Now showing items 1-6 of 6
Statistical models for the characterization, identification and mitigation of distributed attacks in data networks
(Universita degli studi di Salerno, 2018-03-09)
The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental ...
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(Universita degli studi di Salerno, 2018-03-12)
A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
Fuzzy models for group decision making and applications to e-learning and recommender systems
(Universita degli studi di Salerno, 2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences expression and aggregation. In ...
Building functional neuromarkers from resting state fMRI to describe physiopathological traits
(Universita degli studi di Salerno, 2018-03-02)
The overarching goal of this work has been that of devising novel methods for building functional neuromarkers from resting-state fMRI data to describe healthy and pathological human behaviour. Observing spontaneous ...
Real-time face analysis for gender recognition on video sequences
(Universita degli studi di Salerno, 2018-03-05)
This research work has been produced with the aim of performing gender recognition in real-time on face images extracted from real video sequences. The task may appear easy for a human, but it is not so simple for a computer ...