Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 11 di 11
Titolo Data di pubblicazione Autore(i) File
A low cost smart glove for visually impaired people mobility 1-gen-2015 Bernieri, Giuseppe; Faramondi, Luca; Pascucci, Federica
Communications network analysis in a SCADA system testbed under cyber-attacks 1-gen-2015 Miciolino, Estefania Etcheves; Bernieri, Giuseppe; Pascucci, Federica; Setola, Roberto
Augmenting white cane reliability using smart glove for visually impaired people 1-gen-2015 Bernieri, Giuseppe; Faramondi, Luca; Pascucci, Federica
A testbed for integrated fault diagnosis and cyber security investigation 1-gen-2016 Bernieri, Giuseppe; Del Moro, Fabio; Faramondi, Luca; Pascucci, Federica
A Multiple-Criteria Decision Making method as support for critical infrastructure protection and Intrusion Detection System 1-gen-2016 Bernieri, Giuseppe; Damiani, Stefano; Del Moro, Fabio; Faramondi, Luca; Pascucci, Federica; Tambone, Francesco
Monitoring system reaction in cyber-physical testbed under cyber-attacks 1-gen-2017 Bernieri, Giuseppe; Etchevés Miciolino, Estefanía; Pascucci, Federica; Setola, Roberto
Network anomaly detection in critical infrastructure based on mininet network simulator 1-gen-2017 Bernieri, Giuseppe; Pascucci, Federica; Lopez, Javier
Fault diagnosis and network anomaly detection in water infrastructures 1-gen-2017 Miciolino, Estefanía Etchevés; Setola, Roberto; Bernieri, Giuseppe; Panzieri, Stefano; Pascucci, Federica; Polycarpou, Marios M.
A Novel Architecture for Cyber-Physical Security in Industrial Control Networks 1-gen-2018 Bernieri, Giuseppe; Conti, Mauro; Pascucci, Federica
Detecting integrity attacks in IoT-based cyber physical systems: A case study on hydra testbed 1-gen-2018 Battisti, Federica; Bernieri, Giuseppe; Carli, Marco; Lopardo, Michela; Pascucci, Federica
Covert channels-based stealth attacks in industry 4.0 1-gen-2019 Alcaraz, C.; Bernieri, G.; Pascucci, F.; Lopez, J.; Setola, R.
Mostrati risultati da 1 a 11 di 11
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile