Marco Caselli
290  Ergebnisse:
Personensuche X
?
 
?
3

Introduction: State Capacity, Capacity to Aspire and Layere..:

, In: Europe in a Global Context; Migrants' (Im)mobilities in Three European Urban Contexts,
 
?
4

Conclusion: Towards a Sociological Understanding of Layered..:

, In: Europe in a Global Context; Migrants' (Im)mobilities in Three European Urban Contexts,
 
?
5

Peruvians in Milan: Subsidiarity the Other Way Round:

, In: Europe in a Global Context; Migrants' (Im)mobilities in Three European Urban Contexts,
Caselli, Marco - p. 85-114 , 2024
 
?
6

Identifying Near-Optimal Single-Shot Attacks on ICSs with L..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
7

Contextualizing System Calls in Containers for Anomaly-Base..:

, In: Proceedings of the 2022 on Cloud Computing Security Workshop,
 
?
8

BACGraph: Automatic Extraction of Object Relationships in t..:

, In: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S),
 
?
10

Putting Attacks in Context: A Building Automation Testbed f..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
11

Measuring and visualizing cyber threat intelligence quality:

Schlette, Daniel ; Böhm, Fabian ; Caselli, Marco.
International Journal of Information Security.  20 (2020)  1 - p. 21-38 , 2020
 
?
12

BACRank: Ranking Building Automation and Control System Com..:

, In: Lecture Notes in Computer Science; Computer Safety, Reliability, and Security,
 
?
13

"Let Us Help Them at Home": Policies and Misunderstandings ..:

Caselli, Marco
Journal of International Migration and Integration.  20 (2019)  4 - p. 983-993 , 2019
 
?
14

DECANTeR : DEteCtion of Anomalous outbouNd HTTP TRaffic ..:

, In: Proceedings of the 33rd Annual Computer Security Applications Conference,
 
?
15

Automatic Deployment of Specification-based Intrusion Detec..:

, In: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy,
 
1-15
Mehr Literatur finden