Search

Your search keyword '"Francesco Palmieri"' showing total 606 results

Search Constraints

Start Over You searched for: Author "Francesco Palmieri" Remove constraint Author: "Francesco Palmieri"
606 results on '"Francesco Palmieri"'

Search Results

201. Optimal control of system governed by nonlinear Volterra integral and fractional derivative equations

202. La corona e il potere. Riflessioni di filosofia politica

203. Intent Classification in Question-Answering Using LSTM Architectures

204. An Analysis of Word2Vec for the Italian Language

205. A Methodological Perspective on Lawful Internet Surveillance

206. Path Planning Using Probability Tensor Flows

207. Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities

208. A genetic approach for the maximum network lifetime problem with additional operating time slot constraints

209. Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis

210. Probing a Deep Neural Network

211. A Cluster-based Multidimensional Approach for Detecting Attacks on Connected Vehicles

212. Low-Resource Footprint, Data-Driven Malware Detection on Android

213. CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices

214. Temporal convolutional neural (TCN) network for an effective weather forecasting using time-series data from the local weather station

215. On the File Recovery in Systems Infected by Ransomware

216. Distributed Group Key Management for Event Notification Confidentiality among Sensors

217. A machine learning-based memory forensics methodology for TOR browser artifacts

218. Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction

219. Compression-based steganography

220. A Reliability and latency-aware routing framework for 5G transport infrastructures

221. DLCD-CCE: A Local Community Detection Algorithm for Complex IoT Networks

222. GGA: A modified genetic algorithm with gradient-based local search for solving constrained optimization problems

223. Securing the internet of vehicles through lightweight block ciphers

224. Linear Artificial Forces for Human Dynamics in Complex Contexts

225. Thrombotic complication in non-hospitalized COVID-19 patients: An underestimated phenomenon?

226. Distributed strategic learning and game theoretic formulation of network embedded coding

227. A Scheduling Framework for Latency Optimization on 5G Mobile Edge Computing Infrastructures

228. Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence

229. Stackelberg games for modeling defense scenarios against cloud security threats

230. Cloud Message Queueing and Notification: Challenges and Opportunities

231. Mobile Internet Security : 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7–9, 2021, Revised Selected Papers

232. A combination of clustering-based under-sampling with ensemble methods for solving imbalanced class problem in intelligent systems

233. Automated extraction of fragments of Bayesian networks from textual sources

234. Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems

235. The Multidimensional Cramér–Rao–Leibniz Lower Bound for Likelihood Functions With Parameter-Dependent Support

236. A wave propagation-based adaptive probabilistic broadcast containment strategy for reactive MANET routing protocols

237. Traffic matrix estimation with software-defined NFV: Challenges and opportunities

238. Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks

239. Improving the gossiping effectiveness with distributed strategic learning (Invited paper)

240. Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices

241. Layered multicast for reliable event notification over large-scale networks

242. Anastomotic leakage following laparoscopic resection of low and mid rectal cancer

243. A Conflict Detection Method for Ellipsoidal Safety Regions

244. Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios

245. Long-term improvement in cardiac magnetic resonance in β-thalassemia major patients treated with deferasirox extends to patients with abnormal baseline cardiac function

246. Securing PIN-based authentication in smartwatches with just two gestures

248. A study on forecasting electricity production and consumption in smart cities and factories

249. Detecting unfair recommendations in trust-based pervasive environments

250. Lightweight Ciphers in Automotive Networks: A Preliminary Approach

Catalog

Books, media, physical & digital resources