Search
Now showing items 1-10 of 26
Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms
(2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most
significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is
essentially composed by a large number of electronic ...
Statistical models for the characterization, identification and mitigation of distributed attacks in data networks
(2018-03-09)
The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks.
When dealing with distributed network attacks (and, more in general, with cyber-security problems), three
fundamental ...
Dynamic Programming for Optimal Planning and Control of Redundant Robot Manipulators
(2020-06-16)
Kinematically redundant robots possess more degrees of freedom
than those strictly required to execute a given task. Such a charac-
teristic gives the system a higher degree of dexterity and mobility
that can be exploited ...
Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority
(2019-03-07)
The following doctoral thesis comprises two distinct sections, both describing a
specific applied research concerning the macro-theme of computer security. The
first section describes a proposal for the improvement and ...
Methods and algorithms for power devices losses behavioral modeling
(2017-08-07)
Power electronics is since decades in the focus of very important technology innovations, as the
characteristics and the performances of power supplies can severely condition and limit the performances
of the system to be ...
Biometric system in homeland security context
(2021-06-20)
The mission of homeland security is ensuring the safety of living communities and protecting
citizens from unforeseen events. In this research field, intelligent and advanced systems are
extremely useful to prevent from ...
Round and computational efficiency of two-party protocols
(2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it is ...
On Provable Security of Entity Authentication Schemes
(2019-03-06)
Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
Building functional neuromarkers from resting state fMRI to describe physiopathological traits
(2018-03-02)
The overarching goal of this work has been that of devising novel methods
for building functional neuromarkers from resting-state fMRI data to describe
healthy and pathological human behaviour. Observing spontaneous ...
An Auction-based Approach to Control Automated Warehouses using Smart Vehicles
(2020-02-14)
In the field of logistics, the study of systems that follow the recommended requirements of the ``Industry 4.0'' is now of paramount importance. Since traditional hierarchical and centralized control architectures have ...