Oggetti messi in scena: il caso delle 'cose' appese nella pittura tombale etrusca
2025 Pontelli, E.
IoT botnet-traffic classification using few-shot learning
2024 Di Monda, Davide; Bovenzi, Giampaolo; Montieri, Antonio; Persico, Valerio; Pescape', Antonio
Meta mimetic: few-shot classification of mobile-app encrypted traffic via multimodal meta-learning
2024 Bovenzi, Giampaolo; Di Monda, Davide; Montieri, Antonio; Persico, Valerio; Pescape', Antonio
Machine and Deep Learning approaches for IoT attack classification
2022 Nascita, Alfredo; Cerasuolo, Francesco; Di Monda, Davide; Garcia Jonas Thern, Aberia; Montieri, Antonio; Pescape', Antonio
Supporting criminal investigations on the blockchain: a temporal logic-based approach
2024 Blanchini, Marco; Cerreta, Michele; Di Monda, Davide; Fabbri, Matteo; Raciti, Mario; Ahmad Hamza, Sajjad; Costa, Gabriele
Few shot learning approaches for classifying rare mobile-app encrypted traffic samples
2023 Bovenzi, Giampaolo; Di Monda, Davide; Montieri, Antonio; Persico, Valerio; Pescape', Antonio
On the use of Machine Learning approaches for the early classification in network intrusion detection
2022 Guarino, Idio; Bovenzi, Giampaolo; Di Monda, Davide; Aceto, Giuseppe; Ciuonzo, Domenico; Pescape, Antonio
Human activity recognition through probabilistic data fusion
2025 Batool, F.; Lo Ret, G.; Morana, M.; Rizzo, G.
Understanding and communicating risk: the case of COVID-19
2023 Coraci, D.; Demichelis, A.; Cevolani, G.
“Work-in-Progress” Structuring the complexity: an ontological approach to analyze the cybersecurity of a 5G service
2024 Bernardini, Andrea; D'Alterio, Francesco; Sagratella, Leonardo; Settembre, Marina; Maunero, Nicolò
Growing HOLMS, a HOL Light Library for Modal Systems
2025 Bilotta, A.; Maggesi, M.; Perini Brogi, C.; Quartini, L.
AIPerfLLM: 3rd International Workshop on Performance Optimization in the LLM world
2025 Chow, Kingsum; Incerto, Emilio; Litoiu, Marin; Chang, Zhihao; Rajput, Anil; Ban, Khun; Masti, Daniele; Lyu, Zhiheng
A narrative approach to non-financial disclosure in museums
2025 Martello, Diana; Dubini, Paola; Monti, Alberto
The data librarian: myth, reality or utopia?
2019 Giannini, Silvia; Molino, Anna
Materia trasparente nella pittura parietale
2024 Kaszubska, Dominika Walentyna
Valorizzare lo spazio architettonico: l’apparato decorativo del cubicolo della Villa dei Limiti sull’isola di Gorgona
2024 Lorella, Alderighi; Ilaria, Benetti; Kaszubska, Dominika Walentyna
AndroCreme: unseen android malware detection based on inductive conformal learning
2021 Zhang, G.; Li, H.; Chen, Z.; Peng, L.; Zhu, Y.; Zhao, C.
DroidDetector: a traffic-based platform to detect android malware using machine learning
2018 Shen, J.; Chen, Z.; Wang, S.; Zhu, Y.; Hassan, M. U.
Devils in the clouds: an evolutionary study of telnet bot loaders
2023 Zhu, Y.; Chen, Z.; Yan, Q.; Wang, S.; Giaretta, A.; Li, E.; Peng, L.; Zhao, C.; Conti, M.
Cybersecurity education showdown: a comparative analysis of K-12 education systems in the United States, the European Union and China
2025 Fernandez Nieto, Berenice; Romanini, Daisy; Zhu, Yuhui
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Oggetti messi in scena: il caso delle 'cose' appese nella pittura tombale etrusca | 1-gen-2025 | Pontelli, E. | |
IoT botnet-traffic classification using few-shot learning | 1-gen-2024 | Di Monda, Davide; Bovenzi, Giampaolo; Montieri, Antonio; Persico, Valerio; Pescape', Antonio | |
Meta mimetic: few-shot classification of mobile-app encrypted traffic via multimodal meta-learning | 1-gen-2024 | Bovenzi, Giampaolo; Di Monda, Davide; Montieri, Antonio; Persico, Valerio; Pescape', Antonio | |
Machine and Deep Learning approaches for IoT attack classification | 1-gen-2022 | Nascita, Alfredo; Cerasuolo, Francesco; Di Monda, Davide; Garcia Jonas Thern, Aberia; Montieri, Antonio; Pescape', Antonio | |
Supporting criminal investigations on the blockchain: a temporal logic-based approach | 1-gen-2024 | Blanchini, Marco; Cerreta, Michele; Di Monda, Davide; Fabbri, Matteo; Raciti, Mario; Ahmad Hamza, Sajjad; Costa, Gabriele | |
Few shot learning approaches for classifying rare mobile-app encrypted traffic samples | 1-gen-2023 | Bovenzi, Giampaolo; Di Monda, Davide; Montieri, Antonio; Persico, Valerio; Pescape', Antonio | |
On the use of Machine Learning approaches for the early classification in network intrusion detection | 1-gen-2022 | Guarino, Idio; Bovenzi, Giampaolo; Di Monda, Davide; Aceto, Giuseppe; Ciuonzo, Domenico; Pescape, Antonio | |
Human activity recognition through probabilistic data fusion | 1-gen-2025 | Batool, F.; Lo Ret, G.; Morana, M.; Rizzo, G. | |
Understanding and communicating risk: the case of COVID-19 | 1-gen-2023 | Coraci, D.; Demichelis, A.; Cevolani, G. | |
“Work-in-Progress” Structuring the complexity: an ontological approach to analyze the cybersecurity of a 5G service | 1-gen-2024 | Bernardini, Andrea; D'Alterio, Francesco; Sagratella, Leonardo; Settembre, Marina; Maunero, Nicolò | |
Growing HOLMS, a HOL Light Library for Modal Systems | 1-gen-2025 | Bilotta, A.; Maggesi, M.; Perini Brogi, C.; Quartini, L. | |
AIPerfLLM: 3rd International Workshop on Performance Optimization in the LLM world | 1-gen-2025 | Chow, Kingsum; Incerto, Emilio; Litoiu, Marin; Chang, Zhihao; Rajput, Anil; Ban, Khun; Masti, Daniele; Lyu, Zhiheng | |
A narrative approach to non-financial disclosure in museums | 1-gen-2025 | Martello, Diana; Dubini, Paola; Monti, Alberto | |
The data librarian: myth, reality or utopia? | 1-gen-2019 | Giannini, Silvia; Molino, Anna | |
Materia trasparente nella pittura parietale | 1-gen-2024 | Kaszubska, Dominika Walentyna | |
Valorizzare lo spazio architettonico: l’apparato decorativo del cubicolo della Villa dei Limiti sull’isola di Gorgona | 1-gen-2024 | Lorella, Alderighi; Ilaria, Benetti; Kaszubska, Dominika Walentyna | |
AndroCreme: unseen android malware detection based on inductive conformal learning | 1-gen-2021 | Zhang, G.; Li, H.; Chen, Z.; Peng, L.; Zhu, Y.; Zhao, C. | |
DroidDetector: a traffic-based platform to detect android malware using machine learning | 1-gen-2018 | Shen, J.; Chen, Z.; Wang, S.; Zhu, Y.; Hassan, M. U. | |
Devils in the clouds: an evolutionary study of telnet bot loaders | 1-gen-2023 | Zhu, Y.; Chen, Z.; Yan, Q.; Wang, S.; Giaretta, A.; Li, E.; Peng, L.; Zhao, C.; Conti, M. | |
Cybersecurity education showdown: a comparative analysis of K-12 education systems in the United States, the European Union and China | 1-gen-2025 | Fernandez Nieto, Berenice; Romanini, Daisy; Zhu, Yuhui |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile
Scopri
Tipologia
- 4 Contributo in Atti di Convegno ...1137
Data di pubblicazione
- In corso di stampa2
- 2020 - 2025259
- 2010 - 2019567
- 2000 - 2009266
- 1990 - 199937
- 1988 - 19896
Editore
- IEEE104
- Springer57
- Institute of Electrical and Elect...38
- Elsevier33
- Association for Computing Machinery20
- Springer Verlag17
- IEEE Computer Society15
- EURAM11
- Springer Science and Business Med...10
- Association for Computing Machine...8
Rivista
- NEUROIMAGE25
- LECTURE NOTES IN COMPUTER SCIENCE17
- ELECTRONIC PROCEEDINGS IN THEORET...9
- LECTURE NOTES IN COMPUTER SCIENCE6
- SLEEP6
- ENERGY PROCEDIA5
- PROCEEDINGS OF THE IEEE CONFERENC...5
- CEUR WORKSHOP PROCEEDINGS4
- JOURNAL OF SLEEP RESEARCH4
- LECTURE NOTES IN APPLIED AND COMP...3
Serie
- LECTURE NOTES IN COMPUTER SCIENCE50
- IFAC-PAPERSONLINE22
- PROCEEDINGS OF THE IEEE CONFERENC...21
- CEUR WORKSHOP PROCEEDINGS13
- PROCEEDINGS OF THE ... IEEE CONFE...11
- EUROPEAN CONTROL CONFERENCE8
- LECTURE NOTES OF THE INSTITUTE FO...7
- COMMUNICATIONS IN COMPUTER AND IN...6
- PROCEEDINGS OF THE AMERICAN CONTR...6
- COMPUTER-AIDED CHEMICAL ENGINEERING5
Keyword
- Games7
- Machine learning7
- Security7
- security7
- Uncertainty6
- Model predictive control5
- Nash equilibrium5
- Optimization5
- Software5
- Boundary element method4
Lingua
- eng824
- ita100
- und80
- por6
- spa4
- fre1
Accesso al fulltext
- no fulltext678
- reserved298
- open129
- partially open32