Mariconti, A.
15  Ergebnisse:
Personensuche X
?
1

Active Dual Level Gate Driver for Dead Time and Switching L..:

, In: 2020 32nd International Symposium on Power Semiconductor Devices and ICs (ISPSD),
Mandelli, E. ; Mariconti, A. ; Ruzza, S.. - p. 258-261 , 2020
 
?
2

Active Dual Level Gate Driver for Switching Losses Reductio..:

, In: 2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS),
Mandelli, E. ; Mariconti, A. ; Ruzza, S.. - p. 334-337 , 2019
 
?
3

Waiting for Q: An Exploration of QAnon Users' Online Migrat..:

, In: Proceedings of the 16th ACM Web Science Conference,
Papasavva, Antonis ; Mariconti, Enrico - p. 250-261 , 2024
 
?
4

Study of Particulate Matter Formation at High-Performance E..:

, In: 2023 IEEE International Workshop on Metrology for Automotive (MetroAutomotive),
 
?
5

Short Paper: DeFi Deception—Uncovering the Prevalence of Ru..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
 
?
6

Shedding Light on the Targeted Victim Profiles of Malicious..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
7

The Ethics of Going Deep: Challenges in Machine Learning fo..:

, In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
Eusebi, Aliai ; Vasek, Marie ; Cockbain, Ella. - p. 533-537 , 2022
 
?
8

CERBERUS : Exploring Federated Prediction of Security Ev..:

, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security,
Naseri, Mohammad ; Han, Yufei ; Mariconti, Enrico... - p. 2337-2351 , 2022
 
?
9

BOTection: Bot Detection by Building Markov Chain Models of..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
 
?
10

Tiresias : Predicting Security Events Through Deep Learn..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
 
?
11

Ex-Ray : Detection of History-Leaking Browser Extensions:

, In: Proceedings of the 33rd Annual Computer Security Applications Conference,
 
?
12

What's in a Name? : Understanding Profile Name Reuse on ..:

, In: Proceedings of the 26th International Conference on World Wide Web,
 
?
13

What Happens After You Are Pwnd : Understanding the Use ..:

, In: Proceedings of the 2016 Internet Measurement Conference,
 
?
14

Why allowing profile name reuse is a bad idea:

, In: Proceedings of the 9th European Workshop on System Security,
 
1-15