Cerca
Items 1-10 di 24
Cyber security and ubiquity: an human-centric approach
(Universita degli studi di Salerno, 2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
A neurocomputational model of reward-based motor learning
(Universita degli studi di Salerno, 2017-09-22)
The following thesis deals with computational models of nervous system employed in motor reinforcement learning. The novel contribution of this work is that it includes a methodology of experiments for evaluating learning ...
Real-time face analysis for gender recognition on video sequences
(Universita degli studi di Salerno, 2018-03-05)
This research work has been produced with the aim of performing gender recognition in real-time on face images extracted from real video sequences. The task may appear easy for a human, but it is not so simple for a computer ...
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it ...
Methods and algorithms for power devices losses behavioral modeling
(Universita degli studi di Salerno, 2017-08-07)
Power electronics is since decades in the focus of very important technology innovations, as the
characteristics and the performances of power supplies can severely condition and limit the performances
of the system to ...
Fuzzy models for group decision making and applications to e-learning and recommender systems
(Universita degli studi di Salerno, 2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models
for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences
expression and aggregation. In ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(Universita degli studi di Salerno, 2018-03-12)
A major goal in the design of cryptographic protocols is to re-
duce the number of communication rounds. Since a cryptographic
protocol usually consists of a composition and interplay of some
subprotocols and cryptographic ...
Teamwork collaboration around CAE models in an industrial context
(Universita degli studi di Salerno, 2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve
greater efficiency in their products/processes they are forced to globalize by opening
multiple locations in geographically distant places. ...
Statistical models for the characterization, identification and mitigation of distributed attacks in data networks
(Universita degli studi di Salerno, 2018-03-09)
The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks.
When dealing with distributed network attacks (and, more in general, with cyber-security problems), three
fundamental ...
Building functional neuromarkers from resting state fMRI to describe physiopathological traits
(Universita degli studi di Salerno, 2018-03-02)
The overarching goal of this work has been that of devising novel methods
for building functional neuromarkers from resting-state fMRI data to describe
healthy and pathological human behaviour. Observing spontaneous ...