Search

Your search keyword '"Andrea Ceccarelli"' showing total 42 results

Search Constraints

Start Over You searched for: Author "Andrea Ceccarelli" Remove constraint Author: "Andrea Ceccarelli" Topic computer.software_genre Remove constraint Topic: computer.software_genre
42 results on '"Andrea Ceccarelli"'

Search Results

1. Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring

2. Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape

3. FUSION—Fog Computing and Blockchain for Trusted Industrial Internet of Things

4. Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection

5. Towards enhanced databases for High Energy Physics

6. Identification of critical situations via Event Processing and Event Trust Analysis

8. System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions

9. Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform

11. Continuous Biometric Verification for Non-Repudiation of Remote Services

12. A Tool for Evolutionary Threat Analysis of Smart Grids

13. Exploring Anomaly Detection in Systems of Systems

14. Design, implementation, and assessment of a usable multi-biometric continuous authentication system

15. Usability Assessment in a Multi-Biometric Continuous Authentication System

16. A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events

17. On the impact of emergent properties on SoS security

18. Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids

19. Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study

20. Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy

21. A multi-criteria ranking of security countermeasures

22. Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE)

23. A Multi-layer Anomaly Detector for Dynamic Service-Based Systems

24. Continuous User Identity Verification for Trusted Operators in Control Rooms

25. Continuous and Transparent User Identity Verification for Secure Internet Services

26. System and Network Security: Anomaly Detection and Monitoring

27. Labelling relevant events to support the crisis management operator

28. Insider Threat Assessment: a Model-Based Methodology

29. A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection

30. Cost-Effective Testing for Critical Off-the-Shelf Services

31. On security countermeasures ranking through threat analysis

32. Meeting the challenges in the design and evaluation of a trackside real-time safety-critical system

33. Experimental analysis of the first order time difference of indicators used in the monitoring of complex systems

34. A methodology and supporting techniques for the quantitative assessment of insider threats

35. Improving Security of Internet Services through Continuous and Transparent User Identity Verification

36. Providing Safety-Critical and Real-Time Services for Mobile Devices in Uncertain Environment

37. A Testing Service for Lifelong Validation of Dynamic SOA

38. Improving Robustness of Network Fault Diagnosis to Uncertainty in Observations

39. Towards a Framework for Self-Adaptive Reliable Network Services in Highly-Uncertain Environments

40. A Self-Aware Clock for Pervasive Computing Systems

41. ALARP (A Railway Automatic Track Warning System Based on Distributed Personal Mobile Terminals)

42. Model-Driven Fault Injection in Java Source Code

Catalog

Books, media, physical & digital resources