Sfoglia per Autore
Selecting a secure cloud provider-an empirical study and multi criteria approach
2020-01-01 Pape, S.; Paci, F.; Jürjens, J.; Massacci, F.
Fuzzy-based approach to assess and prioritize privacy risks
2020-01-01 Hart, Stephen; Ferrara, Anna Lisa; Paci, Federica
Riskio: A Serious Game for Cyber Security Awareness and Education
2020-01-01 Harth, Stephen; Margheri, Andrea; Paci, Federica Maria Francesca; Sassone, Vladimiro
Mitigating Privilege Misuse in Access Control through Anomaly Detection
2023-01-01 Hasel Mehri, Gelareh; Wester, Inez L.; Paci, Federica; Zannone, Nicola
Towards a High-interaction Physics-aware Honeynet for Industrial Control Systems
2023-01-01 Lucchese, Marco; Merro, Massimo; Paci, Federica; Zannone, Nicola
A Comprehensive Study on Third-Party User Tracking in Mobile Applications
2023-01-01 Paci, Federica; Pizzoli, Jacopo; Zannone, Nicola
HoneyICS: A High-interaction Physics-aware Honeynet forIndustrial Control Systems
2023-01-01 Lucchese, Marco; Lupia, Francesco; Merro, Massimo; Paci, Federica; Zannone, Nicola; Furfaro, Angelo
A new, evidence-based, theory for knowledge reuse in security risk analysis
2023-01-01 Labunets, K; Massacci, F; Paci, F; Tuma, K
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Selecting a secure cloud provider-an empirical study and multi criteria approach | 1-gen-2020 | Pape, S.; Paci, F.; Jürjens, J.; Massacci, F. | |
Fuzzy-based approach to assess and prioritize privacy risks | 1-gen-2020 | Hart, Stephen; Ferrara, Anna Lisa; Paci, Federica | |
Riskio: A Serious Game for Cyber Security Awareness and Education | 1-gen-2020 | Harth, Stephen; Margheri, Andrea; Paci, Federica Maria Francesca; Sassone, Vladimiro | |
Mitigating Privilege Misuse in Access Control through Anomaly Detection | 1-gen-2023 | Hasel Mehri, Gelareh; Wester, Inez L.; Paci, Federica; Zannone, Nicola | |
Towards a High-interaction Physics-aware Honeynet for Industrial Control Systems | 1-gen-2023 | Lucchese, Marco; Merro, Massimo; Paci, Federica; Zannone, Nicola | |
A Comprehensive Study on Third-Party User Tracking in Mobile Applications | 1-gen-2023 | Paci, Federica; Pizzoli, Jacopo; Zannone, Nicola | |
HoneyICS: A High-interaction Physics-aware Honeynet forIndustrial Control Systems | 1-gen-2023 | Lucchese, Marco; Lupia, Francesco; Merro, Massimo; Paci, Federica; Zannone, Nicola; Furfaro, Angelo | |
A new, evidence-based, theory for knowledge reuse in security risk analysis | 1-gen-2023 | Labunets, K; Massacci, F; Paci, F; Tuma, K |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile