DI PIETRO, ROBERTO

DI PIETRO, ROBERTO  

Dipartimento di Matematica "Tullio Levi-Civita" - DM  

Mostra records
Risultati 1 - 20 di 62 (tempo di esecuzione: 0.053 secondi).
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
Recommendations from the COST action CA17116 (SPRINT) for the standardization of perinatal derivative preparation and in vitro testing 2023 Di Pietro R.Pozzobon M. + FRONTIERS IN BIOENGINEERING AND BIOTECHNOLOGY - -
Shedding light on typical species: Implications for habitat monitoring 2021 Di Pietro R.Villani M. + PLANT SOCIOLOGY - -
A Survey on Computational Propaganda Detection 2020 Da San Martino, GiovanniDi Pietro, Roberto + - - Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI-20}
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware 2016 DI PIETRO, ROBERTO IEEE TRANSACTIONS ON MOBILE COMPUTING - -
CUDA leaks: A detailed hack for CUDA and a (Partial) fix 2016 DI PIETRO, ROBERTO + ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS - -
CURE-Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments 2016 DI PIETRO, ROBERTO + COMPUTER COMMUNICATIONS - -
DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection 2016 DI PIETRO, ROBERTO + IEEE INTELLIGENT SYSTEMS - -
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2016 DI PIETRO, ROBERTO + IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING - -
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution 2016 DI PIETRO, ROBERTO + COMPUTER COMMUNICATIONS - -
Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel 2016 DI PIETRO, ROBERTO + COMPUTER NETWORKS - -
To Docker or Not to Docker: A Security Perspective 2016 DI PIETRO, ROBERTO + IEEE CLOUD COMPUTING - -
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 2015 DI PIETRO, ROBERTO + FUTURE GENERATION COMPUTER SYSTEMS - -
ESC: An efficient, scalable, and crypto-less solution to secure wireless networks 2015 DI PIETRO, ROBERTO + COMPUTER NETWORKS - -
EXPEDITE: EXPress closED ITemset Enumeration 2015 DI PIETRO, ROBERTO + EXPERT SYSTEMS WITH APPLICATIONS - -
Fame for sale: Efficient detection of fake Twitter followers 2015 DI PIETRO, ROBERTO + DECISION SUPPORT SYSTEMS - -
Silence is golden: Exploiting jamming and radio Silence to communicate 2015 DI PIETRO, ROBERTO + ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY - -
The impact of GPU-assisted malware on memory forensics: A case study 2015 DI PIETRO, ROBERTO + DIGITAL INVESTIGATION - -
Clone Wars: Distributed Detection of Clone Attack in Mobile WSNs 2014 CONTI, MAURODI PIETRO, ROBERTO + JOURNAL OF COMPUTER AND SYSTEM SCIENCES - -
Privacy for LBSs: On Using a Footprint model to face the enemy 2014 CONTI, MAURODI PIETRO, ROBERTO + - STUDIES IN COMPUTATIONAL INTELLIGENCE Advanced Research in Data Privacy
Provable Storage Medium for Data Storage Outsourcing 2014 CONTI, MAURODI PIETRO, ROBERTO + IEEE TRANSACTIONS ON SERVICES COMPUTING - -