Sfoglia per Rivista IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Mostrati risultati da 1 a 5 di 5
FakeDB: Generating fake synthetic databases
2024-01-01 Gao, C.; Jajodia, S.; Pugliese, A.; Subrahmanian, V. S.
GAIT: A game-theoretic defense against intellectual property theft
2023-01-01 Zhang, Youzhi; Chen, Dongkai; Jajodia, Sushil; Pugliese, Andrea; Subrahmanian, V. S.; Xiong, Yanhai
Generating Fake Documents using Probabilistic Logic Graphs
2022-01-01 Han, Qian; Molinaro, Cristian; Picariello, Antonio; Sperli, Giancarlo; Subrahmanian, Venkatramanan S.; Xiong, Yanhai
MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT
2024-01-01 Buccafurri, Francesco; De Angelis, Vincenzo; Lazzaro, Sara
PUF-Based Authentication-Oriented Architecture for Identification Tags
2024-01-01 Rullo, A.; Felicetti, C.; Vatalaro, M.; De Rose, R.; Lanuzza, M.; Crupi, F.; Sacca, D.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
FakeDB: Generating fake synthetic databases | 1-gen-2024 | Gao, C.; Jajodia, S.; Pugliese, A.; Subrahmanian, V. S. | |
GAIT: A game-theoretic defense against intellectual property theft | 1-gen-2023 | Zhang, Youzhi; Chen, Dongkai; Jajodia, Sushil; Pugliese, Andrea; Subrahmanian, V. S.; Xiong, Yanhai | |
Generating Fake Documents using Probabilistic Logic Graphs | 1-gen-2022 | Han, Qian; Molinaro, Cristian; Picariello, Antonio; Sperli, Giancarlo; Subrahmanian, Venkatramanan S.; Xiong, Yanhai | |
MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT | 1-gen-2024 | Buccafurri, Francesco; De Angelis, Vincenzo; Lazzaro, Sara | |
PUF-Based Authentication-Oriented Architecture for Identification Tags | 1-gen-2024 | Rullo, A.; Felicetti, C.; Vatalaro, M.; De Rose, R.; Lanuzza, M.; Crupi, F.; Sacca, D. |
Mostrati risultati da 1 a 5 di 5
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile