Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 77 di 77
Titolo Data di pubblicazione Autori Tipo File Abstract
The New Frontiers of Social Simulation in the Data Science Era: An Introduction to the Proceedings 2023 Renzini, FrancescoDebernardi, CarloBianchi, FedericoCremonini, MarcoSquazzoni, Flaminio Book Part (author) -
Data visualization : Grafici, dashboard e mappe con Python 2023 Cremonini, Marco Book (author) -
A Critical Take on Privacy in a Datafied Society 2023 Marco Cremonini Article (author) -
Fondamenti di data science : Python, R e open data 2023 Cremonini, Marco Book (author) -
The dynamical formation of ephemeral groups on networks and their effects on epidemics spreading 2022 Cremonini, MarcoMaghool, Samira Article (author) -
The Unknown of the Pandemic: An Agent-Based Model of Final Phase Risks 2020 Cremonini, MarcoMaghool, Samira Article (author) -
The Unknown of the Pandemic: An Agent-based Model of Final Phase Risks 2020 Cremonini, MarcoMaghool, Samira Article (author) -
Cloud Security Risk Management 2020 Marco Cremonini Book Part (author) -
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals 2020 M. Cremonini + Article (author) -
The coevolution of contagion and behavior with increasing and decreasing awareness 2019 Maghool, SamiraCremonini, Marco + Article (author) -
Big Data Analytics in Healthcare: Design and Implementation for a Hearing Aid Case 2019 Marco Cremonini + Book Part (author) -
Productivity and patterns of activity in bug bounty programs: Analysis of hackerone and Google vulnerability research 2019 Cremonini M. + Book Part (author) -
Improving hearing healthcare with big data analytics of real-time hearing aid data 2019 Anisetti M.Bellandi V.Cremonini M. + Book Part (author) -
The effect of security education and expertise on security assessments: the case of software vulnerabilities 2018 Marco Cremonini + Article (author) -
Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart Cities 2018 Anisetti, MarcoArdagna, ClaudioBellandi, ValerioCremonini, MarcoFrati, FulvioDamiani, Ernesto Article (author) -
Controllability of social networks and the strategic use of random information 2017 M. Cremonini + Article (author) -
Online Privacy 2017 BRAGHIN, CHIARAM. Cremonini Book Part (author) -
Big Data Platform for Public Health Policies 2017 M. AnisettiV. BellandiM. CremoniniE. DamianiJ. Maggesi Book Part (author) -
Use of random topics as practical control signals in a social network model 2017 M. Cremonini + Book Part (author) -
Models and Methods for the Analysis of the Diffusion of Skills in Social Networks 2017 A. CeselliM. Cremonini + Book Part (author) -
Introducing serendipity in a social network model of knowledge diffusion 2016 M. Cremonini Article (author) -
Cloud security risk management 2016 M. Cremonini Book Part (author) -
0-day vulnerabilities and cybercrime 2015 M. Cremonini + Book Part (author) -
A game theoretic approach to vulnerability patching 2015 G. GianiniM. CremoniniG. Lena CotaL. Ghemmogne Fossi + Book Part (author) -
Self-organizing techniques for knowledge diffusion in dynamic social networks 2014 M. Cremonini + Book Part (author) -
Privacy on the Internet 2013 M. CremoniniC. BraghinC.A. Ardagna Book Part (author) -
Business continuity planning 2012 M. CremoniniP. Samarati Book Part (author) -
The asymmetric diffusion of trust between communities: simulations in dynamic social networks 2011 M. Cremonini + Book Part (author) -
Modifying trust dynamics through cooperation and defection in evolving social networks 2011 M. Cremonini + Book Part (author) -
An obfuscation-based approach for protecting location privacy 2011 C.A. ArdagnaM. CremoniniS. De Capitani di VimercatiP. Samarati Article (author) -
The Dorothy project : an open botnet analysis framework for automatic tracking and activity visualization 2010 M. Cremonini + Book Part (author) -
Managing privacy in location-based access control systems 2010 C.A. ArdagnaM. CremoniniS. De Capitani di VimercatiP. Samarati Book Part (author) -
A framework for financial botnet analysis 2010 M. Cremonini + Book Part (author) -
Landscape-aware location-privacy protection in location-based services 2009 C.A. ArdagnaM. CremoniniG. Gianini Article (author) -
Access control in location-based services 2009 C.A. ArdagnaM. CremoniniS. De Capitani di VimercatiP. Samarati Book Part (author) -
Risks and benefits of signaling information system characteristics to strategic attackers 2009 M. Cremonini + Article (author) -
Net privacy 2009 M. CremoniniC. BraghinC.A. Ardagna Book Part (author) -
Balanced clustering for efficient detection of scientific plagiarism 2009 A. CeselliR. CordoneM. Cremonini Book Part (author) -
Location privacy in pervasive computing 2008 C.A. ArdagnaM. CremoniniS. De Capitani di VimercatiP. Samarati Book Part (author) -
Privacy-enhanced location-based access control 2008 C.A. ArdagnaM. CremoniniS. De Capitani di VimercatiP. Samarati Book Part (author) -
Privacy in the electronic society : emerging problems and solutions 2008 C.A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
A privacy-aware access control system 2008 C.A. ArdagnaM. CremoniniS. De Capitani di VimercatiP. Samarati Article (author) -
Managing privacy in LBAC systems 2007 C.A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Learning computer networking on open paravirtual laboratories 2007 M. AnisettiV. BellandiA. ColomboM. CremoniniE. DamianiF. FratiD. Rebeccani + Article (author) -
A middleware architecture for integrating privacy preferences and location accuracy 2007 C.A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Location privacy protection through obfuscation-based techniques 2007 C.A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Business continuity planning 2007 M. CremoniniP. Samarati Book Part (author) -
Privacy-enhanced location services information 2007 C.A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Role of signaling in information warfare 2007 M. Cremonini + Book Part (author) -
Privacy-enhanced identity management for e-services 2007 C.A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiF. FratiP. Samarati Book Part (author) -
Understanding and influencing attackers’ decisions: implications for security investment strategies 2006 M. Cremonini + Working Paper -
Contingency planning management 2006 M. CremoniniP. Samarati Book Part (author) -
Network-based intrusion detection systems 2006 Marco Cremonini Book Part (author) -
The architecture of a privacy-aware access control decision component 2006 C.A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Security, privacy, and trust in mobile systems 2006 M. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Location-based metadata and negotiation protocols for LBAC in a one-to-many scenario 2006 C.A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Negotiation protocols for LBAC systems 2006 C. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Supporting location-based conditions in access control policies 2006 C. A. ArdagnaM. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Evaluating information security investments from attackers perspective: the return-on-attack (ROA) 2005 M. Cremonini + Conference Object -
Towards identity management for e-services 2005 C.A. ArdagnaE. DamianiS. De Capitani di VimercatiM. CremoniniP. Samarati Book Part (author) -
Security, privacy, and trust in mobile systems 2005 M. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati + Book Part (author) -
Beauty and the beast: Hacking for pleasure and profit 2004 Cremonini M. Article (author) -
Renaissance hackery? 2004 Cremonini M. Article (author) -
Semantic-Aware Perimeter Protection 2004 M. CremoniniE. DamianiP. Samarati Book Part (author) -
Semantics-aware perimeter protection 2004 M. CremoniniE. DamianiP. Samarati Book Part (author) -
Disaster recovery planning 2003 M. CremoniniP. Samarati Book Part (author) -
An XML-based approach to combine firewalls and web services security specifications 2003 M. CremoniniE. DamianiS. De Capitani di VimercatiP. Samarati Book Part (author) -
Using mobile agents for analyzing intrusion in computer networks 2001 M. Cremonini + Conference Object -
Coordination and access control in open distributed agent systems: The TuCSoN approach 2000 M. Cremonini + Book Part (author) -
Ruling agent motion in structured environments 2000 Cremonini M. + Book Part (author) -
Mobile agents integrity for electronic commerce applications 1999 M. Cremonini + Article (author) -
Modelling network topology and mobile agent interaction: an integrated framework 1999 Cremonini, Marco + Book Part (author) -
Building mobile agent applications in HiMAT 1999 Cremonini M. + Book Part (author) -
Coordination in context: Authentication, authorisation and topology in mobile agent applications 1999 Cremonini M. + Book Part (author) -
Multi-agent systems on the internet: extending the scope of coordination towards security and topology 1999 M. Cremonini + Book Part (author) -
Melding abstractions with mobile agents 1998 Cremonini M. + Book Part (author) -
Locality abstractions and security models in a Mobile Agent environment 1998 Cremonini Marco + Book Part (author) -
Mostrati risultati da 1 a 77 di 77
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile