Sfoglia per Serie
Enhancing malware classification with symbolic features
2021 Siwach, C.; Costa, G.; de Nicola, R.
Is the Road to Hell Paved with Good Intentions? A Criminological and Criminal Law Analysis of Prospective Regulation for Ethical Hacking in Italy and the EU
2024 Fiorinelli, Gaia; Zucca, Maria Vittoria
MUAC: Access control language for mutual benefits
2020 Ceragioli, L.; Degano, P.; Galletta, L.
A Netting Protocol for Liquidity-saving Automated Market Makers
2024 Renieri, M.; Galletta, L.; Lafuente, A. L.; Chiang, J. H. -Y.
Pattern-preserving k-anonymization of sequences and its application to mobility data mining
2008 Pensa, R. G.; Monreale, A.; Pinelli, F.; Pedreschi, D.
Simpson's Proof Systems for Process Verification: A Fine-tuning (short paper)
2024 Perini Brogi, Cosimo; DE NICOLA, Rocco; Inverso, Omar
Toward Dynamic Epistemic Verification of Zero-Knowledge Protocols
2024 Costa, Gabriele; Perini Brogi, Cosimo
A working experimentation model for cyber resilience regulatory sandboxes
2025 Seferi, F.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile