Stefano Berlato Efficient, Secure and Privacy-Preserving Protection of Sensitive Resources in Distributed Partially-Trusted Environments
Danilo Franco Fair Graph Representation Learning: empowering NIFTY via Biased Edge Dropout and Fair Attributes Preprocessing
Simone Magnani Costs-Effects Analysis of a Fully-Adaptive Anomaly and Intrusion Detection System
Marco Pernpruner Integrating Security By Design and Automated Security Analysis for Digital Identity Management
Antonio Ruggia The Dark Side of Android
Shekerta Aliu Shedding on the use of accounting information and disclosure practices in the EU electric power industry
Alessandro Borre Probabilistic risk assessment in a dynamic framework
Gabriele Casano Environmental risks and climate change: migration and community resilience in Eastern Sub-Saharan Africa - IGAD Region
Dario Hourngir Mitigation of thunderstorm-related high-impact weather conditions on the natural and built environment
Marco Berruti Criminal Liability into the Risk Society
Fabio Gaggero Defining cybersecurity from the legal side
Giacomo Benedetti On the Security of Software Supply Chains: a focus on CI/CD Pipelines
Francesco Pagano Security Evaluation of IoT Ecosystems
Eleonora Balestra The Hibridization of Human-Robotic Work Processes: the case of robotic surgery
Ronnie Rith Toward A New Paradigm of Corporate Social Responsibility in Professional Football Management
Maria Bolla Inherent safety approach towards PHAs sustainable production from wastes as carbon sources
Alessandro Iacopino Surface Soil Moisture Estimate by Integration of Remote Sensing and Low-Cost Field Sensor Network
Soheil Mohammadi Multi-risk resilience-based planning framework to improve the recoverability of urban settlements
Silvia Pinasco Seismic Vulnerability of Historical Masonry Buildings in Aggregate
Agnès Diaz The Quality of Crowdlaw’s Legislation
Castellano
Matteo Mazziotti Attention deficit: why democracies allow politicians to abuse the military
di Celso
Mattia Sguazzini (Re)Structuring power in the cyberspace