Search

Your search keyword '"Conti, M"' showing total 258 results

Search Constraints

Start Over You searched for: Author "Conti, M" Remove constraint Author: "Conti, M" Database OAIster Remove constraint Database: OAIster
258 results on '"Conti, M"'

Search Results

1. From Centralized to Decentralized Remote Electronic Voting

2. An optical gamma-ray burst catalogue with measured redshift – I. Data release of 535 gamma-ray bursts and colour evolution : Data release of 535 gamma-ray bursts and colour evolution

4. Comparison of Visual and Quantra Software Mammographic Density Assessment According to BI-RADS® in 2D and 3D Images

5. An optical gamma-ray burst catalogue with measured redshift PART I : Data release of 535 gamma-ray bursts and colour evolution

7. Once-weekly insulins: a promising approach to reduce the treatment burden in people with diabetes

9. Unraveling the complexity of anti-doping analysis: reassessing meldonium detection and doping verdicts in a case study

10. Characterization of a Bioink Combining Extracellular Matrix-like Hydrogel with Osteosarcoma Cells: Preliminary Results

11. Head-to-Head Comparison of Tissue Factor-Dependent Procoagulant Potential of Small and Large Extracellular Vesicles in Healthy Subjects and in Patients with SARS-CoV-2 Infection

12. GRANDMA and HXMT Observations of GRB 221009A: The Standard Luminosity Afterglow of a Hyperluminous Gamma-Ray Burst—In Gedenken an David Alexander Kann

13. GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks

14. Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel

15. Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages

16. BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks

17. Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

18. Going in Style: Audio Backdoors Through Stylistic Transformations

19. An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems

20. Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems

21. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication

22. Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics

23. Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain

24. Privacy-Preserving and Security in SDN-based IoT: A Survey

25. GRANDMA and HXMT Observations of GRB 221009A -- the Standard-Luminosity Afterglow of a Hyper-Luminous Gamma-Ray Burst

26. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

27. Dynamic Super Round-Based Distributed Task Scheduling for UAV Networks

28. A Location-Aware and Healing Attestation Scheme for Air-Supported Internet of Vehicles

29. When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning

30. Atypical ductal hyperplasia on vacuum-assisted breast biopsy: a scoring system to predict the risk of upgrade to malignancy

31. An Innovative Scoring System to Select the Optimal Surgery in Breast Cancer after Neoadjuvant Chemotherapy

32. Bioactive compounds in legumes: Implications for sustainable nutrition and health in the elderly population

34. Adaptation and validation of the cardiovascular version of the Return-to-Work Obstacles and Self-Efficacy Scale (ROSES-CVD) to the Italian context

35. Efficacy and Accuracy of Using Magnetic Seed for Preoperative Non-Palpable Breast Lesions Localization: Our Experience with Magseed

36. Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

37. Research trends, challenges, and emerging topics in digital forensics: A review of reviews

38. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

39. Effect of DIS Attack on 6TiSCH Network Formation

40. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

42. Dynamic Backdoors with Global Average Pooling

43. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

45. Dynamic Backdoors with Global Average Pooling

46. User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack

47. Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion

48. On the feasibility of crawling-based attacks against recommender systems

49. Graph Encryption for Shortest Path Queries with k Unsorted Nodes

50. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Catalog

Books, media, physical & digital resources