Search

Your search keyword '"Ernesto Damiani"' showing total 1,333 results

Search Constraints

Start Over You searched for: Author "Ernesto Damiani" Remove constraint Author: "Ernesto Damiani"
1,333 results on '"Ernesto Damiani"'

Search Results

1. Reconfigurable Intelligent Surface-Assisted Routing for Power-Constrained IoT Networks

2. Advanced Machine Learning Based Malware Detection Systems

3. The Essentials: A Comprehensive Survey to Get Started in Augmented Reality

4. Tuning Machine Learning to Address Process Mining Requirements

5. Secure Relay Selection With Outdated CSI in Cooperative Wireless Vehicular Networks: A DQN Approach

6. A holistic and proactive approach to forecasting cyber threats

7. Reputation-Aware Relay Selection With Opportunistic Spectrum Access: A Blockchain Approach

8. Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals

9. Proactive Random-Forest Autoscaler for Microservice Resource Allocation

10. Trust-3DM: Trustworthiness-Based Data-Driven Decision-Making Framework Using Smart Edge Computing for Continuous Sensing

11. Angiogenesis goes computational – The future way forward to discover new angiogenic targets?

12. Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication

13. Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics

14. Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research

15. Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices

16. XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning

17. Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey

18. IEEE Access Special Section Editorial: Urban Computing and Well-Being in Smart Cities: Services, Applications, Policymaking Considerations

19. Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model

20. Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure

21. Travel ban effects on SARS-CoV-2 transmission lineages in the UAE as inferred by genomic epidemiology

22. Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions

23. Modeling Threats to AI-ML Systems Using STRIDE

24. A Machine Learning Framework for Biometric Authentication Using Electrocardiogram

25. Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach

26. Trusting Testcases Using Blockchain-Based Repository Approach

27. Robust Computationally-Efficient Wireless Emitter Classification Using Autoencoders and Convolutional Neural Networks

28. Meta-Transfer Learning Driven Tensor-Shot Detector for the Autonomous Localization and Recognition of Concealed Baggage Threats

29. Web Service Assurance: The Notion and the Issues

30. Toward Sensor-Based Context Aware Systems

33. CXCL12 and [N33A]CXCL12 in 5637 and HeLa cells: regulating HER1 phosphorylation via calmodulin/calcineurin.

Catalog

Books, media, physical & digital resources