LEADER 01444nam0-22004571i-450 001 990008426490403321 005 20181011131313.0 010 $a978-88-207-3164-9 035 $a000842649 035 $aFED01000842649 035 $a(Aleph)000842649FED01 035 $a000842649 100 $a20061127d2006----km-y0itay50------ba 101 0 $aita 102 $aIT 200 1 $aMetodi quantitativi delle decisioni$eper un corso di 10 crediti di base delle classi di laurea in discipline economiche e discipline economiche e della gestione aziendale$fVincenzo Aversa 205 $a4. ed. 210 $aNapoli$cLiguori$dc2006 215 $aX, 258 p.$d24 cm 225 1 $aManuali per l'università 610 0 $aFunzioni algebriche 610 0 $aEquazioni e disequazioni 610 0 $aMatematica generale$alibri di testo 676 $a510 700 1$aAversa,$bVincenzo$0104126 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008426490403321 952 $aMXXVII-A-294$b10440a$fMAS 952 $aMXXVII-A-295$b10440b$fMAS 952 $aMSMG12A$b18474/A$fDECBC 952 $aMSMG12B$b18474/B$fDECBC 952 $aMSMG12C$b18474/C$fDECBC 952 $aMSMG12D$b18474/D$fDECBC 952 $aMSMG12E$b18474/E$fDECBC 952 $aMSMG12F$b18474/F$fDECBC 952 $a110-G-26$bs.i.$fMA1 959 $aMAS 959 $aDECBC 996 $aMetodi quantitativi delle decisioni$9443721 997 $aUNINA LEADER 01280nam0 22003011i 450 001 SUN0034915 005 20050401120000.0 100 $a20050330d1976 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aˆLa ‰scienza nuova e altri scritti$fdi Giambattista Vico$ga cura di Nicola Abbagnano 210 $aTorino$cUtet$d1976 215 $a834 p., [5] c. di tav.$cill.$d24 cm. 410 1$1001SUN0034778$12001 $aClassici della filosofia$1210 $aTorino$cUtet. 620 $dTorino$3SUNL000001 676 $a195$cFilosofia occidentale moderna. Italia$v20 700 1$aVico$b, Giambattista$3SUNV029423$0151876 702 1$aAbbagnano$b, Nicola$3SUNV010449 712 $aUTET$3SUNV000072$4650 790 1$aVico, Gianbattista$zVico, Giambattista$3SUNV085034 790 1$aVico, Giovanni Battista$zVico, Giambattista$3SUNV085035 801 $aIT$bSOL$c20181109$gRICA 912 $aSUN0034915 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$d00 CONS XXI.Ad.CF. 18 $e00 1829 995 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA$h1829$kCONS XXI.Ad.CF. 18$op$qa 996 $aScienza nuova e altri scritti$9477031 997 $aUNICAMPANIA LEADER 04898nam 22006495 450 001 9911015682403321 005 20250723071729.0 010 $a3-031-97623-1 024 7 $a10.1007/978-3-031-97623-0 035 $a(CKB)39682377400041 035 $a(DE-He213)978-3-031-97623-0 035 $a(MiAaPQ)EBC32234592 035 $a(Au-PeEL)EBL32234592 035 $a(EXLCZ)9939682377400041 100 $a20250709d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment $e22nd International Conference, DIMVA 2025, Graz, Austria, July 9?11, 2025, Proceedings, Part II /$fedited by Manuel Egele, Veelasha Moonsamy, Daniel Gruss, Michele Carminati 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XVI, 331 p. 104 illus., 92 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15748 311 08$a3-031-97622-3 327 $a -- AI/ML & Security. -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. -- Hiding in Plain Sight: On the Robustness of AI-generated code detection. -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. -- Android & Patches. -- More Than You Signed Up For: Exposing Gaps in the Validation of Android?s App Signing. -- An Empirical Study of Multi-Language Security Patches in Open Source Software. -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. -- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. -- OS & Network. -- Taming the Linux Memory Allocator for Rapid Prototyping. -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. -- Resilient Systems. -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning. 330 $aThe two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9?11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15748 606 $aComputer networks 606 $aComputers 606 $aCriminology 606 $aQuantum theory 606 $aComputer Communication Networks 606 $aComputing Milieux 606 $aCrime Control and Security 606 $aQuantum Physics 615 0$aComputer networks. 615 0$aComputers. 615 0$aCriminology. 615 0$aQuantum theory. 615 14$aComputer Communication Networks. 615 24$aComputing Milieux. 615 24$aCrime Control and Security. 615 24$aQuantum Physics. 676 $a004.6 702 $aEgele$b Manuel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMoonsamy$b Veelasha$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGruss$b Daniel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCarminati$b Michele$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911015682403321 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$93395207 997 $aUNINA