Application of Machine Learning in Ransomware detection. Submitted by Anonimo (not verified) on Wed, 13/04/2022 - 12:16
SceneHash: A Content-Indexable Data Structure for Collaborative 3D Environments Submitted by Anonimo (not verified) on Wed, 13/04/2022 - 12:06
Developing and deploying a state-of-the-art system for Exemplification Modeling Submitted by Anonimo (not verified) on Mon, 11/04/2022 - 12:48
Spectre: still dangerous attack or opportunity to expand knowledge Submitted by Anonimo (not verified) on Mon, 11/04/2022 - 12:48
Sistemi innovativi di Green Wall: programmazione di uno strumento metodologico innovativo di carattere informatico e/o manualistico che sia di supporto alla progettazione di Green Walls, e realizzazione, servendosi di tale strumento, di un prototipo... Submitted by Anonimo (not verified) on Mon, 11/04/2022 - 12:48
End-to-End Simulation of Bluetooth Low Energy networks Submitted by Anonimo (not verified) on Mon, 11/04/2022 - 12:48
Protecting Software against Side-Channel and Transient-Execution Attacks Submitted by Anonimo (not verified) on Mon, 11/04/2022 - 12:48
Application of Generative Flows to improve password guessing attacks. Submitted by Anonimo (not verified) on Mon, 11/04/2022 - 12:48
Covert Communication Channels in Federated Learning; Their potential and risks. Submitted by Anonimo (not verified) on Mon, 11/04/2022 - 12:48