Cerca
Items 1-4 di 4
Anomalies in cyber security: detection, prevention and simulation approaches
(2018-07-03)
With themassive adoption of the Internet both our private andworking life has drastically
changed. The Internet has introduced new ways to communicate and complete
every day tasks. Organisations of any kind have taken ...
Ensemble learning techniques for cyber security applications
(2017-07-13)
Cyber security involves protecting information and systems from major cyber threats;
frequently, some high-level techniques, such as for instance data mining techniques,
are be used to efficiently fight, alleviate the ...
Malevolent Activities Detection and Cyber Range Scenarios Orchestration
(2018-06-08)
increasing availability of Internet accessible services driven by the di usion of
connected devices. The consequent exposition to cyber-threats demands for
suitable methodologies, techniques and tools allowing to adequately ...