EGIDI, Lavinia
EGIDI, Lavinia
Dipartimento di Scienze e Innovazione Tecnologica
A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems
2019-01-01 Cerotti, Davide; CODETTA RAITERI, Daniele; Dondossola, Giovanna; Egidi, Lavinia; Franceschinis, Giuliana; Portinale, Luigi; Terruggia, Roberta
A flexible approach to user-defined symbolic granularities in temporal databases
2005-01-01 Egidi, Lavinia; Terenziani, Paolo
A lattice of classes of user-defined symbolic periodicities
2004-01-01 Egidi, Lavinia; Terenziani, Paolo
A mathematical framework for the semantics of symbolic languages representing periodic time
2004-01-01 Egidi, Lavinia; Terenziani, Paolo
A mathematical framework for the semantics of symbolic languages representing periodic time
2006-01-01 Egidi, Lavinia; Terenziani, Paolo
A methodology for qualitative/quantitative analysis of weighted attack trees
2013-01-01 Bobbio, Andrea; Egidi, Lavinia; Terruggia, Roberta
A modular approach to user-defined symbolic periodicities
2008-01-01 Egidi, Lavinia; Terenziani, Paolo
A Modular Infrastructure for the Validation of Cyberattack Detection Systems
2023-01-01 Cerotti, Davide; CODETTA RAITERI, Daniele; Dondossola, Giovanna; Egidi, Lavinia; Franceschinis, Giuliana; Portinale, Luigi; Terruggia, Roberta
An Architecture to Securely Enrich and Distribute MP3 over the Internet
2004-01-01 Egidi, Lavinia; M., Furini
Analisi e rilevamento intelligente di processi di attacco alle Smart-Grid
2019-01-01 Cerotti, Davide; CODETTA RAITERI, Daniele; Dondossola, Giovanna; Egidi, Lavinia; Franceschinis, Giuliana Annamaria; Portinale, Luigi; Terruggia, Roberta
Analysis and Detection of Cyber Attack Processes targeting Smart Grids
2019-01-01 Cerotti, D.; Codetta-Raiteri, D.; Egidi, L.; Franceschinis, G.; Portinale, L.; Dondossola, G.; Terruggia, R.
Authentication and access delegation with user-released certificates,
2003-01-01 Egidi, Lavinia; M., Melato
Better Spaced Seeds Using Quadratic Residues
2013-01-01 Egidi, Lavinia; Manzini, Giovanni
Bringing Multimedia Contents into MP3 Files,
2005-01-01 Egidi, Lavinia; M., Furini
Completeness, Structural Rules and Types
1989-01-01 Egidi, Lavinia; G., Mascari
Decentralized rate-limiting of outbound e-mail,
2004-01-01 Egidi, Lavinia; P., Lova; G., Porcelli
Design and analysis of periodic multiple seeds
2014-01-01 Egidi, Lavinia; Manzini, Giovanni
Double exponential inseparability of Robinson subsystem Q+
2011-01-01 Egidi, Lavinia; Faglia, G.
Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources
2020-01-01 Cerotti, D.; Codetta Raiteri, D.; Dondossola, G.; Egidi, L.; Franceschinis, G.; Portinale, L.; Terruggia, R.
External memory BWT and LCP computation for sequence collections with applications
2018-01-01 Egidi, Lavinia; Louza, Felipe A.; Manzini, Giovanni; Telles, Guilherme P.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems | 1-gen-2019 | Cerotti, Davide; CODETTA RAITERI, Daniele; Dondossola, Giovanna; Egidi, Lavinia; Franceschinis, Giuliana; Portinale, Luigi; Terruggia, Roberta | |
A flexible approach to user-defined symbolic granularities in temporal databases | 1-gen-2005 | Egidi, Lavinia; Terenziani, Paolo | |
A lattice of classes of user-defined symbolic periodicities | 1-gen-2004 | Egidi, Lavinia; Terenziani, Paolo | |
A mathematical framework for the semantics of symbolic languages representing periodic time | 1-gen-2004 | Egidi, Lavinia; Terenziani, Paolo | |
A mathematical framework for the semantics of symbolic languages representing periodic time | 1-gen-2006 | Egidi, Lavinia; Terenziani, Paolo | |
A methodology for qualitative/quantitative analysis of weighted attack trees | 1-gen-2013 | Bobbio, Andrea; Egidi, Lavinia; Terruggia, Roberta | |
A modular approach to user-defined symbolic periodicities | 1-gen-2008 | Egidi, Lavinia; Terenziani, Paolo | |
A Modular Infrastructure for the Validation of Cyberattack Detection Systems | 1-gen-2023 | Cerotti, Davide; CODETTA RAITERI, Daniele; Dondossola, Giovanna; Egidi, Lavinia; Franceschinis, Giuliana; Portinale, Luigi; Terruggia, Roberta | |
An Architecture to Securely Enrich and Distribute MP3 over the Internet | 1-gen-2004 | Egidi, Lavinia; M., Furini | |
Analisi e rilevamento intelligente di processi di attacco alle Smart-Grid | 1-gen-2019 | Cerotti, Davide; CODETTA RAITERI, Daniele; Dondossola, Giovanna; Egidi, Lavinia; Franceschinis, Giuliana Annamaria; Portinale, Luigi; Terruggia, Roberta | |
Analysis and Detection of Cyber Attack Processes targeting Smart Grids | 1-gen-2019 | Cerotti, D.; Codetta-Raiteri, D.; Egidi, L.; Franceschinis, G.; Portinale, L.; Dondossola, G.; Terruggia, R. | |
Authentication and access delegation with user-released certificates, | 1-gen-2003 | Egidi, Lavinia; M., Melato | |
Better Spaced Seeds Using Quadratic Residues | 1-gen-2013 | Egidi, Lavinia; Manzini, Giovanni | |
Bringing Multimedia Contents into MP3 Files, | 1-gen-2005 | Egidi, Lavinia; M., Furini | |
Completeness, Structural Rules and Types | 1-gen-1989 | Egidi, Lavinia; G., Mascari | |
Decentralized rate-limiting of outbound e-mail, | 1-gen-2004 | Egidi, Lavinia; P., Lova; G., Porcelli | |
Design and analysis of periodic multiple seeds | 1-gen-2014 | Egidi, Lavinia; Manzini, Giovanni | |
Double exponential inseparability of Robinson subsystem Q+ | 1-gen-2011 | Egidi, Lavinia; Faglia, G. | |
Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources | 1-gen-2020 | Cerotti, D.; Codetta Raiteri, D.; Dondossola, G.; Egidi, L.; Franceschinis, G.; Portinale, L.; Terruggia, R. | |
External memory BWT and LCP computation for sequence collections with applications | 1-gen-2018 | Egidi, Lavinia; Louza, Felipe A.; Manzini, Giovanni; Telles, Guilherme P. |