Zobrazeno 1 - 10
of 438
pro vyhledávání: '"Colajanni P."'
Autor:
Pagnotta, Giulio, De Gaspari, Fabio, Hitaj, Dorjan, Andreolini, Mauro, Colajanni, Michele, Mancini, Luigi V.
Publikováno v:
IEEE Transactions on Information Forensics and Security, 2023
Moving Target Defense and Cyber Deception emerged in recent years as two key proactive cyber defense approaches, contrasting with the static nature of the traditional reactive cyber defense. The key insight behind these approaches is to impose an asy
Externí odkaz:
http://arxiv.org/abs/2303.00387
Phishing kits are tools that dark side experts provide to the community of criminal phishers to facilitate the construction of malicious Web sites. As these kits evolve in sophistication, providers of Web-based services need to keep pace with continu
Externí odkaz:
http://arxiv.org/abs/2210.08273
Publikováno v:
Array, Vol 24, Iss , Pp 100365- (2024)
Modern cybersecurity best practices and standards require continuous Vulnerability Assessment (VA) and Penetration Test (PT). These activities are human- and time-expensive. The research community is trying to propose autonomous or semi-autonomous so
Externí odkaz:
https://doaj.org/article/eb1f9eae75b2488c91ce56d34e40bee4
This paper proposes a novel approach for the study of cyber-attacks against the powertrain of a generic vehicle. The proposed model is composed by a a generic Internal Combustion engine and a speed controller, that communicate through a Controller Ar
Externí odkaz:
http://arxiv.org/abs/2202.00743
Publikováno v:
Buildings, Vol 14, Iss 10, p 3256 (2024)
Braces equipped with dissipative devices are among the most widespread methods for the seismic strengthening of seismically prone reinforced concrete (RC) frames. It allows for high reductions in seismic vulnerability with inexpensive, quickly execut
Externí odkaz:
https://doaj.org/article/e5f5cef4b8044c26ab07b5b0a89bf9c7
The incremental diffusion of machine learning algorithms in supporting cybersecurity is creating novel defensive opportunities but also new types of risks. Multiple researches have shown that machine learning methods are vulnerable to adversarial att
Externí odkaz:
http://arxiv.org/abs/2106.09380
Machine learning algorithms are effective in several applications, but they are not as much successful when applied to intrusion detection in cyber security. Due to the high sensitivity to their training data, cyber detectors based on machine learnin
Externí odkaz:
http://arxiv.org/abs/1912.03790
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Applied Sciences, Vol 14, Iss 6, p 2291 (2024)
The use of friction-based beam-to-column connections (BCCs) for earthquake-resistant moment-resistant frames (MRFs), aimed at eliminating damage to beam end sections due to the development of plastic hinges, has been prevalent since the early 1980s.
Externí odkaz:
https://doaj.org/article/90ba8f3c811f414981e90d7cc08b71d5
Autor:
Antonino Colajanni
Publikováno v:
Archivio Antropologico Mediterraneo, Vol 26, Iss 25 (2023)
The essay is devoted to an historical analysis of the progressive engagement of anthropological studies on the contemporary world with its difficult and conflictual situations. A particular attention is dedicated to the possible relations between ant
Externí odkaz:
https://doaj.org/article/a79ff441b9514daa952620b3d730f102