• English
    • italiano
  • English 
    • English
    • italiano
  • Login
Search 
  •   DSpace Home
  • Search
  •   DSpace Home
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 21-40 of 81

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Network anaomaly detection based on the observation of multi-scale traffic dynamics 

Palmieri, Francesco (2012-03-03)
Con la sempre più rapida crescita in termini di dimensioni e complessità delle moderne infrastrutture di rete, l’attività di individuazione e prevenzione di abusi e violazioni nell’uso di tali infrastrutture sta diventando ...
Thumbnail

Teamwork collaboration around CAE models in an industrial context 

Gargiulo, Claudio (2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ...
Thumbnail

A framework to access risks and derive requirements for a complex systems 

Vozella, Angela (2014-04-22)
This thesis provides an innovative framework, based on the risk assessment methodology, to support the design of a pioneering complex systems, strongly ICT based, whose failures could threaten people, environment and society ...
Thumbnail

On the evolution of digital evidence: novel approaches for cyber investigation 

De Maio, Giancarlo (2014-04-23)
Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to access it. We develop relationships on social networks and entrust sensitive documents to online services. Desktop applications are being ...
Thumbnail

Secure End-to-End Communications in Mobile Networks 

Petagna, Fabio (2011-05-06)
Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and ...
Thumbnail

New methods, techniques and applications for sketch recognition 

De Rosa, Mattia (2014-04-24)
The use of diagrams is common in various disciplines. Typical examples include maps, line graphs, bar charts, engineering blueprints, architects’ sketches, hand drawn schematics, etc.. In general, diagrams can be created either ...
Thumbnail

Empowering computational science through extreme scalability 

D'Auria, Matteo (2021-05-24)
Computational science is an ever-expanding research eld. It combines tech- nologies, modern computational methods, and simulations to address prob- lems too complex to be e ectively predicted by theory alone or too ...
Thumbnail

Methods and systems for context awareness in complex scenarios: the case of cultural heritage sites 

Lombardi, Marco (2021-06-30)
Context-Aware Computing describes the development of technologies and applications that can detect data from the surrounding environment and react accordingly with specific actions, reducing and simplifying the human-machine ...
Thumbnail

New Insights on cryptographic hierarchical access control: models, schemes and analysis 

Castiglione, Arcangelo (2016-05-24)
Nowadays the current network-centric world has given rise to several security concerns regarding the access control management, which ensures that only authorized users are given access to certain resources or tasks. In ...
Thumbnail

The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics 

Roscigno, Gianluca (2016-05-24)
The era of Big Data is leading the generation of large amounts of data, which require storage and analysis capabilities that can be only ad- dressed by distributed computing systems. To facilitate large-scale distributed ...
Thumbnail

The value of privacy: concerns, attitudes, behaviors online, and information protection measures 

Spinelli, Raffaele (2015-04-29)
Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly the way other people perceive us. One have to careful decide what to expose and what not. There are a lot of personal and sensitive ...
Thumbnail

Application of machine learning techniques to biological big data 

Auriemma Citarella, Alessia (2022-05-10)
To date, has been the primary driver of global innovation, compet- itiveness and cultural development. It is also a powerful engine for creating new job opportunities, expanding market segments and inspiring new horizons ...
Thumbnail

Soft Biometrics: Periocular Features and applications on Humanoid Social Robots 

Cascone, Lucia (2023-02-22)
The market for biometric technology continues to grow. Biomet rics is used in the real world in a wide variety of fields, from surveillance, health care, advertising, Human-Robot Interaction to security and trust. Interest ...
Thumbnail

Provable Security: the Good, the Bad, and the Ugly 

Avitabile, Gennaro (2023-03-15)
Since modern cryptography was born around the late 1970s, a myriad of cryptographic constructions and protocols have been proposed. The field quickly developed into a science whose results have had great im pact on people’s ...
Thumbnail

Outreach in Computing Education: a Design Toolkit 

Addone, Agnese (2023-07-04)
In our society, learners face the constantly growing world evolution, its technological progress and the big questions that innovations spark. The increasing demand of computing competences reflects the spread of targeted ...
Thumbnail

Data Integration and Automatic Text Summarization: A path to more informed Business Decisions 

Barbella, Marcello (2023-04-12)
In recent years, there has been an explosion of data shared online. The majority of this internet information is in text format, and can be used as a source to create new knowledge. These data are frequently unstructured ...
Thumbnail

The use of Artificial Intelligence for the Melanoma Binary Classification Problem on images (MIBCP) 

Di Biasi, Luigi (2023-04-13)
The healthcare industry plays a critical role in saving lives ev ery day. As a result, researchers, physicians, and experts are constantly working to find new ways to address illnesses and dis abilities. In addition, ...
Thumbnail

Metodi matematici e tecnologie per la trasformazione digitale e le tokenizzazioni 

Rapuano, Antonio (2023-03-08)
This work has a two-fold objective, achieved through two lines of research. The first, purely industrial, focuses on the technical-scientific difficulties related to collecting, tokenizing, and producing value from ...
Thumbnail

Intelligent technologies for threat detection in networks security scenarios 

Robustelli, Antonio (2023-06-08)
The advent of the Internet of Things (IoT), with the consequent changes in network architectures and communication dynamics, has strongly conditioned the security market by radically shifting traditional per- ceptions of ...
Thumbnail

Behavioral Biometrics in the Era of Artificial Intelligence 

Pero, Chiara (2023-02-22)
Biometric technologies have historically been explored as Pattern Recognition systems. Over the past three decades, biometric- based human recognition systems have significantly changed and improved. Applications in ...
  • 1
  • 2
  • 3
  • 4
  • 5
EleA themes by Ugsiba
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy Submit Date

My Account

LoginRegister

Discover

AuthorAddone, Agnese (1)Antelmi, Alessia (1)Auriemma Citarella, Alessia (1)Avitabile, Gennaro (1)Barbella, Marcello (1)Barra, Paola (1)Bisogni, Carmen (1)Breve, Bernardo (1)Capo, Alessandro (1)Capuano, Nicola (1)... View MoreSubject
INF/01 INFORMATICA (81)
Machine learning (3)Privacy (3)Collaboration (2)Cryptography (2)Deep learning (2)Information visualization (2)Proof system (2)Semantic web (2)Situation awareness (2)... View MoreDate Issued2020 - 2023 (29)2011 - 2019 (52)Has File(s)Yes (81)
EleA themes by Ugsiba