Sfoglia per Autore
Multimodal retrieval with diversification and relevance feedback for tourist attraction images
2017-01-01 Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB
Information fusion in content based image retrieval: A comprehensive overview
2017-01-01 Piras, Luca; Giacinto, Giorgio
Who are you? A statistical approach to measuring user authenticity
2016-01-01 Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio
Pharmaguard WebApp: An application for the detection of illegal online pharmacies
2016-01-01 Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, Davide
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation
2016-01-01 Hoffmann, J; Rytilahti, T; Maiorca, Davide; Winandy, M; Giacinto, Giorgio; Holz, T.
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
2016-01-01 Ahmadi, Mansour; Ulyanov, D; Semenov, S; Trofimov, M; Giacinto, Giorgio
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps
2016-01-01 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio; Frumento, Enrico; Freschi, Federica
Clustering android malware families by Http traffic
2016-01-01 Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, Giorgio
Detecting Misuse of Google Cloud Messaging in Android Badware
2016-01-01 Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio
Machine Learning in Security Applications
2015-01-01 Ariu, Davide; Corona, Igino; Tronci, Roberto; Giacinto, Giorgio
A hybrid approach for retrieving diverse social images of landmarks
2015-01-01 DANG NGUYEN, DUC TIEN; Piras, Luca; Giacinto, Giorgio; Boato, G; DE NATALE, Francesco
DLLMiner: structural mining for malware detection
2015-01-01 Narouei, M; Ahmadi, Mansour; Giacinto, Giorgio; Takabi, H; Sami, A.
Stealth attacks: An extended insight into the obfuscation effects on Android malware
2015-01-01 Maiorca, Davide; Ariu, D; Corona, Igino; Aresu, M; Giacinto, Giorgio
Yet Another Cybersecurity Roadmapping Methodology
2015-01-01 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Frumento, E; Freschi, F; Giacinto, Giorgio; Roli, Fabio
2020 Cybercrime Economic Costs: No Measure No Solution
2015-01-01 Armin, J; Thompson, B; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Kijewski, P.
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies
2015-01-01 Corona, Igino; Contini, Matteo; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Lund, M; Marinelli, G.
Fast image classification with reduced multiclass support vector machines
2015-01-01 Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, Fabio
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files
2015-01-01 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio
User-driven Nearest-Neighbour Exploration of Image Archives
2015-01-01 Piras, Luca; Furcas, D; Giacinto, Giorgio
Multimodal-based Diversified Summarization in Social Image Retrieval
2015-01-01 DANG NGUYEN, DUC TIEN; Boato, G; De Natale F. G., B; Piras, Luca; Giacinto, Giorgio; Tuveri, F; Angioni, M.
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
Multimodal retrieval with diversification and relevance feedback for tourist attraction images | 1-gen-2017 | Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB | ACM TRANSACTIONS ON MULTIMEDIA COMPUTING, COMMUNICATIONS AND APPLICATIONS | - |
Information fusion in content based image retrieval: A comprehensive overview | 1-gen-2017 | Piras, Luca; Giacinto, Giorgio | INFORMATION FUSION | - |
Who are you? A statistical approach to measuring user authenticity | 1-gen-2016 | Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio | - | The Internet Society |
Pharmaguard WebApp: An application for the detection of illegal online pharmacies | 1-gen-2016 | Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, Davide | - | CEUR-WS |
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation | 1-gen-2016 | Hoffmann, J; Rytilahti, T; Maiorca, Davide; Winandy, M; Giacinto, Giorgio; Holz, T. | - | ACM |
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification | 1-gen-2016 | Ahmadi, Mansour; Ulyanov, D; Semenov, S; Trofimov, M; Giacinto, Giorgio | - | ACM |
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps | 1-gen-2016 | Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio; Frumento, Enrico; Freschi, Federica | - | Springer |
Clustering android malware families by Http traffic | 1-gen-2016 | Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, Giorgio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Detecting Misuse of Google Cloud Messaging in Android Badware | 1-gen-2016 | Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio | - | ACM (Association for Computing Machinery) |
Machine Learning in Security Applications | 1-gen-2015 | Ariu, Davide; Corona, Igino; Tronci, Roberto; Giacinto, Giorgio | TRANSACTIONS ON MACHINE LEARNING AND DATA MINING | - |
A hybrid approach for retrieving diverse social images of landmarks | 1-gen-2015 | DANG NGUYEN, DUC TIEN; Piras, Luca; Giacinto, Giorgio; Boato, G; DE NATALE, Francesco | - | IEEE |
DLLMiner: structural mining for malware detection | 1-gen-2015 | Narouei, M; Ahmadi, Mansour; Giacinto, Giorgio; Takabi, H; Sami, A. | SECURITY AND COMMUNICATION NETWORKS | - |
Stealth attacks: An extended insight into the obfuscation effects on Android malware | 1-gen-2015 | Maiorca, Davide; Ariu, D; Corona, Igino; Aresu, M; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
Yet Another Cybersecurity Roadmapping Methodology | 1-gen-2015 | Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Frumento, E; Freschi, F; Giacinto, Giorgio; Roli, Fabio | - | IEEE |
2020 Cybercrime Economic Costs: No Measure No Solution | 1-gen-2015 | Armin, J; Thompson, B; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Kijewski, P. | - | IEEE (Institute of Electrical and Electronics Engineers) |
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies | 1-gen-2015 | Corona, Igino; Contini, Matteo; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Lund, M; Marinelli, G. | - | IEEE |
Fast image classification with reduced multiclass support vector machines | 1-gen-2015 | Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, Fabio | - | Springer |
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files | 1-gen-2015 | Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio | - | SciTePress |
User-driven Nearest-Neighbour Exploration of Image Archives | 1-gen-2015 | Piras, Luca; Furcas, D; Giacinto, Giorgio | - | - |
Multimodal-based Diversified Summarization in Social Image Retrieval | 1-gen-2015 | DANG NGUYEN, DUC TIEN; Boato, G; De Natale F. G., B; Piras, Luca; Giacinto, Giorgio; Tuveri, F; Angioni, M. | - | - |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile