Search

Your search keyword '"Ernesto Damiani"' showing total 313 results

Search Constraints

Start Over You searched for: Author "Ernesto Damiani" Remove constraint Author: "Ernesto Damiani" Topic computer Remove constraint Topic: computer
313 results on '"Ernesto Damiani"'

Search Results

1. Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model

2. Smart connected parking lots based on secured multimedia IoT devices

3. TrustFed: A Framework for Fair and Trustworthy Cross-Device Federated Learning in IIoT

4. Techniques for Measuring the Probability of Adjacency between Carved Video Fragments: The VidCarve Approach

5. An Enhanced Conceptual Security Model for Autonomous Vehicles

6. Artificial intelligence in deep learning algorithms for multimedia analysis

7. Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure

8. A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification

9. Security Certification Scheme for Content-centric Networks

10. The THREAT-ARREST Cyber Range Platform

11. STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets

12. A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities

13. A composite machine-learning-based framework for supporting low-level event logs to high-level business process model activities mappings enhanced by flexible BPMN model translation

14. Framework for traffic event detection using Shapelet Transform

15. A Novel Protocol for Security of Location Based Services in Multi-agent Systems

16. Test-Based Security Certification of Composite Services

17. Evaluating Trace Encoding Methods in Process Mining

18. Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work

19. What can Machine Learning do for Radio Spectrum Management?

20. Meta-transfer learning driven tensor-shot detector for the autonomous localization and recognition of concealed baggage threats

21. Novel EEG Risk Framework to Identify Insider Threats in National Critical Infrastructure Using Deep Learning Techniques

22. A Remote FPGA Laboratory as a Cloud Microservice

23. The THREAT-ARREST Cyber-Security Training Platform

24. Certified Machine-Learning Models

25. Managing a pool of rules for credit card fraud detection by a Game Theory based approach

26. Anomaly detection on event logs with a scarcity of labels

27. A Model Driven Approach for Cyber Security Scenarios Deployment

28. Modeling time, probability, and configuration constraints for continuous cloud service certification

29. On inter-Rater reliability of information security experts

30. Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review

31. Computational intelligence for multimedia and industrial applications

32. Towards Transparent and Trustworthy Cloud

33. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

34. Overlapping Analytic Stages in Online Process Mining

35. New Two-Level µTESLA Protocol for IoT Environments

36. New Blockchain Adoptation For Automotive Security by Using Systematic Innovation

37. Autonomous Vehicle Security: Conceptual Model

38. Designing Smart-Contract Based Auctions

39. Machine Learning-Based Framework for Log-Lifting in Business Process Mining Applications

40. A Machine Learning Framework for Biometric Authentication using Electrocardiogram

41. Towards Blockchain-Based E-Voting Systems

42. A Knowledge-Based IoT Security Checker

43. Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment

44. Moon Cloud: A Cloud Platform for ICT Security Governance

45. Towards the definition of an information quality metric for information fusion models

46. Network virtualization by differentially switched VPN for stable business communication with offshore computers

47. Securing Cryptographic Keys in the Cloud: A Survey

48. A Configuration-Independent Score-Based Benchmark for Distributed Databases

49. An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme

50. Analysis of Shapelet Transform Usage in Traffic Event Detection

Catalog

Books, media, physical & digital resources