Cerca
Items 181-190 di 198
Malevolent Activities Detection and Cyber Range Scenarios Orchestration
(2018-06-08)
increasing availability of Internet accessible services driven by the di usion of
connected devices. The consequent exposition to cyber-threats demands for
suitable methodologies, techniques and tools allowing to adequately ...
Protocol Architectures for wireless networks: issues, perspectives and enhancements
(2012-11-09)
In this work we have analyzed different types of wireless networks and we have
investigated the behavior of different MAC and routing protocols and different
protocol architectures. Specifically, we have analyzed a TDMA ...
Emering problems in influence propagation and maximization
(Università della Calabria, 2021-05-10)
In the last two decades we witnessed the advent and the rapid growth of online social
networks (OSNs). The impact of their pervasive diffusion on everyday life has been
dramatic. In fact, social networks changed the way ...
Study characterization of modern 4h-sic power mosfetsF
(Università della Calabria, 2021-05-05)
Progettazione di circuiti a bassissima potenza e tensione per System on Chip energicamente autonomi
(Università della Calabria, 2021-05-15)
Ultra-low power/voltage (ULP/ULV) circuits (both analog and digital blocks) have been gaining considerable interest from the scientific community in the last few years. The advent of the Internet of Things (IoT) era has ...