Titolo | Data di pubblicazione | Autori | Tipo | Abstract |
---|
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware | 2019 | UGARTE ARZAC, DENIS ; MAIORCA, DAVIDE ; CARA, FABRIZIO ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
On the effectiveness of system API-related information for Android ransomware detection | 2019 | SCALAS, MICHELE ; MAIORCA, DAVIDE ; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; GIACINTO, GIORGIO | 1 Contributo su Rivista::1.1 Articolo in rivista | |
Towards adversarial malware detection: lessons learned from PDF-based attacks | 2019 | MAIORCA, DAVIDE ; BIGGIO, BATTISTA ; GIACINTO, GIORGIO | 1 Contributo su Rivista::1.1 Articolo in rivista | |
Ten years of relevance score for content based image retrieval | 2018 | PUTZU, LORENZO ; PIRAS, LUCA ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | 2018 | Bojan Kolosnjaji; DEMONTIS, AMBRA ; BIGGIO, BATTISTA ; MAIORCA, DAVIDE ; GIACINTO, GIORGIO ; Claudia Eckert; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | - |
Explaining Black-box Android Malware Detection | 2018 | MELIS, MARCO ; MAIORCA, DAVIDE ; BIGGIO, BATTISTA ; GIACINTO, GIORGIO ; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Information fusion in content based image retrieval: A comprehensive overview | 2017 | PIRAS, LUCA ; GIACINTO, GIORGIO | 1 Contributo su Rivista::1.1 Articolo in rivista | |
DroidSieve: Fast and accurate classification of obfuscated android malware | 2017 | Suarez Tangil, Guillermo; Dash, Santanu Kumar; AHMADI, MANSOUR ; Kinder, Johannes; GIACINTO, GIORGIO ; Cavallaro, Lorenzo | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
R-PackDroid: API package-based characterization and detection of mobile ransomware | 2017 | MAIORCA, DAVIDE ; Mercaldo, Francesco; GIACINTO, GIORGIO ; Visaggio, Corrado Aaron; Martinelli, Fabio | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
IntelliAV: Toward the feasibility of building intelligent anti-malware on android devices | 2017 | AHMADI, MANSOUR ; SOTGIU, ANGELO ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Multimodal retrieval with diversification and relevance feedback for tourist attraction images | 2017 | Dang Nguyen, Duc Tien; PIRAS, LUCA ; GIACINTO, GIORGIO ; Boato, Giulia; De Natale, Francesco GB | 1 Contributo su Rivista::1.1 Articolo in rivista | |
Infinity-norm support vector machines against adversarial label contamination | 2017 | DEMONTIS, AMBRA ; BIGGIO, BATTISTA ; FUMERA, GIORGIO ; GIACINTO, GIORGIO ; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Detection of malicious scripting code through discriminant and adversary-aware API analysis | 2017 | MAIORCA, DAVIDE ; RUSSU, PAOLO ; CORONA, IGINO ; BIGGIO, BATTISTA ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Deepsquatting: Learning-based typosquatting detection at deeper domain levels | 2017 | PIREDDA, PAOLO ; ARIU, DAVIDE ; BIGGIO, BATTISTA ; CORONA, IGINO ; PIRAS, LUCA ; GIACINTO, GIORGIO ; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection | 2019 | DEMONTIS, AMBRA ; MELIS, MARCO ; BIGGIO, BATTISTA ; MAIORCA, DAVIDE ; Arp, Daniel; Rieck, Konrad; CORONA, IGINO ; GIACINTO, GIORGIO ; ROLI, FABIO | 1 Contributo su Rivista::1.1 Articolo in rivista | |
Who are you? A statistical approach to measuring user authenticity | 2016 | Jain S; Mandell Freeman M; BIGGIO, BATTISTA ; Duermuth M; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Detecting Misuse of Google Cloud Messaging in Android Badware | 2016 | AHMADI, MANSOUR ; BIGGIO, BATTISTA ; Arzt S; ARIU, DAVIDE ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps | 2016 | ARIU, DAVIDE ; DIDACI, LUCA ; FUMERA, GIORGIO ; GIACINTO, GIORGIO ; ROLI, FABIO ; Frumento, Enrico; Freschi, Federica | 2 Contributo in Volume::2.1 Contributo in volume (Capitolo o Saggio) | - |
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation | 2016 | Hoffmann J; Rytilahti T; MAIORCA, DAVIDE ; Winandy M; GIACINTO, GIORGIO ; Holz T. | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification | 2016 | AHMADI, MANSOUR ; Ulyanov D; Semenov S; Trofimov M; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files | 2016 | MAIORCA, DAVIDE ; ARIU, DAVIDE ; CORONA, IGINO ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Pharmaguard WebApp: An application for the detection of illegal online pharmacies | 2016 | CONTINI, MATTEO ; CORONA, IGINO ; MULAS, ALESSIO ; GIACINTO, GIORGIO ; ARIU, DAVIDE | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time | 2015 | BIGGIO, BATTISTA ; CORONA, IGINO ; He Z. M.; Chan P. P; GIACINTO, GIORGIO ; Yeung D. S; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Machine Learning in Security Applications | 2015 | ARIU, DAVIDE ; CORONA, IGINO ; TRONCI, ROBERTO ; GIACINTO, GIORGIO | 1 Contributo su Rivista::1.1 Articolo in rivista | |
DLLMiner: structural mining for malware detection | 2015 | Narouei M; AHMADI, MANSOUR ; GIACINTO, GIORGIO ; Takabi H; Sami A. | 1 Contributo su Rivista::1.1 Articolo in rivista | |
Yet Another Cybersecurity Roadmapping Methodology | 2015 | ARIU, DAVIDE ; DIDACI, LUCA ; FUMERA, GIORGIO ; Frumento E; Freschi F; GIACINTO, GIORGIO ; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies | 2015 | CORONA, IGINO ; CONTINI, MATTEO ; ARIU, DAVIDE ; GIACINTO, GIORGIO ; ROLI, FABIO ; Lund M; Marinelli G. | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
An Evasion Resilient Approach to the Detection of Malicious PDF Files | 2015 | MAIORCA, DAVIDE ; ARIU, DAVIDE ; CORONA, IGINO ; GIACINTO, GIORGIO | 2 Contributo in Volume::2.1 Contributo in volume (Capitolo o Saggio) | |
Fast Image Classification with Reduced Multiclass Support Vector Machines | 2015 | MELIS, MARCO ; PIRAS, LUCA ; BIGGIO, BATTISTA ; GIACINTO, GIORGIO ; FUMERA, GIORGIO ; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Clustering android malware families by Http traffic | 2016 | ARESU, MARCO ; ARIU, DAVIDE ; AHMADI, MANSOUR ; MAIORCA, DAVIDE ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Stealth attacks: An extended insight into the obfuscation effects on Android malware | 2015 | MAIORCA, DAVIDE ; Ariu D; CORONA, IGINO ; Aresu M; GIACINTO, GIORGIO | 1 Contributo su Rivista::1.1 Articolo in rivista | - |
2020 Cybercrime Economic Costs: No Measure No Solution | 2015 | Armin J; Thompson B; ARIU, DAVIDE ; GIACINTO, GIORGIO ; ROLI, FABIO ; Kijewski P. | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Multimodal-based Diversified Summarization in Social Image Retrieval | 2015 | DANG NGUYEN, DUC TIEN ; Boato G; De Natale F. G. B; PIRAS, LUCA ; GIACINTO, GIORGIO ; Tuveri F; Angioni M. | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
A hybrid approach for retrieving diverse social images of landmarks | 2015 | DANG NGUYEN, DUC TIEN ; PIRAS, LUCA ; GIACINTO, GIORGIO ; Boato G; DE NATALE, FRANCESCO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
On the Robustness of Mobile Device Fingerprinting | 2015 | Hupperich T; MAIORCA, DAVIDE ; Kührer M; GIACINTO, GIORGIO ; Holz T. | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
User-driven Nearest-Neighbour Exploration of Image Archives | 2015 | PIRAS, LUCA ; Furcas D; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Security Evaluation of Support Vector Machines in Adversarial Environments | 2014 | BIGGIO, BATTISTA ; CORONA, IGINO ; NELSON, BLAINE ALAN ; Rubinstein BIP; MAIORCA, DAVIDE ; FUMERA, GIORGIO ; GIACINTO, GIORGIO ; ROLI, FABIO | 2 Contributo in Volume::2.1 Contributo in volume (Capitolo o Saggio) | |
Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering | 2014 | Dang Nguyen D. T; PIRAS, LUCA ; GIACINTO, GIORGIO ; Boato G; De Natale F. G. B. | 4 Contributo in Atti di Convegno (Proceeding)::4.2 Abstract in Atti di convegno | |
Open issues on codebook generation in image classification tasks | 2014 | PIRAS, LUCA ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Poisoning behavioral malware clustering | 2014 | BIGGIO, BATTISTA ; Rieck K; ARIU, DAVIDE ; Wressnegger C; CORONA, IGINO ; GIACINTO, GIORGIO ; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References | 2014 | CORONA, IGINO ; MAIORCA, DAVIDE ; ARIU, DAVIDE ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware | 2013 | Perdisci R; ARIU, DAVIDE ; GIACINTO, GIORGIO | 1 Contributo su Rivista::1.1 Articolo in rivista | |
Evasion attacks against machine learning at test time | 2013 | BIGGIO, BATTISTA ; CORONA, IGINO ; MAIORCA, DAVIDE ; Nelson B; Srndic N; Laskov P; GIACINTO, GIORGIO ; ROLI, FABIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval | 2013 | PIRAS, LUCA ; GIACINTO, GIORGIO ; Paredes R. | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
ImageHunter: A Novel Tool for Relevance Feedback in Content Based Image Retrieval | 2013 | TRONCI, ROBERTO ; Murgia G; Pili M; PIRAS, LUCA ; GIACINTO, GIORGIO | 2 Contributo in Volume::2.1 Contributo in volume (Capitolo o Saggio) | |
Diversity in Ensembles of Codebooks for Visual Concept Detection | 2013 | PIRAS, LUCA ; TRONCI, ROBERTO ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | - |
Machine Learning in Security Applications | 2013 | ARIU, DAVIDE ; CORONA, IGINO ; TRONCI, ROBERTO ; GIACINTO, GIORGIO | 2 Contributo in Volume::2.1 Contributo in volume (Capitolo o Saggio) | - |
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection | 2013 | MAIORCA, DAVIDE ; CORONA, IGINO ; GIACINTO, GIORGIO | 4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno | |
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues | 2013 | CORONA, IGINO ; GIACINTO, GIORGIO ; ROLI, FABIO | 1 Contributo su Rivista::1.1 Articolo in rivista | |
Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets | 2012 | TRONCI, ROBERTO ; PIRAS, LUCA ; GIACINTO, GIORGIO | 1 Contributo su Rivista::1.1 Articolo in rivista | - |