4.1 Contributo in Atti di convegno: [1222] Home page tipologia

Sfoglia
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 1 a 20 di 1.222
Titolo Data di pubblicazione Autore(i) File
Automation in cyber risk management: a literature review of evidence, gaps, and emerging directions 1-gen-2026 Belli, Antonio; Maunero, Nicolò; Prinetto, Paolo
SA-SOINN: a self-adaptive neural network for continuous intrusion detection in dynamic environments 1-gen-2026 Ejeh, D. G.; Foresti, G. L.; Miculan, M.; De Nardin, A.
Real-time anomaly detection in docker containers: a continuous learning approach using SF-SOINN 1-gen-2025 Ejeh, D. G.; Foresti, G. L.; Miculan, M.; De Nardin, A.
Cloud services and maritime cybersecurity in the Baltic Sea region 1-gen-2025 Romanini, Daisy; Rodriguez, Esther; Dalaklis, Dimitrios; Pinelli, Fabio; Petrocchi, Marinella
A concept drift stream generator for intrusion detection systems 1-gen-2025 Costa Gabriele, Nicolò; De Paola, Alessandra; Drago, Salvatore; Ferraro, Pierluca; Lo Re, Giuseppe
REFINE: Robust Evaluation Framework for IDS under Concept Drift in Dynamic Environments 1-gen-2026 Costa Gabriele, Nicolò; De Paola, Alessandra; Drago, Salvatore; Ferraro, Pierluca; Lo Re, Giuseppe
Online framework for intrusion detection systems with explainable concept drift detection and adaptation phases 1-gen-2026 Drago, Salvatore; Lorusso, Manuel; Ferraro, Pierluca; De Paola, Alessandra; Lo Re, Giuseppe
Obfuscation-resistant feature extraction for macro-based office malware detection 1-gen-2026 Imperiale, Sergio; Morana, Marco; Lo Re, Giuseppe
Integrating human-in-the-loop AI systems in the Italian judicial system 1-gen-2026 Cerini, Samuele Yves; Deidda, Nicola; Lilli, Sara; Zucca, Maria Vittoria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Marsocci, Salvatore
Graph-based modelling of the Italian criminal code as a knowledge base for AI-assisted inference 1-gen-2026 Cerini, Samuele Yves; Deidda, Nicola; Huang, Yilian; Lilli, Sara; Lobascio, Luca; Russo, Lavinia; Zucca, Maria Vittoria; Fumera, Giorgio; Giacinto, Giorgio; Prinetto, Paolo; Marsocci, Salvatore
Beyond checklists: automated legal compliance check in regulatory sandboxes 1-gen-2026 Bernabei, Pietro; Bramante, Salvatore; Ciarravano, Ludovica; Pannullo, Fernando
Cybersecurity of and through regulatory sandboxes: an analytical approach 1-gen-2026 Ciarravano, Ludovica; Seferi, Fabio
Stories in stone: the role of heritage interpretation in shaping the Mont'e Prama Giants narrative in 21st-century Italy 1-gen-2026 Berettera, Andrea
Empirical evaluation of the resistance of novel non-algebraic AES s-boxes to power side-channel attacks 1-gen-2026 Cerini, Samuele Yves; Roascio, Gianluca; Maunero, Nicolò; Prinetto, Paolo
Can reasoning make you humble? Experimental tests to improve intellectual humility 1-gen-2025 Ruzzante, Federica; Nuti Budini Gattai, Isotta; Fracella, Luca; Panizza, Folco; Cevolani, Gustavo
Bayesian reasoning for overcoming over-reliance in AI-assisted decision making 1-gen-2025 Mikhaylova, D.; Turchi, T.; Cevolani, G.; Malizia, A.
Overconfindence as truth approximation 1-gen-2025 Cevolani, Gustavo; Coraci, Davide
A privacy-preserving method for explainable multiple sclerosis detection through federated machine learning 1-gen-2026 Niro, Filomena; Di Renzo, Miriam; Agnello, Patrizia; Petyx, Marta; Ciaramella, Giovanni; Martinelli, Fabio; Cesarelli, Mario; Santone, Antonella; Mercaldo, Francesco
A synopsis of FAME 2024 challenge: associating faces with voices in multilingual environments 1-gen-2024 Saeed Muhammad, Saad; Nawaz, Shah; Moscati, Marta; Das Rohan, Kumar; Tahir Muhammad, Salman; Zaheer Muhammad, Zaigham; Liaqat, Muhammad Irzam; Khan Muhammad, Haris; Nandakumar, Karthik; Yousaf Muhammad, Haroon; Schedl, Markus
Archaeological predictive modelling in underwater contexts. Utility and challenges 1-gen-2023 Ritondale, Manuela
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 1 a 20 di 1.222
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile

Scopri
Tipologia
  • 4 Contributo in Atti di Convegno ...1222
Autore
  • BEMPORAD, ALBERTO225
  • PIETRINI, PIETRO92
  • RICCIARDI, EMILIANO82
  • TRIBASTONE, MIRCO76
  • PAGGI, MARCO66
  • GALLETTA, LETTERIO49
  • Zanon, Mario48
  • GNECCO, GIORGIO STEFANO42
  • Marzi, Giacomo41
  • Bernardi, Giulio36
Data di pubblicazione
  • In corso di stampa5
  • 2020 - 2026339
  • 2010 - 2019569
  • 2000 - 2009266
  • 1990 - 199937
  • 1988 - 19896
Editore
  • IEEE110
  • Springer58
  • Institute of Electrical and Elect...38
  • Elsevier33
  • Association for Computing Machinery23
  • CEUR-WS17
  • IEEE Computer Society17
  • Springer Verlag17
  • Association for Computing Machine...12
  • EURAM11
Rivista
  • NEUROIMAGE25
  • LECTURE NOTES IN COMPUTER SCIENCE17
  • ELECTRONIC PROCEEDINGS IN THEORET...10
  • LECTURE NOTES IN COMPUTER SCIENCE6
  • SLEEP6
  • ENERGY PROCEDIA5
  • PROCEEDINGS OF THE IEEE CONFERENC...5
  • CEUR WORKSHOP PROCEEDINGS4
  • JOURNAL OF SLEEP RESEARCH4
  • LECTURE NOTES IN APPLIED AND COMP...3
Serie
  • LECTURE NOTES IN COMPUTER SCIENCE60
  • CEUR WORKSHOP PROCEEDINGS34
  • IFAC-PAPERSONLINE23
  • PROCEEDINGS OF THE IEEE CONFERENC...22
  • PROCEEDINGS OF THE ... IEEE CONFE...11
  • COMMUNICATIONS IN COMPUTER AND IN...9
  • EUROPEAN CONTROL CONFERENCE8
  • LECTURE NOTES IN COMPUTER SCIENCE7
  • LECTURE NOTES OF THE INSTITUTE FO...7
  • PROCEEDINGS OF THE AMERICAN CONTR...6
Keyword
  • Cybersecurity12
  • Machine learning12
  • Security12
  • Deep Learning8
  • Artificial intelligence7
  • Games7
  • Machine Learning7
  • Malware7
  • security7
  • Blockchain6
Lingua
  • eng906
  • ita103
  • und80
  • por6
  • spa4
  • fre1
Accesso al fulltext
  • no fulltext679
  • reserved319
  • open179
  • partially open41
  • mixed3
  • embargoed1