Sfoglia per Autore
Mostrati risultati da 1 a 5 di 5
MQTTset, a New Dataset for Machine Learning Techniques on MQTT
2020-01-01 Vaccari, Ivan; Chiola, Giovanni; Aiello, Maurizio; Mongelli, Maurizio; Cambiaso, Enrico
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures
2021-01-01 Gazzarata, G.; Troiano, E.; Verderame, L.; Aiello, M.; Vaccari, I.; Cambiaso, E.; Merlo, A.
High blood flow shear stress values are associated with circulating tumor cells cluster disaggregation in a multi-channel microfluidic device
2021-01-01 Marrella, Alessandra; Fedi, Arianna; Varani, Gabriele; Vaccari, Ivan; Fato, Marco; Firpo, Giuseppe; Guida, Patrizia; Aceto, Nicola; Scaglione, Silvia
Security aspects about Internet of Things networks, devices and communication protocols
2021-05-24 Vaccari, Ivan
On The Detection Of Adversarial Attacks Through Reliable AI
2022-01-01 Vaccari, Ivan; Carlevaro, Alberto; Narteni, Sara; Cambiaso, Enrico; Mongelli, Maurizio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
MQTTset, a New Dataset for Machine Learning Techniques on MQTT | 1-gen-2020 | Vaccari, Ivan; Chiola, Giovanni; Aiello, Maurizio; Mongelli, Maurizio; Cambiaso, Enrico | |
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures | 1-gen-2021 | Gazzarata, G.; Troiano, E.; Verderame, L.; Aiello, M.; Vaccari, I.; Cambiaso, E.; Merlo, A. | |
High blood flow shear stress values are associated with circulating tumor cells cluster disaggregation in a multi-channel microfluidic device | 1-gen-2021 | Marrella, Alessandra; Fedi, Arianna; Varani, Gabriele; Vaccari, Ivan; Fato, Marco; Firpo, Giuseppe; Guida, Patrizia; Aceto, Nicola; Scaglione, Silvia | |
Security aspects about Internet of Things networks, devices and communication protocols | 24-mag-2021 | Vaccari, Ivan | |
On The Detection Of Adversarial Attacks Through Reliable AI | 1-gen-2022 | Vaccari, Ivan; Carlevaro, Alberto; Narteni, Sara; Cambiaso, Enrico; Mongelli, Maurizio |
Mostrati risultati da 1 a 5 di 5
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile