Browsing Informatica by Title
Now showing items 27-41 of 41
-
Network anaomaly detection based on the observation of multi-scale traffic dynamics
(Universita degli studi di Salerno, 2012-03-03)Con la sempre più rapida crescita in termini di dimensioni e complessità delle moderne infrastrutture di rete, l’attività di individuazione e prevenzione di abusi e violazioni nell’uso di tali infrastrutture sta diventando ... -
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(Universita degli studi di Salerno, 2016-05-24)Nowadays the current network-centric world has given rise to several security concerns regarding the access control management, which en- sures that only authorized users are given access to certain resources or tasks. ... -
New methods, techniques and applications for sketch recognition
(Universita degli studi di Salerno, 2014-04-24)The use of diagrams is common in various disciplines. Typical examples include maps, line graphs, bar charts, engineering blueprints, architects’ sketches, hand drawn schematics, etc.. In general, diagrams can be ... -
On the evolution of digital evidence: novel approaches for cyber investigation
(Universita degli studi di Salerno, 2014-04-23)Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to access it. We develop relationships on social networks and entrust sensitive documents to online services. Desktop applications are being ... -
On the verification of parametric and real-time systems
(Universita degli studi di Salerno, 2011-05-06)Parametric and Real-Time Systems play a central role in the theory underlying the Verification and Synthesis problems. Real-time systems are present everywhere and are used in safety critical applications, such as flight ... -
Predicate encryption systems. No query left unanswered
(Universita degli studi di Salerno, 2011-05-09)Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ... -
Quality and Privacy-aware (Linked) Open Data Exploitation
(Universita degli studi di Salerno, 2022-04-26)Data are the new oil and it is widely recognised the role of publishing them as Open Data to let data consumers freely access and exploit them. Data providers are not only encouraged to publish data but to ensure that ... -
Secure End-to-End Communications in Mobile Networks
(Universita degli studi di Salerno, 2011-05-06)Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and ... -
Security and Privacy Concerns within Smart Environments: User-Centered Approaches for Defining Secure Trigger-Action Programs
(Universita degli studi di Salerno, 2023-06-13)The advent of the Internet of Things (IoT) paradigm has launched a new world of opportunities, bringing with it a new understand ing of objects and technology that, today, is all around us. In fact, especially in domestic ... -
Synthesis of recursive state machines from libraries of game modules
(Universita degli studi di Salerno, 2016-05-18)This thesis is focused on synthesis. In formal veri cation synthesis can be referred to the controller synthesis and the system synthesis. This work combines both this area of research. First we focus on synthesizing ... -
Teamwork collaboration around simulation data in an industrial context
(Universita degli studi di Salerno, 2015-04-27)Nowadays even more small, medium and large enterprises are world-wide and com- pete on a global market. In order to face the new challenges, industries have multiple co-located and geographically dispersed teams that ... -
Technical Debt in Software Development: A Multi-Perspective Investigation
(Universita degli studi di Salerno, 2022-03-25)I prodotti software devono essere costantemente manutenuti e aggiornati per sopravvivere e continuare a soddisfare le esigenze di aziende e utenti. Agli sviluppatori viene spesso richiesto di eseguire attività di ... -
The Influence of User Interface Design on User Experience - Focus on Accessibility and Situation Awareness
(Universita degli studi di Salerno, 2021-11-26)User expectations, motivations, and feelings when using a system have prompted the need to investigate beyond traditional usability issues by evaluating and designing for the user experience. User eXperience (UX), therefore, ... -
The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics
(Universita degli studi di Salerno, 2016-05-24)The era of Big Data is leading the generation of large amounts of data, which require storage and analysis capabilities that can be only ad- dressed by distributed computing systems. To facilitate large-scale distributed ... -
The value of privacy: concerns, attitudes, behaviors online, and information protection measures
(Universita degli studi di Salerno, 2015-04-29)Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly the way other people perceive us. One have to careful decide what to expose and what not. There are a lot of personal and ...