Di Pietro, Roberto.
Overview
Works: | 1 works in 2 publications in 1 languages |
---|
Titles
Intrusion Detection Systems
by:
Mancini, Luigi V.; SpringerLink (Online service); Di Pietro, Roberto.
(Language materials, printed)
Data privacy management and autonomous spontaneous security = 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers /
by:
SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Di Pietro, Roberto.
(Language materials, printed)
Role mining in business = taming role-based access control administration /
by:
Di Pietro, Roberto.; Ocello, Alberto.; Colantonio, Alessandro.
(Language materials, printed)
Computer Security – ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III /
by:
Di Pietro, Roberto.; Meng, Weizhi.; Atluri, Vijayalakshmi.; Jensen, Christian D.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Physical layer security in power line communications = fundamentals, models and applications /
by:
Hernández Fernández, Javier.; Di Pietro, Roberto.; Omri, Aymen.; SpringerLink (Online service)
(Language materials, printed)
New Dimensions of Information Warfare
by:
Raponi, Simone.; SpringerLink (Online service); Cresci, Stefano.; Caprolu, Maurantonio.; Di Pietro, Roberto.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Security, Privacy, and Anonymity in Computation, Communication, and Storage = SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings /
by:
Wang, Guojun.; Chen, Bing.; Di Pietro, Roberto.; Yan, Xuefeng.; Han, Hao.; Li, Wei.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Intrusion Detection Systems
by:
Di Pietro, Roberto.; Mancini, Luigi V.; SpringerLink (Online service)
(Language materials, printed)
Security, Privacy, and Anonymity in Computation, Communication, and Storage = 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings /
by:
Di Pietro, Roberto.; Wang, Guojun.; Chen, Bing.; Yan, Xuefeng.; Li, Wei.; Han, Hao.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Computer Security – ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II /
by:
Atluri, Vijayalakshmi.; Di Pietro, Roberto.; Meng, Weizhi.; SpringerLink (Online service); Jensen, Christian D.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Computer Security – ESORICS 2022 = 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part I /
by:
Meng, Weizhi.; Di Pietro, Roberto.; Atluri, Vijayalakshmi.; SpringerLink (Online service); Jensen, Christian D.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Show more
Fewer
Subjects
Computer System Implementation.
Data protection.
Computer Communication Networks.
Software engineering.
Computer and Information Systems Applications.
Application software.
e-Commerce/e-business.
Computers.
Critical Thinking.
Mobile and Network Security.
Computer networks .
Computers
Computers, Special purpose.
Computer Science.
Management of Computing and Information Systems.
Computer communication systems.
Security.
Special Purpose and Application-Based Systems.
Computer systems.
Computer networks—Security measures.
Computing Milieux.
Data encryption (Computer science)
Computer security.
Computer organization.
Systems and Data Security.
Computer Systems Organization and Communication Networks.
Data encryption (Computer science).
Information Storage and Retrieval.
Computer networks.
Software Engineering.
Security Services.
Data Encryption.
Privacy.
Communications Engineering, Networks.
Computer networks
Electric lines
Computer security
Information Systems and Communication Service.
Cryptology.
Principles and Models of Security.
Data and Information Security.
Cryptography.