Il captatore informatico: potenzialità investigative e pericoli per la riservatezza, carenze normative e prospettive di riforma. Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 10:25
Handling Memory Intensive Operations in Symbolic Execution Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 10:24
Understanding evasive behaviour in malicious software Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 10:24
SmartDefense: Models, Algorithms and Mechanisms for Reducing Cyber Risks in Smart Industry Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 10:21
Inferring cyberattacks from quantum correlations over installed optical fiber networks Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 10:17
Nuovi modelli di Representation Learning per funzioni binarie Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 10:08
Dal Dark Web a Reddit, identificare account multipli di un utente tramite silometria ed orario dei post. Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 10:04
Robust memory forensics for vendor-specific Android distributions Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 10:02
PRIvacy-preserving, Security, and MAchine-learning techniques for healthcare applications (PRISMA) Submitted by Anonimo (not verified) on Tue, 19/04/2022 - 07:41