Zobrazeno 1 - 10
of 213
pro vyhledávání: '"DRAGONI, NICOLA"'
Graphical security models constitute a well-known, user-friendly way to represent the security of a system. These kinds of models are used by security experts to identify vulnerabilities and assess the security of a system. The manual construction of
Externí odkaz:
http://arxiv.org/abs/2302.14479
Internet of Things (IoT) is a network of devices that communicate with each other through the internet and provides intelligence to industry and people. These devices are running in potentially hostile environments, so the need for security is critic
Externí odkaz:
http://arxiv.org/abs/2211.01712
Publikováno v:
In Computers & Security February 2024 137
Publikováno v:
Software Technology: Methods and Tools. TOOLS 2019. Lecture Notes in Computer Science(), vol 11771
The Internet of Things (IoT) has caused a revolutionary paradigm shift in computer networking. After decades of human-centered routines, where devices were merely tools that enabled human beings to authenticate themselves and perform activities, we a
Externí odkaz:
http://arxiv.org/abs/1905.04021
In this chapter we offer an overview of microservices providing the introductory information that a reader should know before continuing reading this book. We introduce the idea of microservices and we discuss some of the current research challenges
Externí odkaz:
http://arxiv.org/abs/1904.03027
The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud
Externí odkaz:
http://arxiv.org/abs/1902.10071
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development. During this technological and societal revolution, security has been persistently neglected, yet
Externí odkaz:
http://arxiv.org/abs/1805.04101
Publikováno v:
Proceedings of 5th International Conference in Software Engineering for Defence Applications. SEDA 2016. Advances in Intelligent Systems and Computing, vol 717. Springer, Cham
Cloud computing is steadily growing and, as IaaS vendors have started to offer pay-as-you-go billing policies, it is fundamental to achieve as much elasticity as possible, avoiding over-provisioning that would imply higher costs. In this paper, we br
Externí odkaz:
http://arxiv.org/abs/1709.05635
Autor:
Giaretta, Alberto, Dragoni, Nicola
Publikováno v:
Proceedings of 6th International Conference in Software Engineering for Defence Applications. SEDA 2018. Advances in Intelligent Systems and Computing, vol 925. Springer, Cham
Looking at today phishing panorama, we are able to identify two diametrically opposed approaches. On the one hand, massive phishing targets as many people as possible with generic and preformed texts. On the other hand, spear phishing targets high-va
Externí odkaz:
http://arxiv.org/abs/1708.07342
Publikováno v:
Proceedings of 5th International Conference in Software Engineering for Defence Applications. SEDA 2016. Advances in Intelligent Systems and Computing, vol 717. Springer, Cham
The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object
Externí odkaz:
http://arxiv.org/abs/1707.08380