Introduction
Past research has shown that over 8 months may elapse between the time a network is compromised and the time the attack is discovered. During this long gap, attackers can steal valuable intellectual property from the victim.
Different strategies are required for generating reliable documents that may confuse the attacker by limiting the effects of his action.
Available Theses
- GAN network for producing reliable fake documents;
- Multimodal analysis for IP protection;
- Image analysis for producing reliable fake documents.
Theses In progress
- None at the moment
Project & Collaborations
In progress
References
- Giancarlo Sperlì (This email address is being protected from spambots. You need JavaScript enabled to view it.)