4.1 Contributo in Atti di convegno: [1128] Home page tipologia

Sfoglia
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 1 a 20 di 1.128
Titolo Data di pubblicazione Autore(i) File
“Work-in-Progress” Structuring the complexity: an ontological approach to analyze the cybersecurity of a 5G service 1-gen-2024 Bernardini, Andrea; D'Alterio, Francesco; Sagratella, Leonardo; Settembre, Marina; Maunero, Nicolò
Growing HOLMS, a HOL Light Library for Modal Systems 1-gen-2025 Bilotta, A.; Maggesi, M.; Perini Brogi, C.; Quartini, L.
AIPerfLLM: 3rd International Workshop on Performance Optimization in the LLM world 1-gen-2025 Chow, Kingsum; Incerto, Emilio; Litoiu, Marin; Chang, Zhihao; Rajput, Anil; Ban, Khun; Masti, Daniele; Lyu, Zhiheng
A narrative approach to non-financial disclosure in museums 1-gen-2025 Martello, Diana; Dubini, Paola; Monti, Alberto
The data librarian: myth, reality or utopia? 1-gen-2019 Giannini, Silvia; Molino, Anna
Materia trasparente nella pittura parietale 1-gen-2024 Kaszubska, Dominika Walentyna
Valorizzare lo spazio architettonico: l’apparato decorativo del cubicolo della Villa dei Limiti sull’isola di Gorgona 1-gen-2024 Lorella, Alderighi; Ilaria, Benetti; Kaszubska, Dominika Walentyna
AndroCreme: unseen android malware detection based on inductive conformal learning 1-gen-2021 Zhang, G.; Li, H.; Chen, Z.; Peng, L.; Zhu, Y.; Zhao, C.
DroidDetector: a traffic-based platform to detect android malware using machine learning 1-gen-2018 Shen, J.; Chen, Z.; Wang, S.; Zhu, Y.; Hassan, M. U.
Devils in the clouds: an evolutionary study of telnet bot loaders 1-gen-2023 Zhu, Y.; Chen, Z.; Yan, Q.; Wang, S.; Giaretta, A.; Li, E.; Peng, L.; Zhao, C.; Conti, M.
Cybersecurity education showdown: a comparative analysis of K-12 education systems in the United States, the European Union and China 1-gen-2025 Fernandez Nieto, Berenice; Romanini, Daisy; Zhu, Yuhui
IoT botnet detection framework from network behavior based on extreme learning machine 1-gen-2022 Hasan, Nasimul; Chen, Zhenxiang; Zhao, Chuan; Zhu, Yuhui; Liu, Cong
Behind the (Digital Crime) Scenes: An MSC Model 1-gen-2024 Raciti, M.; Bella, G.
To See or Not to See: A Privacy Threat Model for Digital Forensics in Crime Investigation 1-gen-2025 Raciti, M.; Di Mauro, S.; Van Landuyt, D.; Bella, G.
Modelling the privacy landscape of the Internet of Vehicles 1-gen-2024 Cacciato, Ruben; Raciti, Mario; Esposito, Sergio; Bella, Giampaolo
Capillary Static Policy Setup and Multisensory Dynamic Feedback in Modern Cars 1-gen-2025 Bella, Giampaolo; Esposito, Sergio; Giuseppe Mangano, Mirko; Raciti, Mario
I “Dialogues sur l’art & la science” di Paul Richer tra arte, scienza e letteratura 1-gen-2021 Plaitano, Greta
Archivi fotografici per le belle arti: il caso dell’Accademia di Brera. Tracce e percorsi per valorizzare un patrimonio dimenticato 1-gen-2023 Plaitano, Greta
Entrepreneurship and compassion training in prisons: toward a holistic model for rehabilitation 1-gen-2025 Mori, Angelica; Marzi, Giacomo; Di Guida, Sibilla; Vismara, Silvio
Managing feature overload in new product development: a model for evaluation and reduction 1-gen-2025 Tedeschi, Silvia; Marzi, Giacomo; Chiarello, Filippo
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 1 a 20 di 1.128
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile

Scopri
Tipologia
  • 4 Contributo in Atti di Convegno ...1128
Autore
  • BEMPORAD, ALBERTO224
  • PIETRINI, PIETRO92
  • RICCIARDI, EMILIANO82
  • TRIBASTONE, MIRCO75
  • PAGGI, MARCO66
  • GALLETTA, LETTERIO47
  • Zanon, Mario46
  • Marzi, Giacomo41
  • Bernardi, Giulio36
  • GNECCO, GIORGIO STEFANO33
Data di pubblicazione
  • In corso di stampa2
  • 2020 - 2025250
  • 2010 - 2019567
  • 2000 - 2009266
  • 1990 - 199937
  • 1988 - 19896
Editore
  • IEEE104
  • Springer56
  • Institute of Electrical and Elect...34
  • Elsevier33
  • Association for Computing Machinery20
  • Springer Verlag17
  • IEEE Computer Society15
  • EURAM11
  • Springer Science and Business Med...10
  • Association for Computing Machine...8
Rivista
  • NEUROIMAGE25
  • LECTURE NOTES IN COMPUTER SCIENCE17
  • ELECTRONIC PROCEEDINGS IN THEORET...9
  • LECTURE NOTES IN COMPUTER SCIENCE6
  • SLEEP6
  • ENERGY PROCEDIA5
  • PROCEEDINGS OF THE IEEE CONFERENC...5
  • CEUR WORKSHOP PROCEEDINGS4
  • JOURNAL OF SLEEP RESEARCH4
  • LECTURE NOTES IN APPLIED AND COMP...3
Serie
  • LECTURE NOTES IN COMPUTER SCIENCE50
  • IFAC-PAPERSONLINE22
  • PROCEEDINGS OF THE IEEE CONFERENC...21
  • CEUR WORKSHOP PROCEEDINGS12
  • PROCEEDINGS OF THE ... IEEE CONFE...11
  • EUROPEAN CONTROL CONFERENCE8
  • LECTURE NOTES OF THE INSTITUTE FO...7
  • COMMUNICATIONS IN COMPUTER AND IN...6
  • PROCEEDINGS OF THE AMERICAN CONTR...6
  • COMPUTER-AIDED CHEMICAL ENGINEERING5
Keyword
  • Games7
  • security7
  • Machine learning6
  • Security6
  • Uncertainty6
  • Model predictive control5
  • Nash equilibrium5
  • Optimization5
  • Software5
  • Boundary element method4
Lingua
  • eng817
  • ita99
  • und80
  • por6
  • spa4
  • fre1
Accesso al fulltext
  • no fulltext676
  • reserved297
  • open123
  • partially open32