Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 9 di 9
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks 2022 Li Q.Conti M. + JOURNAL OF INFORMATION SECURITY AND APPLICATIONS - -
The online identity detection via keyboard dynamics 2019 Monaro M.Spolaor R.Li Q. Q.Conti M.Gamberini L.Sartori G. + - ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING Advances in Intelligent Systems and Computing
Human-Computer Interaction: Security Aspects 2018 Li, QianQian - - -
Covert lie detection using keyboard dynamics 2018 Monaro, MerylinGalante, ChiaraSpolaor, RiccardoLi, QianQianGamberini, LucianoConti, MauroSartori, Giuseppe SCIENTIFIC REPORTS - -
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis 2018 CONTI, MAUROLI, QIANQIANSPOLAOR, RICCARDO + IEEE COMMUNICATIONS SURVEYS AND TUTORIALS - -
GolfEngine: Network management system for software defined networking 2017 Li Q.Conti M. + - - Proceedings - 2017 IEEE 13th International Conference on Intelligent Computer Communication and Processing, ICCP 2017
EnergIoT: A solution to improve network lifetime of IoT devices 2017 Li, QianQianGochhayat, Sarada PrasadConti, Mauro + PERVASIVE AND MOBILE COMPUTING - -
Biometric Authentication Methods on Smartphones: a Survey. 2016 SPOLAOR, RICCARDOLI, QIANQIANMONARO, MERYLINCONTI, MAUROGAMBERINI, LUCIANOSARTORI, GIUSEPPE PSYCHNOLOGY - -
Brain-Computer Interface Applications: Security and Privacy Challenges 2015 LI, QIANQIANCONTI, MAURO + - - Proceedings of the 1st IEEE Workshop on Security and Privacy in Cybermatics (IEEE CNS 2015 workshop: SPiCy 2015)
Mostrati risultati da 1 a 9 di 9
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile