04b Atto di convegno in volume
-
-
-
-
-
Advance Persistent Threats (APTs) are the most challenging adversaries for financial companies and critical infrastructures. Many open source platforms present various information about APTs but do not fully cover multiple edges of the diamond model, or may be easily used for research purpose. For...
-
Remote attestation protocols are widely used to detect device configuration (e.g., software and/or data) compromise in Internet of Things (IoT) scenarios. Unfortunately, the performances of such protocols are unsatisfactory when dealing with thousands of smart devices. Recently, researchers are...
-
-
The rise of data mining and machine learning use in many applications has brought new challenges related to classification. Here, we deal with the following challenge: how to interpret and understand the reason behind a classifier's prediction. Indeed, understanding the behaviour of a classifier is...
-
In this paper, the problem of stabilizing nonlinear discrete-time systems affected by delayed state measures is addressed under average passivity-based control. The contribution stands in the introduction of a new delay-free dynamics which is used for the design of the stabilizing feedback....
-