Cerca
Items 1-8 di 8
Anomalies in cyber security: detection, prevention and simulation approaches
(2018-07-03)
With themassive adoption of the Internet both our private andworking life has drastically
changed. The Internet has introduced new ways to communicate and complete
every day tasks. Organisations of any kind have taken ...
Global Optimization, Ordinary Differential Equations and Infinity Computing
(2018-06-08)
La tesi consiste in 4 capitoli. I primi due capitoli riguardano l’ottimizzazione globale utilizzando il framework dei computer tradizionali, mentre gli altri due capitoli riguardano l’utilizzo della nuova tipologia dei ...
<<A>> methodology for the development of autonomic and cognitive internet of things ecosystems
(2018-06-08)
Advancements on microelectromechanical systems, embedded technologies,
and wireless communications have recently enabled the evolution of conven-
tional everyday things in enhanced entities, commonly de ned Smart ...
Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing
(2018-08-06)
Commodity operating systems, both on desktop and mobile devices, offer
rich functionality and consequently a significant attack surface. A compromise
of the operating system, however, means that an attacker also has
access ...
Gene expression as a digital communication system
(2018-02-02)
This PhD thesis extends upon the information theories of digital communication systems to analyse biological communications (nanocommunications) in order to accurately model biological communication as digital communication ...
Malevolent Activities Detection and Cyber Range Scenarios Orchestration
(2018-06-08)
increasing availability of Internet accessible services driven by the di usion of
connected devices. The consequent exposition to cyber-threats demands for
suitable methodologies, techniques and tools allowing to adequately ...