Search

Your search keyword '"Spognardi, A."' showing total 248 results

Search Constraints

Start Over You searched for: Author "Spognardi, A." Remove constraint Author: "Spognardi, A." Search Limiters Full Text Remove constraint Search Limiters: Full Text
248 results on '"Spognardi, A."'

Search Results

1. Scalable and automated Evaluation of Blue Team cyber posture in Cyber Ranges

2. Security assessment of common open source MQTT brokers and clients

3. A New Model for Testing IPv6 Fragment Handling

4. From Online Behaviours to Images: A Novel Approach to Social Bot Detection

5. Demystifying Misconceptions in Social Bots Research

6. Adversarial machine learning for protecting against online manipulation

7. A Investigação e a escrita: Publicar sem Perecer

8. Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection

9. A study on text-score disagreement in online reviews

10. Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling

11. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

12. A matter of words: NLP for quality evaluation of Wikipedia medical articles

13. DNA-inspired online behavioral modeling and its application to spambot detection

14. TRAP: using TaRgeted Ads to unveil Google personal Profiles

15. Fame for sale: efficient detection of fake Twitter followers

16. Domain-specific queries and Web search personalization: some investigations

19. No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone

20. Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers

22. Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems

25. Domain-specific queries and Web search personalization: some investigations

27. Los orígenes del cooperativismo de crédito en Argentina, 1887-1926

28. Democracia y Desarrollo Económico Basado en la Explotación de Recursos Minerales: Lecciones y Desafíos de la Experiencia Boliviana

29. Adversarial machine learning for protecting against online manipulation

32. Data security in unattended wireless sensor networks

33. Arsenic accumulation in edible vegetables and health risk reduction by groundwater treatment using an adsorption process

34. Balloon-based drug coating delivery to the artery wall is dictated by coating micro-morphology and angioplasty pressure gradients

36. A perspective on the potential health risks from PCBs and heavy metals contamination of M. merluccius from Mediterranean Sea

37. Procedural and Anatomical Determinants of Multielectrode Renal Denervation Efficacy: Insights From Preclinical Models

38. Renal artery anatomy assessed by quantitative analysis of selective renal angiography in 1,000 patients with hypertension

43. Determining the authenticity of PDO buffalo mozzarella: an approach based on Fourier transform infrared (MIR-FTIR) spectroscopy and on chemometric tools

44. CRT-200.08 Six-Month Safety Evaluation of the Chocolate Touch™ Drug-Coated Balloon Catheter in the Swine Peripheral Artery Model

45. Procedural and Anatomical Determinants of Multielectrode Renal Denervation Efficacy

47. DNA-inspired characterization and detection of novel social Twitter spambots

48. Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection

49. Emergent properties, models, and laws of behavioral similarities within groups of twitter users

50. Cooperatives and Social Capital : A Theoretically-Grounded Approach

Catalog

Books, media, physical & digital resources