4.1 Contributo in Atti di convegno: [1129] Home page tipologia

Sfoglia
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 361 a 380 di 1.129
Titolo Data di pubblicazione Autore(i) File
Combined Vertical and Horizontal Autoscaling Through Model Predictive Control 1-gen-2018 Incerto, E.; Tribastone, M.; Trubiani, C.
Learning queuing networks by recurrent neural networks 1-gen-2020 Garbi, G.; Incerto, E.; Tribastone, M.
A NERD DOGMA: Introducing CTF to Non-Expert Audience 1-gen-2020 Costa, Gabriele; Lualdi, Martina; Ribaudo, Marina; Valenza, Andrea
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners 1-gen-2020 Valenza, Andrea; Costa, Gabriele; Armando, Alessandro
When the Great King Encounters White Marble: A Material Perspective on Western Anatolia 1-gen-2021 Poggio, Alessandro
NF-FF transformation for emissions and security 1-gen-2014 Soderi, S.; Papini, M.; Iinatti, J.; Hamalainen, M.
Emulation of secure Wi-Fi communication: A performance gap analysis against a virtual test-bed 1-gen-2013 Soderi, S.; Viittala, H.; Saloranta, J.; Mancini, A.; Hamalainen, M.; Iinatti, J.
Watermark-based secure communications in safety-related scenarios 1-gen-2016 Soderi, S.; Mucchi, L.; Hamalainen, M.; Piva, A.; Iinatti, J.
Evaluation of WiFi for kart racing monitoring 1-gen-2014 Viittala, H.; Hamalainen, M.; Iinatti, J.; Soderi, S.
Signal fingerprinting in cognitive wireless networks 1-gen-2014 Soderi, S.; Dainelli, G.; Iinatti, J.; Hamalainen, M.
Performance and security evaluation of intra-vehicular communication architecture 1-gen-2016 Liyanage, M.; Kumar, P.; Soderi, S.; Ylianttila, M.; Gurtov, A.
Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-Rate Sensor 1-gen-2019 Soderi, S.
Enhancing security in 6G visible light communications 1-gen-2020 Soderi, S.
Cybersecurity considerations for Communication Based Train Control 1-gen-2016 Soderi, Simone; Hamalainen, Matti; Iinatti, Jari
CLPDI algorithm in UWB synchronization 1-gen-2003 Soderi, Simone; Iinatti, Jari; Hamalainen, Matti
An experimental evaluation of WiFi-based vehicle-to-vehicle (V2V) communication in a tunnel 1-gen-2013 Viittala, H.; Soderi, S.; Saloranta, J.; Hamalainen, M.; Iinatti, J.
Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario 1-gen-2013 Soderi, S.; Viittala, H.; Saloranta, J.; Hamalainen, M.; Iinatti, J.; Gurtov, A.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel 1-gen-2020 Soderi, Simone
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols 1-gen-2020 Sinigaglia, F.; Carbone, R.; Costa, G.; Ranise, S.
WAF-A-MoLE: Evading web application firewalls through adversarial machine learning 1-gen-2020 Demetrio, L.; Valenza, A.; Costa, G.; Lagorio, G.
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 361 a 380 di 1.129
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile

Scopri
Tipologia
  • 4 Contributo in Atti di Convegno ...1129
Autore
  • BEMPORAD, ALBERTO224
  • PIETRINI, PIETRO92
  • RICCIARDI, EMILIANO82
  • TRIBASTONE, MIRCO75
  • PAGGI, MARCO66
  • GALLETTA, LETTERIO47
  • Zanon, Mario46
  • Marzi, Giacomo41
  • Bernardi, Giulio36
  • GNECCO, GIORGIO STEFANO33
Data di pubblicazione
  • In corso di stampa2
  • 2020 - 2025251
  • 2010 - 2019567
  • 2000 - 2009266
  • 1990 - 199937
  • 1988 - 19896
Editore
  • IEEE104
  • Springer57
  • Institute of Electrical and Elect...34
  • Elsevier33
  • Association for Computing Machinery20
  • Springer Verlag17
  • IEEE Computer Society15
  • EURAM11
  • Springer Science and Business Med...10
  • Association for Computing Machine...8
Rivista
  • NEUROIMAGE25
  • LECTURE NOTES IN COMPUTER SCIENCE17
  • ELECTRONIC PROCEEDINGS IN THEORET...9
  • LECTURE NOTES IN COMPUTER SCIENCE6
  • SLEEP6
  • ENERGY PROCEDIA5
  • PROCEEDINGS OF THE IEEE CONFERENC...5
  • CEUR WORKSHOP PROCEEDINGS4
  • JOURNAL OF SLEEP RESEARCH4
  • LECTURE NOTES IN APPLIED AND COMP...3
Serie
  • LECTURE NOTES IN COMPUTER SCIENCE50
  • IFAC-PAPERSONLINE22
  • PROCEEDINGS OF THE IEEE CONFERENC...21
  • CEUR WORKSHOP PROCEEDINGS12
  • PROCEEDINGS OF THE ... IEEE CONFE...11
  • EUROPEAN CONTROL CONFERENCE8
  • LECTURE NOTES OF THE INSTITUTE FO...7
  • COMMUNICATIONS IN COMPUTER AND IN...6
  • PROCEEDINGS OF THE AMERICAN CONTR...6
  • COMPUTER-AIDED CHEMICAL ENGINEERING5
Keyword
  • Games7
  • security7
  • Machine learning6
  • Security6
  • Uncertainty6
  • Model predictive control5
  • Nash equilibrium5
  • Optimization5
  • Software5
  • Boundary element method4
Lingua
  • eng818
  • ita99
  • und80
  • por6
  • spa4
  • fre1
Accesso al fulltext
  • no fulltext677
  • reserved297
  • open123
  • partially open32