Zobrazeno 1 - 10
of 15 927
pro vyhledávání: '"Bertino"'
Autor:
Muir Tobian, Bertino Giulia, Groselj Ales, Ratnam Lakshmi, Kis Erika, Odili Joy, McCafferty Ian, Wohlgemuth Walter A, Cemazar Maja, Krt Aljosa, Bosnjak Masa, Zanasi Alessandro, Battista Michela, de Terlizzi Francesca, Campana Luca G, Sersa Gregor
Publikováno v:
Radiology and Oncology, Vol 57, Iss 2, Pp 141-149 (2023)
Biomedical applications of electroporation are expanding out of the field of oncology into vaccination, treatment of arrhythmias and now in the treatment of vascular malformations. Bleomycin is a widely used sclerosing agent in the treatment of vario
Externí odkaz:
https://doaj.org/article/ef0cfc6e4b3147cb856648045a632d26
Autor:
Katsis, Charalampos, Bertino, Elisa
Zero Trust (ZT) is a security paradigm aiming to curtail an attacker's lateral movements within a network by implementing least-privilege and per-request access control policies. However, its widespread adoption is hindered by the difficulty of gener
Externí odkaz:
http://arxiv.org/abs/2411.15020
Autor:
Mostafiz, Mir Imtiaz, Kim, Eunseob, Li, Adrian Shuai, Bertino, Elisa, Jun, Martin Byung-Guk, Shakouri, Ali
Cutting state monitoring in the milling process is crucial for improving manufacturing efficiency and tool life. Cutting sound detection using machine learning (ML) models, inspired by experienced machinists, can be employed as a cost-effective and n
Externí odkaz:
http://arxiv.org/abs/2410.17574
Federated learning enables the collaborative learning of a global model on diverse data, preserving data locality and eliminating the need to transfer user data to a central server. However, data privacy remains vulnerable, as attacks can target user
Externí odkaz:
http://arxiv.org/abs/2410.09676
In the application of deep learning for malware classification, it is crucial to account for the prevalence of malware evolution, which can cause trained classifiers to fail on drifted malware. Existing solutions to combat concept drift use active le
Externí odkaz:
http://arxiv.org/abs/2407.13918
In recent years, there has been a growing focus on scrutinizing the security of cellular networks, often attributing security vulnerabilities to issues in the underlying protocol design descriptions. These protocol design specifications, typically ex
Externí odkaz:
http://arxiv.org/abs/2407.13742
The introduction of transformers has been an important breakthrough for AI research and application as transformers are the foundation behind Generative AI. A promising application domain for transformers is cybersecurity, in particular the malware d
Externí odkaz:
http://arxiv.org/abs/2405.17190
Many machine learning and data mining algorithms rely on the assumption that the training and testing data share the same feature space and distribution. However, this assumption may not always hold. For instance, there are situations where we need t
Externí odkaz:
http://arxiv.org/abs/2403.00935
Autor:
O'Leary, Renee, Qureshi, Maria Ahmed, La Rosa, Giusy Rita Maria, Vernooij, Robin W M, Odimegwu, Damian Chukwu, Bertino, Gaetano, Polosa, Riccardo
Publikováno v:
JMIR Research Protocols, Vol 10, Iss 5, p e29084 (2021)
BackgroundDespite the clear risks of tobacco use, millions of people continue to smoke. Electronic nicotine delivery systems (ENDS), commonly called e-cigarettes, have been proposed as a substitute for those who are unwilling or unable to quit. Curre
Externí odkaz:
https://doaj.org/article/e8ff9b5b5c46462d9fc6767b82fef6c2
Autor:
Malaguarnera M, Latteri S, Bertino G, Madeddu R, Catania VE, Currò G, Borzì AM, Drago F, Malaguarnera G
Publikováno v:
Clinical and Experimental Gastroenterology, Vol Volume 11, Pp 373-380 (2018)
Michele Malaguarnera,1,2 Saverio Latteri,3 Gaetano Bertino,4 Roberto Madeddu,5 Vito Emanuele Catania,3 Giuseppe Currò,6 Antonio Maria Borzì,2 Filippo Drago,1 Giulia Malaguarnera1 1Department of Biomedical and Biotechnological Science, University of
Externí odkaz:
https://doaj.org/article/9acd6a4f54c844239fec151839b12fe5