Search
Now showing items 21-40 of 81
Network anaomaly detection based on the observation of multi-scale traffic dynamics
(2012-03-03)
Con la sempre più rapida crescita in termini di dimensioni e complessità delle moderne
infrastrutture di rete, l’attività di individuazione e prevenzione di abusi e violazioni nell’uso di tali infrastrutture sta diventando ...
Teamwork collaboration around CAE models in an industrial context
(2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve
greater efficiency in their products/processes they are forced to globalize by opening
multiple locations in geographically distant places. ...
A framework to access risks and derive requirements for a complex systems
(2014-04-22)
This thesis provides an innovative framework, based on the risk assessment methodology, to support the design of a pioneering complex systems, strongly ICT based, whose failures could threaten people, environment and society ...
On the evolution of digital evidence: novel approaches for cyber investigation
(2014-04-23)
Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to
access it. We develop relationships on social networks and entrust sensitive documents to
online services. Desktop applications are being ...
Secure End-to-End Communications in Mobile Networks
(2011-05-06)
Cellular communication has become an important part of our daily life.
Besides using cell phones for voice communication, we are now able to access
the Internet, conduct monetary transactions, send voice, video and ...
New methods, techniques and applications for sketch recognition
(2014-04-24)
The use of diagrams is common in various disciplines. Typical examples
include maps, line graphs, bar charts, engineering blueprints, architects’
sketches, hand drawn schematics, etc.. In general, diagrams can be created
either ...
Empowering computational science through extreme scalability
(2021-05-24)
Computational science is an ever-expanding research eld. It combines tech-
nologies, modern computational methods, and simulations to address prob-
lems too complex to be e ectively predicted by theory alone or too ...
Methods and systems for context awareness in complex scenarios: the case of cultural heritage sites
(2021-06-30)
Context-Aware Computing describes the development of technologies and applications that can detect data from the surrounding environment and react accordingly with specific actions, reducing and simplifying the human-machine ...
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which ensures that only authorized users are given access to certain resources
or tasks. In ...
The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics
(2016-05-24)
The era of Big Data is leading the generation of large amounts of data,
which require storage and analysis capabilities that can be only ad-
dressed by distributed computing systems. To facilitate large-scale
distributed ...
The value of privacy: concerns, attitudes, behaviors online, and information protection measures
(2015-04-29)
Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly
the way other people perceive us. One have to careful decide what to expose
and what not. There are a lot of personal and sensitive ...
Application of machine learning techniques to biological big data
(2022-05-10)
To date, has been the primary driver of global innovation, compet-
itiveness and cultural development. It is also a powerful engine
for creating new job opportunities, expanding market segments
and inspiring new horizons ...
Soft Biometrics: Periocular Features and applications on Humanoid Social Robots
(2023-02-22)
The market for biometric technology continues to grow. Biomet rics is used in the real world in a wide variety of fields, from surveillance, health care, advertising, Human-Robot Interaction to security and trust. Interest ...
Provable Security: the Good, the Bad, and the Ugly
(2023-03-15)
Since modern cryptography was born around the late 1970s, a myriad of cryptographic constructions and protocols have been proposed. The field quickly developed into a science whose results have had great im pact on people’s ...
Outreach in Computing Education: a Design Toolkit
(2023-07-04)
In our society, learners face the constantly growing world evolution, its technological progress and the big questions that innovations spark. The increasing demand of computing competences reflects the spread of targeted ...
Data Integration and Automatic Text Summarization: A path to more informed Business Decisions
(2023-04-12)
In recent years, there has been an explosion of data shared online. The majority of this internet information is in text format, and can be used as a source to create new knowledge. These data are frequently unstructured ...
The use of Artificial Intelligence for the Melanoma Binary Classification Problem on images (MIBCP)
(2023-04-13)
The healthcare industry plays a critical role in saving lives ev ery day. As a result, researchers, physicians, and experts are constantly working to find new ways to address illnesses and dis abilities. In addition, ...
Metodi matematici e tecnologie per la trasformazione digitale e le tokenizzazioni
(2023-03-08)
This work has a two-fold objective, achieved through two lines of
research. The first, purely industrial, focuses on the technical-scientific
difficulties related to collecting, tokenizing, and producing value from ...
Intelligent technologies for threat detection in networks security scenarios
(2023-06-08)
The advent of the Internet of Things (IoT), with the consequent changes
in network architectures and communication dynamics, has strongly
conditioned the security market by radically shifting traditional per-
ceptions of ...
Behavioral Biometrics in the Era of Artificial Intelligence
(2023-02-22)
Biometric technologies have historically been explored as Pattern
Recognition systems. Over the past three decades, biometric-
based human recognition systems have significantly changed
and improved. Applications in ...