• English
    • italiano
  • italiano 
    • English
    • italiano
  • Login
Cerca 
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Informatica ed Ingegneria dell'Informazione
  • Cerca
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Informatica ed Ingegneria dell'Informazione
  • Cerca
JavaScript is disabled for your browser. Some features of this site may not work without it.

Cerca

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Items 1-10 di 26

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms 

Iossa, Antonio (2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is essentially composed by a large number of electronic ...
Thumbnail

Statistical models for the characterization, identification and mitigation of distributed attacks in data networks 

Di Mauro, Mario (2018-03-09)
The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental ...
Thumbnail

Dynamic Programming for Optimal Planning and Control of Redundant Robot Manipulators 

Ferrentino, Enrico (2020-06-16)
Kinematically redundant robots possess more degrees of freedom than those strictly required to execute a given task. Such a charac- teristic gives the system a higher degree of dexterity and mobility that can be exploited ...
Thumbnail

Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority 

Mannetta, Marco (2019-03-07)
The following doctoral thesis comprises two distinct sections, both describing a specific applied research concerning the macro-theme of computer security. The first section describes a proposal for the improvement and ...
Thumbnail

Methods and algorithms for power devices losses behavioral modeling 

Migliaro, Mario (2017-08-07)
Power electronics is since decades in the focus of very important technology innovations, as the characteristics and the performances of power supplies can severely condition and limit the performances of the system to be ...
Thumbnail

Biometric system in homeland security context 

Barra, Paola (2021-06-20)
The mission of homeland security is ensuring the safety of living communities and protecting citizens from unforeseen events. In this research field, intelligent and advanced systems are extremely useful to prevent from ...
Thumbnail

Round and computational efficiency of two-party protocols 

Ciampi, Michele (2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it is ...
Thumbnail

On Provable Security of Entity Authentication Schemes 

Flores, Manuela (2019-03-06)
Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ...
Thumbnail

Building functional neuromarkers from resting state fMRI to describe physiopathological traits 

Galdi, Paola (2018-03-02)
The overarching goal of this work has been that of devising novel methods for building functional neuromarkers from resting-state fMRI data to describe healthy and pathological human behaviour. Observing spontaneous ...
Thumbnail

An Auction-based Approach to Control Automated Warehouses using Smart Vehicles 

Di Marino, Emiliano (2020-02-14)
In the field of logistics, the study of systems that follow the recommended requirements of the ``Industry 4.0'' is now of paramount importance. Since traditional hierarchical and centralized control architectures have ...
  • 1
  • 2
  • 3
EleA themes by Ugsiba
 

 

Ricerca

Tutto DSpaceArchivi & CollezioniData di pubblicazioneAutoriTitoliSoggettiData di immissioneQuesta CollezioneData di pubblicazioneAutoriTitoliSoggettiData di immissione

My Account

LoginRegistrazione

Discover

AutoreBarra, Paola (1)Bisogni, Carmen (1)Capuano, Nicola (1)Cavaliere, Danilo (1)Ciampi, Michele (1)Colella, Antonio (1)D'Aniello, Giuseppe (1)D'Auria, Matteo (1)Desiato, Domenico (1)Di Marino, Emiliano (1)... View MoreSoggettoINF/01 INFORMATICA (14)ING-INF/04 AUTOMATICA (5)ING-INF/05 SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI (3)Cyber security (2)Distributed attacks (2)ING-INF/01 ELETTRONICA (2)Machine learning (2)Proof system (2)Signal processing for network security (2)Algorithms (1)... View MoreDate Issued2018 (7)2021 (7)2017 (4)2019 (4)2020 (3)2022 (1)Has File(s)Yes (26)
EleA themes by Ugsiba