Showing results 1 to 50 of 170
Title Issue Date Author(s) Journal Publisher
Oblivion: an open-source system for large-scale analysis of macro-based office malware 1-Jan-2024 Sanna, Alessandro; Cara, Fabrizio; Maiorca, Davide; Giacinto, Giorgio JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES -
Enhancing android malware detection explainability through function call graph APIs 1-Jan-2024 Soi, Diego; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio JOURNAL OF INFORMATION SECURITY AND APPLICATIONS -
Do you Trust your Device? Open Challenges in IoT Security Analysis 1-Jan-2024 Binosi, Lorenzo; Mazzini, Pietro; Sanna, Alessandro; Carminati, Michele; Giacinto, Giorgio; Lazzeretti, Riccardo; Zanero, Stefano; Polino, Mario; Coppa, Emilio; Maiorca, Davide - SciTePress - Science and and Technology Publications
Explaining the Use of Cryptographic API in Android Malware 1-Jan-2023 Janovsky, Adam; Maiorca, Davide; Macko, Dominik; Matyas, Vashek; Giacinto, Giorgio - Springer
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection 1-Jan-2023 Bergadano, Francesco; Giacinto, Giorgio ALGORITHMS mdpi
Improving malware detection with explainable machine learning 1-Jan-2023 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio - Academic Press
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection" 1-Jan-2023 Bergadano, F; Giacinto, G ALGORITHMS -
A Targeted Assessment of Cross-Site Scripting Detection Tools 1-Jan-2023 Pala, Bruno; Pisu, Lorenzo; Sanna, SILVIA LUCIA; Maiorca, Davide; Giacinto, Giorgio - -
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps 1-Jan-2022 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio - -
Detection of Intrusions and Malware, and Vulnerability Assessment 1-Jan-2022 Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio - Springer, Cham
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps 1-Jan-2022 Borzacchiello, Luca; Coppa, Emilio; Maiorca, Davide; Columbu, Andrea; Demetrescu, Camil; Giacinto, Giorgio - Springer
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1-Jan-2022 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS -
A Longitudinal Study of Cryptographic API: A Decade of Android Malware 1-Jan-2022 Janovsky, A; Maiorca, D; Macko, D; Matyas, V; Giacinto, G - SCITEPRESS
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware 1-Jan-2022 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio - Springer
Explanation-Driven Characterization of Android Ransomware 1-Jan-2021 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio - -
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis 1-Jan-2021 Mario Malandrone, Giuseppe; Virdis, Giovanni; Giacinto, Giorgio; Maiorca, Davide - CEUR-WS.org
On the Role of Explainable Machine Learning for Secure Smart Vehicles 1-Jan-2020 Scalas, Michele; Giacinto, Giorgio - IEEE (Institute of Electrical and Electronics Engineers)
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback 1-Jan-2020 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio MULTIMEDIA TOOLS AND APPLICATIONS -
Defensive Programming for Smart Home Cybersecurity 1-Jan-2020 Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia - IEEE (Institute of Electrical and Electronics Engineers)
Adversarial Detection of Flash Malware: Limitations and Open Issues 1-Jan-2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY -
On the Feasibility of Adversarial Sample Creation Using the Android System API 1-Jan-2020 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide INFORMATION -
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 1-Jan-2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING -
Towards adversarial malware detection: lessons learned from PDF-based attacks 1-Jan-2019 Maiorca, D.; Biggio, B.; Giacinto, G. ACM COMPUTING SURVEYS -
Detection of Intrusions and Malware, and Vulnerability Assessment 1-Jan-2019 Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus - Springer
On the effectiveness of system API-related information for Android ransomware detection 1-Jan-2019 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio COMPUTERS & SECURITY -
Automotive cybersecurity: Foundations for next-generation vehicles 1-Jan-2019 Scalas, M.; Giacinto, G. - IEEE (Institute of Electrical and Electronics Engineers)
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 1-Jan-2019 UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio - Springer
Explaining black-box android malware detection 1-Jan-2018 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio - IEEE, Institute of Electrical and Electronics Engineers
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 1-Jan-2018 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio - IEEE (Institute of Electrical and Electronics Engineers)
Ten years of relevance score for content based image retrieval 1-Jan-2018 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio - Springer Verlag
Infinity-norm support vector machines against adversarial label contamination 1-Jan-2017 Demontis, Ambra; Biggio, Battista; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio - CEUR-WS
Multimodal retrieval with diversification and relevance feedback for tourist attraction images 1-Jan-2017 Dang Nguyen, Duc Tien; Piras, Luca; Giacinto, Giorgio; Boato, Giulia; De Natale, Francesco GB ACM TRANSACTIONS ON MULTIMEDIA COMPUTING, COMMUNICATIONS AND APPLICATIONS -
Detection of malicious scripting code through discriminant and adversary-aware API analysis 1-Jan-2017 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio - CEUR-WS
Information fusion in content based image retrieval: A comprehensive overview 1-Jan-2017 Piras, Luca; Giacinto, Giorgio INFORMATION FUSION -
R-PackDroid: API package-based characterization and detection of mobile ransomware 1-Jan-2017 Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio - ACM
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices 1-Jan-2017 Ahmadi, Mansour; Sotgiu, Angelo; Giacinto, Giorgio - Springer
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 1-Jan-2017 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio - Springer
DroidSieve: Fast and accurate classification of obfuscated android malware 1-Jan-2017 Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo - Association for Computing Machinery
Pharmaguard WebApp: An application for the detection of illegal online pharmacies 1-Jan-2016 Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, Davide - CEUR-WS
Detecting Misuse of Google Cloud Messaging in Android Badware 1-Jan-2016 Ahmadi, Mansour; Biggio, Battista; Arzt, S; Ariu, Davide; Giacinto, Giorgio - ACM (Association for Computing Machinery)
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification 1-Jan-2016 Ahmadi, Mansour; Ulyanov, D; Semenov, S; Trofimov, M; Giacinto, Giorgio - ACM
Clustering android malware families by Http traffic 1-Jan-2016 Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, Giorgio - IEEE (Institute of Electrical and Electronics Engineers)
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps 1-Jan-2016 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio; Frumento, Enrico; Freschi, Federica - Springer
Who are you? A statistical approach to measuring user authenticity 1-Jan-2016 Jain, S; Mandell Freeman, M; Biggio, Battista; Duermuth, M; Giacinto, Giorgio - The Internet Society
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation 1-Jan-2016 Hoffmann, J; Rytilahti, T; Maiorca, Davide; Winandy, M; Giacinto, Giorgio; Holz, T. - ACM
Multimodal-based Diversified Summarization in Social Image Retrieval 1-Jan-2015 DANG NGUYEN, DUC TIEN; Boato, G; De Natale F. G., B; Piras, Luca; Giacinto, Giorgio; Tuveri, F; Angioni, M. - -
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 1-Jan-2015 Biggio, Battista; Corona, Igino; He, Z. M.; Chan P., P; Giacinto, Giorgio; Yeung D., S; Roli, Fabio - Springer Verlag
Yet Another Cybersecurity Roadmapping Methodology 1-Jan-2015 Ariu, Davide; Didaci, Luca; Fumera, Giorgio; Frumento, E; Freschi, F; Giacinto, Giorgio; Roli, Fabio - IEEE
Fast image classification with reduced multiclass support vector machines 1-Jan-2015 Melis, Marco; Piras, Luca; Biggio, Battista; Giacinto, Giorgio; Fumera, Giorgio; Roli, Fabio - Springer
An Evasion Resilient Approach to the Detection of Malicious PDF Files 1-Jan-2015 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio - Springer
Showing results 1 to 50 of 170
Icon legend

  •  files available
  •  files available on intranet
  •  files available for authorized users
  •  files available for administrators
  •  files under embargo
  •  no files available

Questionnaire and social

Share on:
Impostazioni cookie