Modules running in the period selected: 23.
Click on the module to see the timetable and course details.
There you will find information, resources and services useful during your time at the University (Student’s exam record, your study plan on ESSE3, Distance Learning courses, university email account, office forms, administrative procedures, etc.). You can log into MyUnivr with your GIA login details: only in this way will you be able to receive notification of all the notices from your teachers and your secretariat via email and also via the Univr app.
MyUnivrDi seguito sono elencati gli eventi e gli insegnamenti di Terza Missione collegati al docente:
Topic | Description | Research area |
---|---|---|
Formal methods and theory of security | Development of formal, and possibly automated, methods for the analysis of the security of software systems |
Cybersecurity
Formal methods and theory of security |
Formal methods and theory of security | Development of formal, and possibly automated, methods for the analysis of the security of software systems |
Software Engineering and Formal Verification
Formal methods and theory of security |
Network security | Development of techniques and tools for the security of computer networks |
Cybersecurity
Network security |
Network security | Development of techniques and tools for the security of computer networks |
Software Engineering and Formal Verification
Network security |
Code protection | Development of formal techniques and tools for the protection of software. |
Cybersecurity
Formal methods and theory of security |
Code protection | Development of formal techniques and tools for the protection of software. |
Software Engineering and Formal Verification
Formal methods and theory of security |
Software and application security | Development of security methodologies and technologies for the security of software systems and Internet applications |
Cybersecurity
Software and application security |
Software and application security | Development of security methodologies and technologies for the security of software systems and Internet applications |
Software Engineering and Formal Verification
Software and application security |
Software creation and management | Study and development of formal and semi-formal methodologies and technologies for the creation and management of software systems |
Cybersecurity
Software creation and management |
Software creation and management | Study and development of formal and semi-formal methodologies and technologies for the creation and management of software systems |
Software Engineering and Formal Verification
Software creation and management |
Software Verification | Decision procedures for satisfiability modulo theories and their application to check program properties; invariant generation by theorem proving; interpolating theorem proving; abstraction refinement for either model checking or static analysis by theorem proving |
Cybersecurity
Software creation and management |
Software Verification | Decision procedures for satisfiability modulo theories and their application to check program properties; invariant generation by theorem proving; interpolating theorem proving; abstraction refinement for either model checking or static analysis by theorem proving |
Software Engineering and Formal Verification
Software creation and management |
******** CSS e script comuni siti DOL - frase 9957 ********p>