Segui
Tommaso Puccetti
Titolo
Citata da
Citata da
Anno
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection
T Zoppi, A Ceccarelli, T Puccetti, A Bondavalli
Computers & Security 127, 103107, 2023
282023
Detection of Adversarial Attacks by Observing Deep Features with Structured Data Algorithms
T Puccetti, A Ceccarelli, T Zoppi, A Bondavalli
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 125-134, 2023
22023
On the Efficacy of Metrics to Describe Adversarial Attacks
T Puccetti, T Zoppi, A Ceccarelli
arXiv preprint arXiv:2301.13028, 2023
12023
ROSPaCe: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System and IoT Networks
T Puccetti, S Nardi, C Cinquilli, T Zoppi, A Ceccarelli
Scientific Data 11 (1), 481, 2024
2024
Detection Latencies of Anomaly Detectors: An Overlooked Perspective?
T Puccetti, A Ceccarelli
arXiv preprint arXiv:2402.09082, 2024
2024
ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System
T Puccetti, S Nardi, C Cinquilli, T Zoppi, A Ceccarelli
arXiv preprint arXiv:2402.08468, 2024
2024
Early Detection of Unknown Attacks with Algorithms for Structured Data
T Puccetti
2023 IEEE 34th International Symposium on Software Reliability Engineering …, 2023
2023
Towards Robust Visual Odometry Systems Against Camera Lens Failures
L Sarti, H Bruno, T Puccetti, E Colombini, A Ceccarelli
2023 IEEE 34th International Symposium on Software Reliability Engineering …, 2023
2023
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–8