The rising of the Cyber-Physical System (CPS) and the Industry 4.0 parad...
We tend to consider emotions a manifestation of our innermost nature of ...
Federated learning (FL) goes beyond traditional, centralized machine lea...
Discovering vulnerabilities in applications of real-world complexity is ...
We propose PrYVeCT, a private-yet-verifiable contact tracing system. PrY...
The first step of every attack is reconnaissance, i.e., to acquire
infor...
A cyber range is an environment used for training security experts and
t...
Web Application Firewalls are widely used in production environments to
...