Sfoglia per Rivista
A novel method for evaluating the impact of residential demand response in a real time distribution energy market
2016-01-01 Siano, Pierluigi; Sarno, D; Straccia, Lorena; Marrazzo Anna, Teresa
Experimentations with source camera identification and Online Social Networks
2013-01-01 Castiglione, Aniello; Cattaneo, Giuseppe; Cembalo, Maurizio; Ferraro Petrillo, Umberto
An intelligent security architecture for distributed firewalling environments
2013-01-01 de Santis, Alfredo; Castiglione, Aniello; Fiore, Ugo; Palmieri, Francesco
Machine learning and soft computing for ICT security: an overview of current trends
2013-01-01 Camastra, Francesco; Ciaramella, Angelo; Staiano, Antonino
Off-line enterprise rights management leveraging biometric key binding and secure hardware
2019-01-01 Catuogno, Luigi; Galdi, Clemente; Riccio, Daniel
On user authentication by means of video events recognition
2014-01-01 Catuogno, Luigi; Galdi, Clemente
Prosperity of IT Security Technologies in Homeland Defense
2014-01-01 Yim, Kangbin; Castiglione, Aniello; You, Ilsun
Secure and distributed video surveillance via portable devices
2014-01-01 Albano, Pietro; Bruno, Andrea; Carpentieri, Bruno; Castiglione, Aniello; Castiglione, Arcangelo; Palmieri, Francesco; Pizzolante, Raffaele; Yim, Kangbin; You, Ilsun
Special issue on cloud, wireless and e-commerce security
2013-01-01 Leu, Fang-Yie; Lin, Chu-Hsing; Castiglione, Aniello
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services
2015-01-01 Coppolino, Luigi; D'Antonio, Salvatore; Formicola, Valerio; Massei, Carmine; Romano, Luigi
Working together: a DBN approach for individual and group activity recognition
2020-01-01 Rossi, S.; Acampora, G.; Staffa, M.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A novel method for evaluating the impact of residential demand response in a real time distribution energy market | 1-gen-2016 | Siano, Pierluigi; Sarno, D; Straccia, Lorena; Marrazzo Anna, Teresa | |
Experimentations with source camera identification and Online Social Networks | 1-gen-2013 | Castiglione, Aniello; Cattaneo, Giuseppe; Cembalo, Maurizio; Ferraro Petrillo, Umberto | |
An intelligent security architecture for distributed firewalling environments | 1-gen-2013 | de Santis, Alfredo; Castiglione, Aniello; Fiore, Ugo; Palmieri, Francesco | |
Machine learning and soft computing for ICT security: an overview of current trends | 1-gen-2013 | Camastra, Francesco; Ciaramella, Angelo; Staiano, Antonino | |
Off-line enterprise rights management leveraging biometric key binding and secure hardware | 1-gen-2019 | Catuogno, Luigi; Galdi, Clemente; Riccio, Daniel | |
On user authentication by means of video events recognition | 1-gen-2014 | Catuogno, Luigi; Galdi, Clemente | |
Prosperity of IT Security Technologies in Homeland Defense | 1-gen-2014 | Yim, Kangbin; Castiglione, Aniello; You, Ilsun | |
Secure and distributed video surveillance via portable devices | 1-gen-2014 | Albano, Pietro; Bruno, Andrea; Carpentieri, Bruno; Castiglione, Aniello; Castiglione, Arcangelo; Palmieri, Francesco; Pizzolante, Raffaele; Yim, Kangbin; You, Ilsun | |
Special issue on cloud, wireless and e-commerce security | 1-gen-2013 | Leu, Fang-Yie; Lin, Chu-Hsing; Castiglione, Aniello | |
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services | 1-gen-2015 | Coppolino, Luigi; D'Antonio, Salvatore; Formicola, Valerio; Massei, Carmine; Romano, Luigi | |
Working together: a DBN approach for individual and group activity recognition | 1-gen-2020 | Rossi, S.; Acampora, G.; Staffa, M. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile