Sfoglia per Autore  FIORAVANTI, CAMILLA

Opzioni
Mostrati risultati da 1 a 12 di 12
Titolo Data di pubblicazione Autore(i) File
A Wearable Platform to Identify Workers Unsafety Situations 1-gen-2019 Faramondi, L; Bragatto, P; Fioravanti, C; Gnoni, Mg; Guarino, S; Setola, R
A privacy-oriented solution for the improvement of workers safety 1-gen-2020 Faramondi, L.; Bragatto, P.; Fioravanti, C.; Gnoni, M. G.; Guarino, S.; Setola, R.
Anomaly and attack detection in supervisory control networks for cyber-physical systems 1-gen-2020 Del Prete, E.; Pera, F.; Faramondi, L.; Fioravanti, C.; Guarino, S.; Oliva, G.; Setola, R.
New Perspectives on Wearable Devices and Electronic Health Record Systems 1-gen-2020 Assenza, G; Fioravanti, C; Guarino, S; Petrassi, V
Distributed and Asynchronous Secure State Reconstruction for Cyber-Physical Systems 1-gen-2022 Fioravanti, C; Oliva, G; Panzieri, S
Private Consensus using Chaotic Oscillator-Based Encryption 1-gen-2022 Fioravanti, C; Oliva, G; Panzieri, S; Hadjicostis, Cn
Distributed Asynchronous Projection onto the Intersection of Convex Sets 1-gen-2022 Fioravanti, C; Oliva, G; Panzieri, S
A Risk Assessment Framework for Critical Infrastructure Based on the Analytic Hierarchy Process 1-gen-2022 Fioravanti, C.; Guarino, S.; Mazzá, B.; Nobili, M.; Santucci, F.; Ansaldi, S. M.
A Secure Communication Protocol with Application to Networked Kalman Filtering 1-gen-2022 Fioravanti, C; Oliva, G; Panzieri, S; Hadjicostis, Cn
Towards Asynchronous State Reconstruction via Time Projection. Preliminary Results in the case of two Sensors 1-gen-2022 Fioravanti, C; Oliva, G
Secure gossip against intermittently malicious agents 1-gen-2023 Fioravanti, C.; Oliva, G.; Hadjicostis, C.
Exploiting the Synchronization of Nonlinear Dynamics to Secure Distributed Consensus 1-gen-2023 Fioravanti, Camilla; Bonagura, Valeria; Oliva, Gabriele; N Hadjicostis, Christoforos; Panzieri, Stefano
Mostrati risultati da 1 a 12 di 12
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile