Automation in cyber risk management: a literature review of evidence, gaps, and emerging directions
2026 Belli, Antonio; Maunero, Nicolò; Prinetto, Paolo
SA-SOINN: a self-adaptive neural network for continuous intrusion detection in dynamic environments
2026 Ejeh, D. G.; Foresti, G. L.; Miculan, M.; De Nardin, A.
Real-time anomaly detection in docker containers: a continuous learning approach using SF-SOINN
2025 Ejeh, D. G.; Foresti, G. L.; Miculan, M.; De Nardin, A.
Cloud services and maritime cybersecurity in the Baltic Sea region
2025 Romanini, Daisy; Rodriguez, Esther; Dalaklis, Dimitrios; Pinelli, Fabio; Petrocchi, Marinella
A concept drift stream generator for intrusion detection systems
2025 Costa Gabriele, Nicolò; De Paola, Alessandra; Drago, Salvatore; Ferraro, Pierluca; Lo Re, Giuseppe
REFINE: Robust Evaluation Framework for IDS under Concept Drift in Dynamic Environments
2026 Costa Gabriele, Nicolò; De Paola, Alessandra; Drago, Salvatore; Ferraro, Pierluca; Lo Re, Giuseppe
Online framework for intrusion detection systems with explainable concept drift detection and adaptation phases
2026 Drago, Salvatore; Lorusso, Manuel; Ferraro, Pierluca; De Paola, Alessandra; Lo Re, Giuseppe
Obfuscation-resistant feature extraction for macro-based office malware detection
2026 Imperiale, Sergio; Morana, Marco; Lo Re, Giuseppe
Integrating human-in-the-loop AI systems in the Italian judicial system
2026 Cerini, Samuele Yves; Deidda, Nicola; Lilli, Sara; Zucca, Maria Vittoria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Marsocci, Salvatore
Graph-based modelling of the Italian criminal code as a knowledge base for AI-assisted inference
2026 Cerini, Samuele Yves; Deidda, Nicola; Huang, Yilian; Lilli, Sara; Lobascio, Luca; Russo, Lavinia; Zucca, Maria Vittoria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Marsocci, Salvatore
Beyond checklists: automated legal compliance check in regulatory sandboxes
2026 Bernabei, Pietro; Bramante, Salvatore; Ciarravano, Ludovica; Pannullo, Fernando
Cybersecurity of and through regulatory sandboxes: an analytical approach
2026 Ciarravano, Ludovica; Seferi, Fabio
Stories in stone: the role of heritage interpretation in shaping the Mont'e Prama Giants narrative in 21st-century Italy
2026 Berettera, Andrea
Empirical evaluation of the resistance of novel non-algebraic AES s-boxes to power side-channel attacks
2026 Cerini, Samuele Yves; Roascio, Gianluca; Maunero, Nicolò; Prinetto, Paolo
Can reasoning make you humble? Experimental tests to improve intellectual humility
2025 Ruzzante, Federica; Nuti Budini Gattai, Isotta; Fracella, Luca; Panizza, Folco; Cevolani, Gustavo
Bayesian reasoning for overcoming over-reliance in AI-assisted decision making
2025 Mikhaylova, D.; Turchi, T.; Cevolani, G.; Malizia, A.
Overconfindence as truth approximation
2025 Cevolani, Gustavo; Coraci, Davide
A privacy-preserving method for explainable multiple sclerosis detection through federated machine learning
2026 Niro, Filomena; Di Renzo, Miriam; Agnello, Patrizia; Petyx, Marta; Ciaramella, Giovanni; Martinelli, Fabio; Cesarelli, Mario; Santone, Antonella; Mercaldo, Francesco
A synopsis of FAME 2024 challenge: associating faces with voices in multilingual environments
2024 Saeed Muhammad, Saad; Nawaz, Shah; Moscati, Marta; Das Rohan, Kumar; Tahir Muhammad, Salman; Zaheer Muhammad, Zaigham; Liaqat, Muhammad Irzam; Khan Muhammad, Haris; Nandakumar, Karthik; Yousaf Muhammad, Haroon; Schedl, Markus
Archaeological predictive modelling in underwater contexts. Utility and challenges
2023 Ritondale, Manuela
| Titolo | Data di pubblicazione | Autore(i) | File |
|---|---|---|---|
| Automation in cyber risk management: a literature review of evidence, gaps, and emerging directions | 1-gen-2026 | Belli, Antonio; Maunero, Nicolò; Prinetto, Paolo | |
| SA-SOINN: a self-adaptive neural network for continuous intrusion detection in dynamic environments | 1-gen-2026 | Ejeh, D. G.; Foresti, G. L.; Miculan, M.; De Nardin, A. | |
| Real-time anomaly detection in docker containers: a continuous learning approach using SF-SOINN | 1-gen-2025 | Ejeh, D. G.; Foresti, G. L.; Miculan, M.; De Nardin, A. | |
| Cloud services and maritime cybersecurity in the Baltic Sea region | 1-gen-2025 | Romanini, Daisy; Rodriguez, Esther; Dalaklis, Dimitrios; Pinelli, Fabio; Petrocchi, Marinella | |
| A concept drift stream generator for intrusion detection systems | 1-gen-2025 | Costa Gabriele, Nicolò; De Paola, Alessandra; Drago, Salvatore; Ferraro, Pierluca; Lo Re, Giuseppe | |
| REFINE: Robust Evaluation Framework for IDS under Concept Drift in Dynamic Environments | 1-gen-2026 | Costa Gabriele, Nicolò; De Paola, Alessandra; Drago, Salvatore; Ferraro, Pierluca; Lo Re, Giuseppe | |
| Online framework for intrusion detection systems with explainable concept drift detection and adaptation phases | 1-gen-2026 | Drago, Salvatore; Lorusso, Manuel; Ferraro, Pierluca; De Paola, Alessandra; Lo Re, Giuseppe | |
| Obfuscation-resistant feature extraction for macro-based office malware detection | 1-gen-2026 | Imperiale, Sergio; Morana, Marco; Lo Re, Giuseppe | |
| Integrating human-in-the-loop AI systems in the Italian judicial system | 1-gen-2026 | Cerini, Samuele Yves; Deidda, Nicola; Lilli, Sara; Zucca, Maria Vittoria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Marsocci, Salvatore | |
| Graph-based modelling of the Italian criminal code as a knowledge base for AI-assisted inference | 1-gen-2026 | Cerini, Samuele Yves; Deidda, Nicola; Huang, Yilian; Lilli, Sara; Lobascio, Luca; Russo, Lavinia; Zucca, Maria Vittoria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Marsocci, Salvatore | |
| Beyond checklists: automated legal compliance check in regulatory sandboxes | 1-gen-2026 | Bernabei, Pietro; Bramante, Salvatore; Ciarravano, Ludovica; Pannullo, Fernando | |
| Cybersecurity of and through regulatory sandboxes: an analytical approach | 1-gen-2026 | Ciarravano, Ludovica; Seferi, Fabio | |
| Stories in stone: the role of heritage interpretation in shaping the Mont'e Prama Giants narrative in 21st-century Italy | 1-gen-2026 | Berettera, Andrea | |
| Empirical evaluation of the resistance of novel non-algebraic AES s-boxes to power side-channel attacks | 1-gen-2026 | Cerini, Samuele Yves; Roascio, Gianluca; Maunero, Nicolò; Prinetto, Paolo | |
| Can reasoning make you humble? Experimental tests to improve intellectual humility | 1-gen-2025 | Ruzzante, Federica; Nuti Budini Gattai, Isotta; Fracella, Luca; Panizza, Folco; Cevolani, Gustavo | |
| Bayesian reasoning for overcoming over-reliance in AI-assisted decision making | 1-gen-2025 | Mikhaylova, D.; Turchi, T.; Cevolani, G.; Malizia, A. | |
| Overconfindence as truth approximation | 1-gen-2025 | Cevolani, Gustavo; Coraci, Davide | |
| A privacy-preserving method for explainable multiple sclerosis detection through federated machine learning | 1-gen-2026 | Niro, Filomena; Di Renzo, Miriam; Agnello, Patrizia; Petyx, Marta; Ciaramella, Giovanni; Martinelli, Fabio; Cesarelli, Mario; Santone, Antonella; Mercaldo, Francesco | |
| A synopsis of FAME 2024 challenge: associating faces with voices in multilingual environments | 1-gen-2024 | Saeed Muhammad, Saad; Nawaz, Shah; Moscati, Marta; Das Rohan, Kumar; Tahir Muhammad, Salman; Zaheer Muhammad, Zaigham; Liaqat, Muhammad Irzam; Khan Muhammad, Haris; Nandakumar, Karthik; Yousaf Muhammad, Haroon; Schedl, Markus | |
| Archaeological predictive modelling in underwater contexts. Utility and challenges | 1-gen-2023 | Ritondale, Manuela |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile
Scopri
Tipologia
- 4 Contributo in Atti di Convegno ...1222
Data di pubblicazione
- In corso di stampa5
- 2020 - 2026339
- 2010 - 2019569
- 2000 - 2009266
- 1990 - 199937
- 1988 - 19896
Editore
- IEEE110
- Springer58
- Institute of Electrical and Elect...38
- Elsevier33
- Association for Computing Machinery23
- CEUR-WS17
- IEEE Computer Society17
- Springer Verlag17
- Association for Computing Machine...12
- EURAM11
Rivista
- NEUROIMAGE25
- LECTURE NOTES IN COMPUTER SCIENCE17
- ELECTRONIC PROCEEDINGS IN THEORET...10
- LECTURE NOTES IN COMPUTER SCIENCE6
- SLEEP6
- ENERGY PROCEDIA5
- PROCEEDINGS OF THE IEEE CONFERENC...5
- CEUR WORKSHOP PROCEEDINGS4
- JOURNAL OF SLEEP RESEARCH4
- LECTURE NOTES IN APPLIED AND COMP...3
Serie
- LECTURE NOTES IN COMPUTER SCIENCE60
- CEUR WORKSHOP PROCEEDINGS34
- IFAC-PAPERSONLINE23
- PROCEEDINGS OF THE IEEE CONFERENC...22
- PROCEEDINGS OF THE ... IEEE CONFE...11
- COMMUNICATIONS IN COMPUTER AND IN...9
- EUROPEAN CONTROL CONFERENCE8
- LECTURE NOTES IN COMPUTER SCIENCE7
- LECTURE NOTES OF THE INSTITUTE FO...7
- PROCEEDINGS OF THE AMERICAN CONTR...6
Keyword
- Cybersecurity12
- Machine learning12
- Security12
- Deep Learning8
- Artificial intelligence7
- Games7
- Machine Learning7
- Malware7
- security7
- Blockchain6
Lingua
- eng906
- ita103
- und80
- por6
- spa4
- fre1
Accesso al fulltext
- no fulltext679
- reserved319
- open179
- partially open41
- mixed3
- embargoed1