Breve, Bernardo
Breve, Bernardo
Dipartimento di Informatica/DI
An End-User Development Approach to Secure Smart Environments
2021-01-01 Breve, B.; Desolda, G.; Deufemia, V.; Greco, F.; Matera, M.
An intrusion detection framework for non-expert users
2020-01-01 Breve, B.; Cirillo, S.; Deufemia, V.
Brain tumors classification from MRI images: A comparative study between different neural networks
2022-01-01 Breve, B.; Caruccio, L.; Cimino, G.; Cirillo, S.; Iuliano, G.; Polese, G.
Dependency Visualization in Data Stream Profiling
2021-01-01 Breve, B.; Caruccio, L.; Cirillo, S.; Deufemia, V.; Polese, G.
Empowering end-users in the specification of security rules
2020-01-01 Breve, B.; Deufemia, V.
Enhancing user awareness during internet browsing
2020-01-01 Breve, B.; Caruccio, L.; Cirillo, S.; Desiato, D.; Deufemia, V.; Polese, G.
Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms with NLP Models
2023-01-01 Breve, Bernardo; Cimino, Gaetano; Deufemia, Vincenzo
Imputation of Missing Values through Profiling Metadata
2022-01-01 Breve, B.; Caruccio, L.; Deufemia, V.; Polese, G.
RENUVER: A Missing Value Imputation Algorithm based on Relaxed Functional Dependencies
2022-01-01 Breve, Bernardo; Caruccio, Loredana; Deufemia, Vincenzo; Polese, Giuseppe
Towards a Classification Model for Identifying Risky IFTTT Applets
2021-01-01 Breve, B.; Cimino, G.; Deufemia, V.
Towards Explainable Security for ECA Rules
2022-01-01 Breve, B.; Cimino, G.; Deufemia, V.
Visualizing dependencies during incremental discovery processes
2020-01-01 Breve, B.; Caruccio, L.; Cirillo, S.; Deufemia, V.; Polese, G.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
An End-User Development Approach to Secure Smart Environments | 1-gen-2021 | Breve, B.; Desolda, G.; Deufemia, V.; Greco, F.; Matera, M. | |
An intrusion detection framework for non-expert users | 1-gen-2020 | Breve, B.; Cirillo, S.; Deufemia, V. | |
Brain tumors classification from MRI images: A comparative study between different neural networks | 1-gen-2022 | Breve, B.; Caruccio, L.; Cimino, G.; Cirillo, S.; Iuliano, G.; Polese, G. | |
Dependency Visualization in Data Stream Profiling | 1-gen-2021 | Breve, B.; Caruccio, L.; Cirillo, S.; Deufemia, V.; Polese, G. | |
Empowering end-users in the specification of security rules | 1-gen-2020 | Breve, B.; Deufemia, V. | |
Enhancing user awareness during internet browsing | 1-gen-2020 | Breve, B.; Caruccio, L.; Cirillo, S.; Desiato, D.; Deufemia, V.; Polese, G. | |
Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms with NLP Models | 1-gen-2023 | Breve, Bernardo; Cimino, Gaetano; Deufemia, Vincenzo | |
Imputation of Missing Values through Profiling Metadata | 1-gen-2022 | Breve, B.; Caruccio, L.; Deufemia, V.; Polese, G. | |
RENUVER: A Missing Value Imputation Algorithm based on Relaxed Functional Dependencies | 1-gen-2022 | Breve, Bernardo; Caruccio, Loredana; Deufemia, Vincenzo; Polese, Giuseppe | |
Towards a Classification Model for Identifying Risky IFTTT Applets | 1-gen-2021 | Breve, B.; Cimino, G.; Deufemia, V. | |
Towards Explainable Security for ECA Rules | 1-gen-2022 | Breve, B.; Cimino, G.; Deufemia, V. | |
Visualizing dependencies during incremental discovery processes | 1-gen-2020 | Breve, B.; Caruccio, L.; Cirillo, S.; Deufemia, V.; Polese, G. |