Prodotti della ricerca

 

UNICA IRIS Institutional Research Information System

IRIS è il sistema di gestione integrata dei dati della ricerca (persone, progetti, pubblicazioni, attività) adottato dall'Università degli Studi di Cagliari dal mese di luglio 2015.

Mostra risultati da 1 a 50 di 153
successivo >
TitoloData di pubblicazioneAutore(i)RivistaEditore
Adversarial Detection of Flash Malware: Limitations and Open Issues2020Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G.COMPUTERS & SECURITY
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback2020Putzu, Lorenzo; Piras, Luca; Giacinto, GiorgioMULTIMEDIA TOOLS AND APPLICATIONS
On the Feasibility of Adversarial Sample Creation Using the Android System API2020Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, DavideINFORMATION
Defensive Programming for Smart Home Cybersecurity2020Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, AntoniaIEEE
On the Role of Explainable Machine Learning for Secure Smart Vehicles2020Scalas, Michele; Giacinto, GiorgioIEEE
On the effectiveness of system API-related information for Android ransomware detection2019Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio...; Giacinto, GiorgioCOMPUTERS & SECURITY
Detection of Intrusions and Malware, and Vulnerability Assessment2019Perdisci, Roberto; Maurice, iClémentine; Giacinto, Giorgio; Almgren, MagnusSpringer
Automotive cybersecurity: Foundations for next-generation vehicles2019Scalas, M.; Giacinto, G.IEEE (Institute of Electrical and Electronics Engineers)
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware2019Ugarte, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, GiorgioSpringer
Towards adversarial malware detection: lessons learned from PDF-based attacks2019Maiorca, D.; Biggio, B.; Giacinto, G.ACM COMPUTING SURVEYS
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection2019Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Cor...ona, Igino; Giacinto, Giorgio; Roli, FabioIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables2018Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert,... Claudia; Roli, FabioIEEE (Institute of Electrical and Electronics Engineers)
Explaining black-box android malware detection2018Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, FabioIEEE, Institute of Electrical and Electronics Engineers
Ten years of relevance score for content based image retrieval2018Putzu, Lorenzo; Piras, Luca; Giacinto, GiorgioSpringer Verlag
Multimodal retrieval with diversification and relevance feedback for tourist attraction images2017Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GBACM TRANSACTIONS ON MULTIMEDIA COMPUTING, COMMUNICATIONS AND APPLICATIONS
DroidSieve: Fast and accurate classification of obfuscated android malware2017Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorg...io; Cavallaro, LorenzoAssociation for Computing Machinery
Detection of malicious scripting code through discriminant and adversary-aware API analysis2017Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, GiorgioCEUR-WS
Infinity-norm support vector machines against adversarial label contamination2017Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, FabioCEUR-WS
R-PackDroid: API package-based characterization and detection of mobile ransomware2017Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, FabioACM
Deepsquatting: Learning-based typosquatting detection at deeper domain levels2017Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Ro...li, FabioSpringer
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices2017Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, GiorgioSpringer
Information fusion in content based image retrieval: A comprehensive overview2017Piras L; Giacinto GINFORMATION FUSION
Clustering android malware families by Http traffic2016Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, GiorgioIEEE (Institute of Electrical and Electronics Engineers)
Pharmaguard WebApp: An application for the detection of illegal online pharmacies2016Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, DavideCEUR-WS
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification2016Ahmadi M; Ulyanov D; Semenov S; Trofimov M; Giacinto GACM
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation2016Hoffmann J; Rytilahti T; Maiorca D; Winandy M; Giacinto G; Holz TACM
Who are you? A statistical approach to measuring user authenticity2016Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, GiorgioThe Internet Society
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps2016Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio; Frumento, Enrico; Fr...eschi, FedericaSpringer
Detecting Misuse of Google Cloud Messaging in Android Badware2016Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, GiorgioACM (Association for Computing Machinery)
An Evasion Resilient Approach to the Detection of Malicious PDF Files2015Maiorca D; Ariu D; Corona I; Giacinto GSpringer
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files2015Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, GiorgioSciTePress
DLLMiner: structural mining for malware detection2015Narouei M; Ahmadi M; Giacinto G; Takabi H; Sami ASECURITY AND COMMUNICATION NETWORKS
Machine Learning in Security Applications2015Ariu D; Corona I; Tronci R; Giacinto GTRANSACTIONS ON MACHINE LEARNING AND DATA MINING
A hybrid approach for retrieving diverse social images of landmarks2015Dang Nguyen D N; Piras L; Giacinto G; Boato G; De Natale FIEEE
User-driven Nearest-Neighbour Exploration of Image Archives2015Piras, Luca; Furcas, D; Giacinto, Giorgio
2020 Cybercrime Economic Costs: No Measure No Solution2015Armin, J; Thompson, B; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Kijewski, P.IEEE (Institute of Electrical and Electronics Engineers)
Fast image classification with reduced multiclass support vector machines2015Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, FabioSpringer
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies2015Corona I; Contini M; Ariu D; Giacinto G; Roli F; Lund M; Marinelli GIEEE
On the Robustness of Mobile Device Fingerprinting2015Hupperich, T; Maiorca, D; Kührer, M; Holz, T; Giacinto, GACM
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time2015Biggio, Battista; Corona, Igino; He, Z. M.; Chan P., P; Giacinto, Giorgio; Yeung D., S; Roli, FabioSpringer Verlag
Yet Another Cybersecurity Roadmapping Methodology2015Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Frumento, E; Freschi, F; Giacinto, Giorgio; Roli, FabioIEEE
Multimodal-based Diversified Summarization in Social Image Retrieval2015Dang Nguyen, Duc Tien; Boato, G; De Natale F. G., B; Piras, Luca; Giacinto, Giorgio; Tuveri, F; A...ngioni, M.
Stealth attacks: An extended insight into the obfuscation effects on Android malware2015Maiorca D; Ariu D; Corona I; Aresu M; Giacinto GCOMPUTERS & SECURITY
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References2014Corona I; Maiorca D; Ariu D; Giacinto GACM
Open issues on codebook generation in image classification tasks2014Piras L; Giacinto GLECTURE NOTES IN COMPUTER SCIENCESpringer
Security Evaluation of Support Vector Machines in Adversarial Environments2014Biggio B; Corona I; Nelson BA; Rubinstein BIP; Maiorca D; Fumera G; Giacinto G; Roli FSpringer International Publishing
Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering2014Dang-Nguyen D T; Piras L; Giacinto G; Boato G; De Natale F G BCEUR WORKSHOP PROCEEDINGS
Poisoning behavioral malware clustering2014Biggio, Battista; Rieck, K; Ariu, Davide; Wressnegger, C; Corona, Igino; Giacinto, Giorgio; Roli,... FabioACM
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection2013Maiorca D; Corona I; Giacinto GACM
Diversity in Ensembles of Codebooks for Visual Concept Detection2013Piras L; Tronci R; Giacinto GLECTURE NOTES IN COMPUTER SCIENCESpringer
   
credits unica.it | accessibilità Università degli Studi di Cagliari
C.F.: 80019600925 - P.I.: 00443370929
note legali | privacy

Nascondi la toolbar