Zobrazeno 1 - 10
of 164
pro vyhledávání: '"Gianmarco Baldini"'
Publikováno v:
Data in Brief, Vol 55, Iss , Pp 110697- (2024)
Identifying humans based on their behavioural patterns represents an attractive basis for access control as such patterns appear naturally, do not require a focused effort from the user side, and do not impose the additional burden of memorising pass
Externí odkaz:
https://doaj.org/article/0830739b3f234e2499afa29974be2fee
Autor:
Gianmarco Baldini
Publikováno v:
Electronics Letters, Vol 59, Iss 22, Pp n/a-n/a (2023)
Abstract Radio Frequency Fingerprinting (RFF) has been recently investigated by the research community to enhance wireless security. This letter proposes an RFF approach based only on the complex ramp‐up transient portion of the transmitted frame.
Externí odkaz:
https://doaj.org/article/25e622033a8a4c998492ccbc1e22b142
Autor:
Gianmarco Baldini
Publikováno v:
Information, Vol 14, Iss 11, p 605 (2023)
Cybersecurity in modern vehicles has received increased attention from the research community in recent years. Intrusion Detection Systems (IDSs) are one of the techniques used to detect and mitigate cybersecurity risks. This paper proposes a novel i
Externí odkaz:
https://doaj.org/article/94dc048a89224d2ca3f2791904cf2c23
Autor:
Gianmarco Baldini, Fausto Bonavitacola
Publikováno v:
Algorithms, Vol 16, Iss 6, p 277 (2023)
Channel identification is a useful function to support wireless telecommunication operations because the knowledge of the radio frequency propagation channel characteristics can improve communication efficiency and robustness. In recent times, the ap
Externí odkaz:
https://doaj.org/article/497840ee870744e7bc2db7211f1aedc0
Autor:
Jose L. Hernandez-Ramos, Sara N. Matheu, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal Bernabe, Poonam Yadav, Antonio Skarmeta, Paolo Bellavista
Publikováno v:
IEEE Access, Vol 9, Pp 126265-126285 (2021)
With the strong development of the Internet of Things (IoT), the definition of IoT devices’ intended behavior is key for an effective detection of potential cybersecurity attacks and threats in an increasingly connected environment. In 2019, the Ma
Externí odkaz:
https://doaj.org/article/6f149a24ee17444886f7ca9dcf73fb20
Publikováno v:
IEEE Access, Vol 9, Pp 149582-149595 (2021)
Dynamic Spectrum Access (DSA) solutions equipped with spectrum prediction can enable proactive spectrum management and tackle the increasing demand for radio frequency (RF) bandwidth. Among various prediction techniques, Long Short-Term Memory (LSTM)
Externí odkaz:
https://doaj.org/article/b521fd391a034bc0be1802b8b0cfa1c3
Autor:
Gianmarco Baldini, Irene Amerini
Publikováno v:
IEEE Access, Vol 7, Pp 158685-158696 (2019)
The use of mobile phones or smartphones has become so widespread that most people rely on them for many services and applications like sending e-mails, checking the bank account, accessing cloud platforms, health monitoring, buying on-line and many o
Externí odkaz:
https://doaj.org/article/ad8cc1424c5b4389bb2fa6e8b6fe74b9
Publikováno v:
Journal of Imaging, Vol 7, Iss 11, p 242 (2021)
Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security more an
Externí odkaz:
https://doaj.org/article/bedf6a77d3da4b5591025f21bd5bffdc
Spectrum Sensing Implemented with Improved Fluctuation-Based Dispersion Entropy and Machine Learning
Publikováno v:
Entropy, Vol 23, Iss 12, p 1611 (2021)
Spectrum sensing is an important function in radio frequency spectrum management and cognitive radio networks. Spectrum sensing is used by one wireless system (e.g., a secondary user) to detect the presence of a wireless service with higher priority
Externí odkaz:
https://doaj.org/article/daf28798294c4dd2881822e7caafbdeb
Publikováno v:
Applied Sciences, Vol 11, Iss 12, p 5567 (2021)
The Intrusion Detection System (IDS) is an important tool to mitigate cybersecurity threats in an Information and Communication Technology (ICT) infrastructure. The function of the IDS is to detect an intrusion to an ICT system or network so that ade
Externí odkaz:
https://doaj.org/article/7a44e432f9494f46abd77546fe8c00a9