GIACINTO, GIORGIO

GIACINTO, GIORGIO  

DIPARTIMENTO DI INGEGNERIA ELETTRICA ED ELETTRONICA  

Mostra records
Risultati 1 - 20 di 181 (tempo di esecuzione: 0.049 secondi).
Titolo Data di pubblicazione Autore(i) Rivista Editore
Race against time: investigating the factors that influence web race condition exploits 1-gen-2026 Loi, Federico; Pisu, Lorenzo; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio COMPUTERS & SECURITY -
Adversarial pruning: A survey and benchmark of pruning methods for adversarial robustness 1-gen-2025 Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio PATTERN RECOGNITION -
Analysis and detection of android stegomalware: the impact of the loading stage 1-gen-2025 Soi, Diego; Sanna, Silvia Lucia; Benedetti, Giacomo; Liguori, Angelica; Regano, Leonardo; Caviglione, Luca; Giacinto, Giorgio - ACM
Are Trees Really Green? A Detection Approach of IoT Malware Attacks 1-gen-2025 Sanna, Silvia Lucia; Soi, Diego; Maiorca, Davide; Giacinto, Giorgio - -
DroidReach++: Exploring the reachability of native code in android applications 1-gen-2025 Borzacchiello, L.; Cornacchia, M.; Maiorca, D.; Giacinto, G.; Coppa, E. COMPUTERS & SECURITY -
Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets 1-gen-2025 Sanna, Alessandro; Canavese, Daniele; Regano, Leonardo; Maiorca, Davide; Giacinto, Giorgio - -
HO-FMN: Hyperparameter optimization for fast minimum-norm attacks 1-gen-2025 Mura, Raffaele; Floris, Giuseppe; Scionis, Luca; Piras, Giorgio; Pintor, Maura; Demontis, Ambra; Giacinto, Giorgio; Biggio, Battista; Roli, Fabio NEUROCOMPUTING -
On the Feasibility of Android Stegomalware: A Detection Study 1-gen-2025 Soi, Diego; Sanna, SILVIA LUCIA; Liguori, Angelica; Zuppelli, Marco; Regano, Leonardo; Maiorca, Davide; Caviglione, Luca; Manco, Giuseppe; Giacinto, Giorgio - -
A risk estimation study of native code vulnerabilities in Android applications 1-gen-2024 Sanna, S. L.; Soi, D.; Maiorca, D.; Fumera, G.; Giacinto, G. JOURNAL OF CYBERSECURITY -
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly 1-gen-2024 Massidda, Emmanuele; Pisu, Lorenzo; Maiorca, Davide; Giacinto, Giorgio - -
Do you Trust your Device? Open Challenges in IoT Security Analysis 1-gen-2024 Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide - SciTePress - Science and and Technology Publications
Enhancing android malware detection explainability through function call graph APIs 1-gen-2024 Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio JOURNAL OF INFORMATION SECURITY AND APPLICATIONS -
HTTP/3 will not Save you from Request Smuggling: A Methodology to Detect HTTP/3 Header (mis)Validations 1-gen-2024 Pisu, Lorenzo; Loi, Federico; Maiorca, Davide; Giacinto, Giorgio - -
Oblivion: an open-source system for large-scale analysis of macro-based office malware 1-gen-2024 Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES -
A Targeted Assessment of Cross-Site Scripting Detection Tools 1-gen-2023 Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio - -
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection 1-gen-2023 Bergadano, Francesco; Giacinto, Giorgio ALGORITHMS mdpi
Explaining the use of cryptographic API in Android malware 1-gen-2023 Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio - Springer
Improving malware detection with explainable machine learning 1-gen-2023 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio - Elsevier
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection" 1-gen-2023 Bergadano, F; Giacinto, G ALGORITHMS -
A Longitudinal Study of Cryptographic API: A Decade of Android Malware 1-gen-2022 Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G - SCITEPRESS