VACCARI, IVAN

VACCARI, IVAN  

Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT  

Mostra records
Risultati 1 - 20 di 36 (tempo di esecuzione: 0.044 secondi).
Titolo Data di pubblicazione Autore(i) File
eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics 1-gen-2022 Vaccari, Ivan; Carlevaro, Alberto; Narteni, Sara; Cambiaso, Enrico; Mongelli, Maurizio
On The Detection Of Adversarial Attacks Through Reliable AI 1-gen-2022 Vaccari, Ivan; Carlevaro, Alberto; Narteni, Sara; Cambiaso, Enrico; Mongelli, Maurizio
3D fluid-dynamic ovarian cancer model resembling systemic drug administration for efficacy assay 1-gen-2021 Marrella, Alessandra; Varani, Gabriele; Aiello, Maurizio; Vaccari, Ivan; Vitale, Chiara; Mojzisek, Martin; Degrassi, Cristina; Scaglione, Silvia
A generative adversarial network (GAN) technique for internet of medical things data 1-gen-2021 Vaccari, I; Orani, V; Paglialonga, A; Cambiaso, E; Mongelli, M
An Innovative 0-Day Attack against ZigBee: Exploitation and Protection System Analysis 1-gen-2021 Vaccari, Ivan; Aiello, Maurizio; Cambiaso, Enrico
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections 1-gen-2021 Umberto Morelli; Ivan Vaccari; Silvio Ranise; Enrico Cambiaso
Evaluating the possibility to perpetrate tunneling attacks exploiting short-message-service 1-gen-2021 Narteni, S; Vaccari, I; Mongelli, M; Aiello, M; Cambiaso, E
From Explainable to Reliable Artificial Intelligence 1-gen-2021 Narteni, Sara; Ferretti, Melissa; Orani, Vanessa; Vaccari, Ivan; Cambiaso, Enrico; Mongelli, Maurizio
On the feasibility of covert channels through Short-Message-Service 1-gen-2021 Sara Narteni; Ivan Vaccari; Maurizio Mongelli; Maurizio Aiello; Enrico Cambiaso
Perpetrate cyber-attacks using IoT devices as attack vector: The ESP8266 use case 1-gen-2021 Vaccari I.; Narteni S.; Mongelli M.; Aiello M.; Cambiaso E.
Perpetrate cyber-threats using IoT devices as attack vector: the ESP8266 use case 1-gen-2021 Vaccari, Ivan; Narteni, Sara; Mongelli, Maurizio; Aiello, Maurizio; Cambiaso, Enrico
Adaptive and Intelligent Data Collection and Analytics for Securing Critical Financial Infrastructure 1-gen-2020 Habtamu Abie; Svetlana Boudko; Omri Soceanu; Lev Greenberg; Aidan Shribman; Beatriz GallegoNicasio; Enrico Cambiaso; Ivan Vaccari;Maurizio Aiello
Challenges and Opportunities of IoT and AI in Pneumology 1-gen-2020 Mongelli, M; Orani, V; Cambiaso, E; Vaccari, I; Paglialonga, A; Braido, F; Catalano, Ce
Detection and classification of slow DoS attacks targeting network servers 1-gen-2020 Enrico Cambiaso; Maurizio Aiello; Maurizio Mongelli; Ivan Vaccari
Detection of Innovative Low-rate Denial of Service Attacks Against Critical Infrastructures 1-gen-2020 Cambiaso, Enrico; Vaccari, Ivan; Aiello, Maurizio
FINSTIX: a Cyber-Physical Data Model for Financial Critical Infrastructures 1-gen-2020 G. Gazzarata; E. Troiano; L. Verderame; M. Aiello; I. Vaccari; E. Cambiaso;A. Merlo
FINSTIX: A Security Data Model for the Financial Sector 1-gen-2020 Gazzarata, Giorgia; Troiano, Ernesto; Cambiaso, Enrico; Vaccari, Ivan; Polyviou, Ariana; Merlo, Alessio; Verderame, Luca
Innovative Protection System Against Remote AT Command Attacks on ZigBee Networks 1-gen-2020 Vaccari, Ivan; Aiello, Maurizio; Cambiaso, Enrico
IoT-Flock: guida all'installazione ed utilizzo di un tool per generare traffico IoT attraverso protocolli MQTT e CoAP 1-gen-2020 Vaccari, I; Cambiaso, E; Aiello, M
IPPO: A Privacy-Aware Architecture for Decentralized Data-sharing 1-gen-2020 Aiello, Maurizio; Cambiaso, Enrico; Canonico, Roberto; Maccari, Leonardo; Mellia, Marco; Pescapè, Antonio; Vaccari, Ivan