Mostrati risultati da 1 a 20 di 25
Titolo Data di pubblicazione Autore(i) Rivista Editore
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware 1-gen-2022 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio - Springer, Cham
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1-gen-2021 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS -
On the Feasibility of Adversarial Sample Creation Using the Android System API 1-gen-2020 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide INFORMATION -
Adversarial Detection of Flash Malware: Limitations and Open Issues 1-gen-2020 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. COMPUTERS & SECURITY -
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 1-gen-2019 Maiorca, Davide; Biggio, Battista IEEE SECURITY & PRIVACY -
Towards adversarial malware detection: lessons learned from PDF-based attacks 1-gen-2019 Maiorca, D.; Biggio, B.; Giacinto, G. ACM COMPUTING SURVEYS -
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 1-gen-2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING -
On the effectiveness of system API-related information for Android ransomware detection 1-gen-2019 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio COMPUTERS & SECURITY -
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 1-gen-2019 UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio - Springer
Explaining black-box android malware detection 1-gen-2018 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio - IEEE, Institute of Electrical and Electronics Engineers
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 1-gen-2018 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio - IEEE (Institute of Electrical and Electronics Engineers)
R-PackDroid: API package-based characterization and detection of mobile ransomware 1-gen-2017 Maiorca, Davide; Mercaldo, Francesco; Giacinto, Giorgio; Visaggio, Corrado Aaron; Martinelli, Fabio - ACM
Detection of malicious scripting code through discriminant and adversary-aware API analysis 1-gen-2017 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio - CEUR-WS
Design and implementation of robust systems for secure malware detection 4-mar-2016 - - Università degli Studi di Cagliari
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation 1-gen-2016 Hoffmann, J; Rytilahti, T; Maiorca, Davide; Winandy, M; Giacinto, Giorgio; Holz, T. - ACM
Clustering android malware families by Http traffic 1-gen-2016 Aresu, Marco; Ariu, Davide; Ahmadi, Mansour; Maiorca, Davide; Giacinto, Giorgio - IEEE (Institute of Electrical and Electronics Engineers)
An Evasion Resilient Approach to the Detection of Malicious PDF Files 1-gen-2015 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio - Springer
On the Robustness of Mobile Device Fingerprinting 1-gen-2015 Hupperich, T; Maiorca, D; Kührer, M; Holz, T; Giacinto, G - ACM
Stealth attacks: An extended insight into the obfuscation effects on Android malware 1-gen-2015 Maiorca, Davide; Ariu, D; Corona, Igino; Aresu, M; Giacinto, Giorgio COMPUTERS & SECURITY -
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files 1-gen-2015 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio - SciTePress
Mostrati risultati da 1 a 20 di 25
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile

Questionario e social

Condividi su:
Impostazioni cookie