S.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel
2020-01-01 Soderi, Simone
Acoustic-Based Security: A Key Enabling Technology for Wireless Sensor Networks
2020-01-01 Soderi, S.
Enhancing security in 6G visible light communications
2020-01-01 Soderi, S.
6G Networks Physical Layer Security using RGB Visible Light Communications
2021-01-01 Soderi, S.; De Nicola, R.
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks
2022-01-01 Soderi, Simone; Brighente, Alessandro; Turrin, Federico; Conti, Mauro
Turning Federated Learning Systems into Covert Channels
2022-01-01 Costa, Gabriele; Pinelli, Fabio; Soderi, Simone; Tolomei, Gabriele
Turning Federated Learning Systems into Covert Channels
2022-01-01 Costa, Gabriele; Pinelli, Fabio; Soderi, Simone; Tolomei, Gabriele
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-Rate Sensor | 1-gen-2019 | Soderi, S. | |
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel | 1-gen-2020 | Soderi, Simone | |
Acoustic-Based Security: A Key Enabling Technology for Wireless Sensor Networks | 1-gen-2020 | Soderi, S. | |
Enhancing security in 6G visible light communications | 1-gen-2020 | Soderi, S. | |
6G Networks Physical Layer Security using RGB Visible Light Communications | 1-gen-2021 | Soderi, S.; De Nicola, R. | |
VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks | 1-gen-2022 | Soderi, Simone; Brighente, Alessandro; Turrin, Federico; Conti, Mauro | |
Turning Federated Learning Systems into Covert Channels | 1-gen-2022 | Costa, Gabriele; Pinelli, Fabio; Soderi, Simone; Tolomei, Gabriele | |
Turning Federated Learning Systems into Covert Channels | 1-gen-2022 | Costa, Gabriele; Pinelli, Fabio; Soderi, Simone; Tolomei, Gabriele |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile