Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 62
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
Recommendations from the COST action CA17116 (SPRINT) for the standardization of perinatal derivative preparation and in vitro testing 2023 Di Pietro R.Pozzobon M. + FRONTIERS IN BIOENGINEERING AND BIOTECHNOLOGY - -
Shedding light on typical species: Implications for habitat monitoring 2021 Di Pietro R.Villani M. + PLANT SOCIOLOGY - -
A Survey on Computational Propaganda Detection 2020 Da San Martino, GiovanniDi Pietro, Roberto + - - Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI-20}
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware 2016 DI PIETRO, ROBERTO IEEE TRANSACTIONS ON MOBILE COMPUTING - -
CURE-Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments 2016 DI PIETRO, ROBERTO + COMPUTER COMMUNICATIONS - -
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2016 DI PIETRO, ROBERTO + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel 2016 DI PIETRO, ROBERTO + COMPUTER NETWORKS - -
DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection 2016 DI PIETRO, ROBERTO + IEEE INTELLIGENT SYSTEMS - -
To Docker or Not to Docker: A Security Perspective 2016 DI PIETRO, ROBERTO + IEEE CLOUD COMPUTING - -
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution 2016 DI PIETRO, ROBERTO + COMPUTER COMMUNICATIONS - -
CUDA leaks: A detailed hack for CUDA and a (Partial) fix 2016 DI PIETRO, ROBERTO + ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS - -
EXPEDITE: EXPress closED ITemset Enumeration 2015 DI PIETRO, ROBERTO + EXPERT SYSTEMS WITH APPLICATIONS - -
Fame for sale: Efficient detection of fake Twitter followers 2015 DI PIETRO, ROBERTO + DECISION SUPPORT SYSTEMS - -
The impact of GPU-assisted malware on memory forensics: A case study 2015 DI PIETRO, ROBERTO + DIGITAL INVESTIGATION - -
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 2015 DI PIETRO, ROBERTO + FUTURE GENERATION COMPUTER SYSTEMS - -
ESC: An efficient, scalable, and crypto-less solution to secure wireless networks 2015 DI PIETRO, ROBERTO + COMPUTER NETWORKS - -
Silence is golden: Exploiting jamming and radio Silence to communicate 2015 DI PIETRO, ROBERTO + ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY - -
Privacy for LBSs: On Using a Footprint model to face the enemy 2014 CONTI, MAURODI PIETRO, ROBERTO + - STUDIES IN COMPUTATIONAL INTELLIGENCE Advanced Research in Data Privacy
Smart Health: A Context-Aware Health Paradigm within Smart Cities. 2014 CONTI, MAURODI PIETRO, ROBERTO + IEEE COMMUNICATIONS MAGAZINE - -
Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs 2014 CONTI, MAURODI PIETRO, ROBERTO + JOURNAL OF COMPUTER AND SYSTEM SCIENCES - -
Mostrati risultati da 1 a 20 di 62
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile