Cerca
Items 21-30 di 81
Network anaomaly detection based on the observation of multi-scale traffic dynamics
(2012-03-03)
Con la sempre più rapida crescita in termini di dimensioni e complessità delle moderne
infrastrutture di rete, l’attività di individuazione e prevenzione di abusi e violazioni nell’uso di tali infrastrutture sta diventando ...
Teamwork collaboration around CAE models in an industrial context
(2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve
greater efficiency in their products/processes they are forced to globalize by opening
multiple locations in geographically distant places. ...
A framework to access risks and derive requirements for a complex systems
(2014-04-22)
This thesis provides an innovative framework, based on the risk assessment methodology, to support the design of a pioneering complex systems, strongly ICT based, whose failures could threaten people, environment and society ...
On the evolution of digital evidence: novel approaches for cyber investigation
(2014-04-23)
Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to
access it. We develop relationships on social networks and entrust sensitive documents to
online services. Desktop applications are being ...
Secure End-to-End Communications in Mobile Networks
(2011-05-06)
Cellular communication has become an important part of our daily life.
Besides using cell phones for voice communication, we are now able to access
the Internet, conduct monetary transactions, send voice, video and ...
New methods, techniques and applications for sketch recognition
(2014-04-24)
The use of diagrams is common in various disciplines. Typical examples
include maps, line graphs, bar charts, engineering blueprints, architects’
sketches, hand drawn schematics, etc.. In general, diagrams can be created
either ...
Empowering computational science through extreme scalability
(2021-05-24)
Computational science is an ever-expanding research eld. It combines tech-
nologies, modern computational methods, and simulations to address prob-
lems too complex to be e ectively predicted by theory alone or too ...
Methods and systems for context awareness in complex scenarios: the case of cultural heritage sites
(2021-06-30)
Context-Aware Computing describes the development of technologies and applications that can detect data from the surrounding environment and react accordingly with specific actions, reducing and simplifying the human-machine ...
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which ensures that only authorized users are given access to certain resources
or tasks. In ...
The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics
(2016-05-24)
The era of Big Data is leading the generation of large amounts of data,
which require storage and analysis capabilities that can be only ad-
dressed by distributed computing systems. To facilitate large-scale
distributed ...