Search for persons
X
?
Cyber-Physical Security for Critical Infrastructures Protection; Lecture Notes in Computer Science ,
2
Toward a Context-Aware Methodology for Information Security..:
, In:
?
Privacy Technologies and Policy; Lecture Notes in Computer Science ,
4
Italian National Framework for Cybersecurity and Data Prote..:
, In:
?
2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) ,
5
Cyber-attacks and threats for healthcare – a multi-layer th..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
6
Peel the Onion: Recognition of Android Apps Behind the Tor ..:
, In:
?
Policy-Based Autonomic Data Governance; Lecture Notes in Computer Science ,
7
FADa-CPS—Faults and Attacks Discrimination in Cyber Physica..:
, In:
?
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems ,
8
The overlay scan attack : inferring topologies of distri..:
, In:
?
Machine Learning for Embedded System Security ,
9