Search

Your search keyword '"Francesco Palmieri"' showing total 262 results

Search Constraints

Start Over You searched for: Author "Francesco Palmieri" Remove constraint Author: "Francesco Palmieri" Topic business Remove constraint Topic: business
262 results on '"Francesco Palmieri"'

Search Results

1. Negative Pressure Wound Therapy applied to a cholecystoparietal fistula: How to treat a rare complication of a common condition - a case report

2. Effective classification of android malware families through dynamic features and neural networks

3. A Fraud-Resilient Blockchain-Based Solution for Invoice Financing

4. Malware detection in mobile environments based on Autoencoders and API-images

5. Securing visual search queries in ubiquitous scenarios empowered by smart personal devices

6. Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems

7. Using generative adversarial networks for improving classification effectiveness in credit card fraud detection

8. MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks

9. On the undetectability of payloads generated through automatic tools: A human‐oriented approach

10. A distributed flow correlation attack to anonymizing overlay networks based on wavelet multi-resolution analysis

11. A stacked autoencoder-based convolutional and recurrent deep neural network for detecting cyberattacks in interconnected power control systems

12. Enhancing COVID-19 tracking apps with human activity recognition using a deep convolutional neural network and HAR-images

13. Global attitudes in the management of acute appendicitis during COVID-19 pandemic: ACIE Appy Study

14. Considerations about learning Word2Vec

15. An empirical evaluation of prediction by partial matching in assembly assistance systems

16. Intent Classification in Question-Answering Using LSTM Architectures

17. An Analysis of Word2Vec for the Italian Language

18. On the impact of lightweight ciphers in automotive networks (S)

19. A Methodological Perspective on Lawful Internet Surveillance

20. Special Issue on Intelligent Systems in Sensor Networks and Internet of Things

21. Probing a Deep Neural Network

22. A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles

23. Low-Resource Footprint, Data-Driven Malware Detection on Android

24. CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices

25. Temporal convolutional neural (TCN) network for an effective weather forecasting using time-series data from the local weather station

26. On the File Recovery in Systems Infected by Ransomware

27. Distributed Group Key Management for Event Notification Confidentiality among Sensors

28. Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction

29. Compression-based steganography

30. A Reliability and latency-aware routing framework for 5G transport infrastructures

31. DLCD-CCE: A Local Community Detection Algorithm for Complex IoT Networks

32. GGA: A modified genetic algorithm with gradient-based local search for solving constrained optimization problems

33. Securing the internet of vehicles through lightweight block ciphers

34. Distributed strategic learning and game theoretic formulation of network embedded coding

35. A Scheduling Framework for Latency Optimization on 5G Mobile Edge Computing Infrastructures

36. Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence

37. Stackelberg games for modeling defense scenarios against cloud security threats

38. Cloud Message Queueing and Notification: Challenges and Opportunities

39. A combination of clustering-based under-sampling with ensemble methods for solving imbalanced class problem in intelligent systems

40. Automated extraction of fragments of Bayesian networks from textual sources

41. Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems

42. Traffic matrix estimation with software-defined NFV: Challenges and opportunities

43. Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks

44. Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices

45. Layered multicast for reliable event notification over large-scale networks

46. A Deep Learning Approach for Maximum Activity Links in D2D Communications

47. Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios

48. Long-term improvement in cardiac magnetic resonance in β-thalassemia major patients treated with deferasirox extends to patients with abnormal baseline cardiac function

49. A study on forecasting electricity production and consumption in smart cities and factories

50. Detecting unfair recommendations in trust-based pervasive environments

Catalog

Books, media, physical & digital resources