Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 26
Titolo Data di pubblicazione Autore(i) Rivista Editore
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 1-gen-2017 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio - Springer
Social engineering 2.0: A foundational work 1-gen-2017 Ariu, Davide; Frumento, Enrico; Fumera, Giorgio - Association for Computing Machinery
DeltaPhish: Detecting phishing webpages in compromised websites 1-gen-2017 Corona, Igino; Biggio, Battista; Contini, Matteo; Piras, Luca; Corda, Roberto; Mereu, Mauro; Mureddu, Guido; Ariu, Davide; Roli, Fabio - Springer
Detecting Misuse of Google Cloud Messaging in Android Badware 1-gen-2016 Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio - ACM (Association for Computing Machinery)
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps 1-gen-2016 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio; Frumento, Enrico; Freschi, Federica - Springer
Pharmaguard WebApp: An application for the detection of illegal online pharmacies 1-gen-2016 Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, Davide - CEUR-WS
Clustering android malware families by Http traffic 1-gen-2016 Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, Giorgio - IEEE (Institute of Electrical and Electronics Engineers)
Machine Learning in Security Applications 1-gen-2015 Ariu, Davide; Corona, Igino; Tronci, Roberto; Giacinto, Giorgio TRANSACTIONS ON MACHINE LEARNING AND DATA MINING -
Yet Another Cybersecurity Roadmapping Methodology 1-gen-2015 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Frumento, E; Freschi, F; Giacinto, Giorgio; Roli, Fabio - IEEE
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies 1-gen-2015 Corona, Igino; Contini, Matteo; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Lund, M; Marinelli, G. - IEEE
2020 Cybercrime Economic Costs: No Measure No Solution 1-gen-2015 Armin, J; Thompson, B; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Kijewski, P. - IEEE (Institute of Electrical and Electronics Engineers)
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files 1-gen-2015 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio - SciTePress
An Evasion Resilient Approach to the Detection of Malicious PDF Files 1-gen-2015 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio - Springer
The maven project: Management and Authenticity Verification of multimedia contents 1-gen-2015 Ruiz, C.; Arroyo, S.; Krsteski, I.; Dago, P.; Sanchez, J.; Perez-Freire, L.; De Rosa, A.; Fontani, M.; Costanzo, A.; Piva, A.; Ariu, D.; Piras, L.; Ahumada, R.; Jerian, M. - Institute of Electrical and Electronics Engineers Inc.
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References 1-gen-2014 Corona, Igino; Maiorca, Davide; Ariu, Davide; Giacinto, Giorgio - ACM
Poisoning behavioral malware clustering 1-gen-2014 Biggio, Battista; Rieck, K; Ariu, Davide; Wressnegger, C; Corona, Igino; Giacinto, Giorgio; Roli, Fabio - ACM
Machine Learning in Security Applications 1-gen-2013 Ariu, Davide; Corona, Igino; Tronci, Roberto; Giacinto, Giorgio - ibai-publishing
Is data clustering in adversarial settings secure? 1-gen-2013 Biggio, Battista; Pillai, I; Rota Bulò, S; Ariu, Davide; Pelillo, M; Roli, Fabio - Institution of Engineering and Technology
Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware 1-gen-2013 Perdisci, R; Ariu, Davide; Giacinto, Giorgio COMPUTER NETWORKS -
Machine learning in computer forensics (and the lessons learned from machine learning in computer security) 1-gen-2011 Ariu, Davide; Giacinto, Giorgio; Roli, Fabio - ACM
Mostrati risultati da 1 a 20 di 26
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile