Search
Now showing items 1-10 of 241
Statistical models for the characterization, identification and mitigation of distributed attacks in data networks
(2018-03-09)
The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks.
When dealing with distributed network attacks (and, more in general, with cyber-security problems), three
fundamental ...
Cognitive Models and Computational Approaches for improving Situation Awareness Systems
(2018-03-08)
The world of Internet of Things is pervaded by complex environments
with smart services available every time and everywhere. In
such a context, a serious open issue is the capability of information
systems to support ...
Model Checking Cyber-Physical Systems
(2019-03-12)
Cyber-Physical Systems (CPSs) are integrations of computation with physical
processes. Applications of CPS arguably have the potential to overshadow the
20-th century IT revolution. Nowadays, CPSs application to many sectors ...
Methods and algorithms for power devices losses behavioral modeling
(2017-08-07)
Power electronics is since decades in the focus of very important technology innovations, as the
characteristics and the performances of power supplies can severely condition and limit the performances
of the system to be ...
Round and computational efficiency of two-party protocols
(2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it is ...
Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority
(2019-03-07)
The following doctoral thesis comprises two distinct sections, both describing a
specific applied research concerning the macro-theme of computer security. The
first section describes a proposal for the improvement and ...
Cyber security and ubiquity: an human-centric approach
(2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
Fuzzy models for group decision making and applications to e-learning and recommender systems
(2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models
for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences
expression and aggregation. In particular ...
Methods and algorithms for behavioral modeling of ferrite power inductors
(2019-03-12)
Information technology allows solving numerous problems regarding all the
aspects of everyday life, including technical activities related to the design
of devices and systems. In the electronic eld, di erent types of ...
High thermal conductivity catalysts for the CO-WGS process intensification
(2016-04-27)
Today, the increasingly serious lack of resources and the obsolescence of the plants present on the whole planet led to develop new ways that go beyond “traditional” chemical engineering. The research is now focusing on ...