Cerca
Items 1-2 di 2
Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing
(2018-08-06)
Commodity operating systems, both on desktop and mobile devices, offer
rich functionality and consequently a significant attack surface. A compromise
of the operating system, however, means that an attacker also has
access ...
Malevolent Activities Detection and Cyber Range Scenarios Orchestration
(2018-06-08)
increasing availability of Internet accessible services driven by the di usion of
connected devices. The consequent exposition to cyber-threats demands for
suitable methodologies, techniques and tools allowing to adequately ...