4.1 Contributo in Atti di convegno: [1069] Home page tipologia

Sfoglia
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 301 a 320 di 1.069
Titolo Data di pubblicazione Autore(i) File
Combined Vertical and Horizontal Autoscaling Through Model Predictive Control 1-gen-2018 Incerto, E.; Tribastone, M.; Trubiani, C.
Learning queuing networks by recurrent neural networks 1-gen-2020 Garbi, G.; Incerto, E.; Tribastone, M.
A NERD DOGMA: Introducing CTF to Non-Expert Audience 1-gen-2020 Costa, Gabriele; Lualdi, Martina; Ribaudo, Marina; Valenza, Andrea
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners 1-gen-2020 Valenza, Andrea; Costa, Gabriele; Armando, Alessandro
When the Great King Encounters White Marble: A Material Perspective on Western Anatolia 1-gen-2021 Poggio, Alessandro
NF-FF transformation for emissions and security 1-gen-2014 Soderi, S.; Papini, M.; Iinatti, J.; Hamalainen, M.
Emulation of secure Wi-Fi communication: A performance gap analysis against a virtual test-bed 1-gen-2013 Soderi, S.; Viittala, H.; Saloranta, J.; Mancini, A.; Hamalainen, M.; Iinatti, J.
Watermark-based secure communications in safety-related scenarios 1-gen-2016 Soderi, S.; Mucchi, L.; Hamalainen, M.; Piva, A.; Iinatti, J.
Evaluation of WiFi for kart racing monitoring 1-gen-2014 Viittala, H.; Hamalainen, M.; Iinatti, J.; Soderi, S.
Signal fingerprinting in cognitive wireless networks 1-gen-2014 Soderi, S.; Dainelli, G.; Iinatti, J.; Hamalainen, M.
Performance and security evaluation of intra-vehicular communication architecture 1-gen-2016 Liyanage, M.; Kumar, P.; Soderi, S.; Ylianttila, M.; Gurtov, A.
Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-Rate Sensor 1-gen-2019 Soderi, S.
Enhancing security in 6G visible light communications 1-gen-2020 Soderi, S.
Cybersecurity considerations for Communication Based Train Control 1-gen-2016 Soderi, Simone; Hamalainen, Matti; Iinatti, Jari
CLPDI algorithm in UWB synchronization 1-gen-2003 Soderi, Simone; Iinatti, Jari; Hamalainen, Matti
An experimental evaluation of WiFi-based vehicle-to-vehicle (V2V) communication in a tunnel 1-gen-2013 Viittala, H.; Soderi, S.; Saloranta, J.; Hamalainen, M.; Iinatti, J.
Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario 1-gen-2013 Soderi, S.; Viittala, H.; Saloranta, J.; Hamalainen, M.; Iinatti, J.; Gurtov, A.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel 1-gen-2020 Soderi, Simone
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols 1-gen-2020 Sinigaglia, F.; Carbone, R.; Costa, G.; Ranise, S.
WAF-A-MoLE: Evading web application firewalls through adversarial machine learning 1-gen-2020 Demetrio, L.; Valenza, A.; Costa, G.; Lagorio, G.
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 301 a 320 di 1.069
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile

Scopri
Tipologia
  • 4 Contributo in Atti di Convegno ...1069
Autore
  • BEMPORAD, ALBERTO224
  • PIETRINI, PIETRO92
  • RICCIARDI, EMILIANO82
  • TRIBASTONE, MIRCO74
  • PAGGI, MARCO66
  • GALLETTA, LETTERIO47
  • Zanon, Mario46
  • Bernardi, Giulio36
  • Marzi, Giacomo36
  • COSTA, GABRIELE31
Data di pubblicazione
  • In corso di stampa2
  • 2020 - 2025197
  • 2010 - 2019561
  • 2000 - 2009266
  • 1990 - 199937
  • 1988 - 19896
Editore
  • IEEE101
  • Springer52
  • Institute of Electrical and Elect...34
  • Elsevier33
  • Association for Computing Machinery17
  • Springer Verlag17
  • IEEE Computer Society14
  • EURAM11
  • CEUR-WS8
  • Elsevier B.V.7
Rivista
  • NEUROIMAGE25
  • LECTURE NOTES IN COMPUTER SCIENCE17
  • ELECTRONIC PROCEEDINGS IN THEORET...9
  • LECTURE NOTES IN COMPUTER SCIENCE6
  • SLEEP6
  • ENERGY PROCEDIA5
  • PROCEEDINGS OF THE IEEE CONFERENC...5
  • CEUR WORKSHOP PROCEEDINGS4
  • JOURNAL OF SLEEP RESEARCH4
  • LECTURE NOTES IN APPLIED AND COMP...3
Serie
  • LECTURE NOTES IN COMPUTER SCIENCE41
  • IFAC-PAPERSONLINE22
  • PROCEEDINGS OF THE IEEE CONFERENC...21
  • PROCEEDINGS OF THE ... IEEE CONFE...11
  • CEUR WORKSHOP PROCEEDINGS9
  • EUROPEAN CONTROL CONFERENCE8
  • PROCEEDINGS OF THE AMERICAN CONTR...6
  • COMMUNICATIONS IN COMPUTER AND IN...5
  • COMPUTER-AIDED CHEMICAL ENGINEERING5
  • LECTURE NOTES OF THE INSTITUTE FO...5
Keyword
  • Games7
  • security7
  • Security6
  • Uncertainty6
  • Model predictive control5
  • Nash equilibrium5
  • Software5
  • Boundary element method4
  • Computer Science (all)4
  • Electron tubes4
Lingua
  • eng765
  • ita94
  • und80
  • por6
  • spa4
  • fre1
Accesso al fulltext
  • no fulltext670
  • reserved268
  • open103
  • partially open28