89 results on '"Andrea Ceccarelli"'
Search Results
2. Validation of Safety Metrics for Object Detectors in Autonomous Driving.
3. On attacks (dis)similarities to test adversarial defense: can we reduce the attack set?
4. Ensembling Uncertainty Measures to Improve Safety of Black-Box Classifiers.
5. Intrusion detection without attack knowledge: generating out-of-distribution tabular data.
6. Anomaly Detectors for Self-Aware Edge and IoT Devices.
7. Detection of Adversarial Attacks by Observing Deep Features with Structured Data Algorithms.
8. Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach.
9. Failure modes and failure mitigation in GPGPUs: a reference model and its application.
10. Towards a General Model for Intrusion Detection: An Exploratory Study.
11. Towards Robust Visual Odometry Systems Against Camera Lens Failures.
12. Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?
13. Feature Rankers to Predict Classification Performance of Unsupervised Intrusion Detectors.
14. Attack and Fault Injection in Self-driving Agents on the Carla Simulator - Experience Report.
15. On failures of RGB cameras and their effects in autonomous driving applications.
16. Model-Driven Fault Injection in Java Source Code.
17. Using Metamodels to Improve Model-Based Testing of Service Orchestrations.
18. Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems.
19. Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD.
20. The SAMBA Approach for Self-Adaptive Model-Based Online Testing of Services Orchestrations.
21. Exploiting MDE for Platform-Independent Testing of Service Orchestrations.
22. Practical Experience Report: Implementation, Verification and Validation of a Safe and Secure Communication Protocol for the Railway Domain.
23. Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.
24. The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Results.
25. An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection.
26. Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection.
27. On Algorithms Selection for Unsupervised Anomaly Detection.
28. A Model-Based Approach for Analyzing the Autonomy Levels for Cyber-Physical Systems-of-Systems.
29. Reliable Traffic Sign Recognition System.
30. Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.
31. A Tool for Evolutionary Threat Analysis of Smart Grids.
32. A Modeling Framework to Support Resilient Evolution Planning of Smart Grids.
33. Assessing the Impact of Cascading Failures in Urban Electricity Networks.
34. Continuous Biometric Verification for Non-Repudiation of Remote Services.
35. Exploring anomaly detection in systems of systems.
36. Risk Assessment of a Biometric Continuous Authentication Protocol for Internet Services.
37. Threat Navigator: Grouping and Ranking Malicious External Threats to Current and Future Urban Smart Grids.
38. Usability Assessment in a Multi-Biometric Continuous Authentication System.
39. A Holistic Viewpoint-Based SysML Profile to Design Systems-of-Systems.
40. Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy.
41. Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented Architectures.
42. A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events.
43. A multi-criteria ranking of security countermeasures.
44. On the impact of emergent properties on SoS security.
45. Managing Dynamicity in SoS.
46. Basic Concepts on Systems of Systems.
47. Time and Resilient Master Clocks in Cyber-Physical Systems.
48. Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection.
49. Introducing Meta-Requirements for Describing System of Systems.
50. Analysis of Companies Gaps in the Application of Standards for Safety-Critical Software.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.