CAMBIASO, ENRICO

CAMBIASO, ENRICO  

Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT  

Mostra records
Risultati 1 - 20 di 29 (tempo di esecuzione: 0.022 secondi).
Titolo Data di pubblicazione Autore(i) File
Advancements on IoT and AI applied to Pneumology 1-gen-2024 Cambiaso, Enrico; Narteni, Sara; Baiardini, Ilaria; Braido, Fulvio; Paglialonga, Alessia; Mongelli, Maurizio
DockerChannel: A Framework for Evaluating Information Leakages of Docker Containers 1-gen-2023 Cambiaso, Enrico; Caviglione, Luca; Zuppelli, Marco
Il consumatore nel Metaverso: cybersecurity e tutele 1-gen-2023 Marta Bray; Enrico Cambiaso; Alessandra Mancini
eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics 1-gen-2022 Vaccari, Ivan; Carlevaro, Alberto; Narteni, Sara; Cambiaso, Enrico; Mongelli, Maurizio
On the Intersection of Explainable and Reliable AI for physical fatigue prediction 1-gen-2022 Sara Narteni; Vanessa Orani; Enrico Cambiaso; Matteo Rucco; Maurizio Mongelli
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System 1-gen-2022 Husnain, Muhammad; Hayat, Khizar; Cambiaso, Enrico; U Fayyaz, Ubaid; Mongelli, Maurizio; Akram, Habiba; Ghazanfar Abbas, Syed; A Shah, Ghalib
Sensitivity of Logic Learning Machine for reliability in safety-critical systems 1-gen-2022 Narteni S.; Orani V.; Vaccari I.; Cambiaso E.; Mongelli M.
Web security and data dumping: The Cookidump case 1-gen-2022 Cambiaso, Enrico; Aiello, Maurizio
A generative adversarial network (GAN) technique for internet of medical things data 1-gen-2021 Vaccari, I; Orani, V; Paglialonga, A; Cambiaso, E; Mongelli, M
Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service 1-gen-2021 Narteni S.; Vaccari I.; Mongelli M.; Aiello M.; Cambiaso E.
Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities 1-gen-2021 Vaccari, I; Narteni, S; Aiello, M; Mongelli, M; Cambiaso, E
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach 1-gen-2021 Syed Ghazanfar Abbas; Ivan Vaccari; Faisal Hussain; Shahzaib Zahid; Ubaid Ullah Fayyaz; Ghalib A. Shah; Taimur Bakhshi; Enrico Cambiaso
Innovative Protection System Against Remote AT Command Attacks on ZigBee Networks 1-gen-2020 Ivan Vaccari; Maurizio Aiello; Enrico Cambiaso
MQTTset, a New Dataset for Machine Learning Techniques on MQTT 1-gen-2020 Vaccari, Ivan; Chiola, Giovanni; Aiello, Maurizio; Mongelli, Maurizio; Cambiaso, Enrico
SlowITe, a Novel Denial of Service Attack Affecting MQTT 1-gen-2020 Ivan Vaccari; Maurizio Aiello; Enrico Cambiaso
SlowTT: A Slow Denial of Service Against IoT Networks 1-gen-2020 Vaccari; Ivan;Aiello; Maurizio;Cambiaso; Enrico
Evaluating Security of Low-Power Internet of Things Networks 1-gen-2019 Vaccari, Ivan; Cambiaso, Enrico; Aiello, Maurizio
Introducing the SlowDrop Attack 1-gen-2019 Cambiaso, Enrico; Chiola, Giovanni; Aiello, Maurizio
Measuring the energy consumption of cyber security 1-gen-2017 Caviglione, L; Gaggero, M; Cambiaso, E; Aiello, M
Remotely Exploiting AT Command Attacks on ZigBee Networks 1-gen-2017 Vaccari, Ivan; Cambiaso, Enrico; Aiello, Maurizio