Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware
2022-01-01 Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio
Detection of Intrusions and Malware, and Vulnerability Assessment
2022-01-01 Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio
Explanation-Driven Characterization of Android Ransomware
2021-01-01 Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio
Do gradient-based explanations tell anything about adversarial robustness to android malware?
2021-01-01 Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F.
Defensive Programming for Smart Home Cybersecurity
2020-01-01 Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia
On the Feasibility of Adversarial Sample Creation Using the Android System API
2020-01-01 Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback
2020-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
Adversarial Detection of Flash Malware: Limitations and Open Issues
2020-01-01 Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G.
On the Role of Explainable Machine Learning for Secure Smart Vehicles
2020-01-01 Scalas, Michele; Giacinto, Giorgio
Detection of Intrusions and Malware, and Vulnerability Assessment
2019-01-01 Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware
2019-01-01 UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio
Towards adversarial malware detection: lessons learned from PDF-based attacks
2019-01-01 Maiorca, D.; Biggio, B.; Giacinto, G.
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
2019-01-01 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio
Automotive cybersecurity: Foundations for next-generation vehicles
2019-01-01 Scalas, M.; Giacinto, G.
On the effectiveness of system API-related information for Android ransomware detection
2019-01-01 Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio
Explaining black-box android malware detection
2018-01-01 Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio
Ten years of relevance score for content based image retrieval
2018-01-01 Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
2018-01-01 Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio
Information fusion in content based image retrieval: A comprehensive overview
2017-01-01 Piras, Luca; Giacinto, Giorgio
DroidSieve: Fast and accurate classification of obfuscated android malware
2017-01-01 Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo
Titolo | Data di pubblicazione | Autore(i) | Rivista | Editore |
---|---|---|---|---|
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware | 1-gen-2022 | Meloni, Francesco; Sanna, Alessandro; Maiorca, Davide; Giacinto, Giorgio | - | Springer, Cham |
Detection of Intrusions and Malware, and Vulnerability Assessment | 1-gen-2022 | Cavallaro, Lorenzo; Gruss, Daniel; Pellegrino, Giancarlo; Giacinto, Giorgio | - | Springer, Cham |
Explanation-Driven Characterization of Android Ransomware | 1-gen-2021 | Scalas, Michele; Rieck, Konrad; Giacinto, Giorgio | - | - |
Do gradient-based explanations tell anything about adversarial robustness to android malware? | 1-gen-2021 | Melis, M.; Scalas, M.; Demontis, A.; Maiorca, D.; Biggio, B.; Giacinto, G.; Roli, F. | INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS | - |
Defensive Programming for Smart Home Cybersecurity | 1-gen-2020 | Rossi, Maria Teresa; Greca, Renan; Iovino, Ludovico; Giacinto, Giorgio; Bertoli, Antonia | - | IEEE (Institute of Electrical and Electronics Engineers) |
On the Feasibility of Adversarial Sample Creation Using the Android System API | 1-gen-2020 | Cara, Fabrizio; Scalas, Michele; Giacinto, Giorgio; Maiorca, Davide | INFORMATION | - |
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback | 1-gen-2020 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | MULTIMEDIA TOOLS AND APPLICATIONS | - |
Adversarial Detection of Flash Malware: Limitations and Open Issues | 1-gen-2020 | Maiorca, D.; Demontis, A.; Biggio, B.; Roli, F.; Giacinto, G. | COMPUTERS & SECURITY | - |
On the Role of Explainable Machine Learning for Secure Smart Vehicles | 1-gen-2020 | Scalas, Michele; Giacinto, Giorgio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Detection of Intrusions and Malware, and Vulnerability Assessment | 1-gen-2019 | Perdisci, Roberto; Maurice, Iclémentine; Giacinto, Giorgio; Almgren, Magnus | - | Springer |
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware | 1-gen-2019 | UGARTE ARZAC, Denis; Maiorca, Davide; Cara, Fabrizio; Giacinto, Giorgio | - | Springer |
Towards adversarial malware detection: lessons learned from PDF-based attacks | 1-gen-2019 | Maiorca, D.; Biggio, B.; Giacinto, G. | ACM COMPUTING SURVEYS | - |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection | 1-gen-2019 | Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
Automotive cybersecurity: Foundations for next-generation vehicles | 1-gen-2019 | Scalas, M.; Giacinto, G. | - | IEEE (Institute of Electrical and Electronics Engineers) |
On the effectiveness of system API-related information for Android ransomware detection | 1-gen-2019 | Scalas, Michele; Maiorca, Davide; Mercaldo, Francesco; Visaggio, Corrado Aaron; Martinelli, Fabio; Giacinto, Giorgio | COMPUTERS & SECURITY | - |
Explaining black-box android malware detection | 1-gen-2018 | Melis, Marco; Maiorca, Davide; Biggio, Battista; Giacinto, Giorgio; Roli, Fabio | - | IEEE, Institute of Electrical and Electronics Engineers |
Ten years of relevance score for content based image retrieval | 1-gen-2018 | Putzu, Lorenzo; Piras, Luca; Giacinto, Giorgio | - | Springer Verlag |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | 1-gen-2018 | Kolosnjaji, Bojan; Demontis, Ambra; Biggio, Battista; Maiorca, Davide; Giacinto, Giorgio; Eckert, Claudia; Roli, Fabio | - | IEEE (Institute of Electrical and Electronics Engineers) |
Information fusion in content based image retrieval: A comprehensive overview | 1-gen-2017 | Piras, Luca; Giacinto, Giorgio | INFORMATION FUSION | - |
DroidSieve: Fast and accurate classification of obfuscated android malware | 1-gen-2017 | Suarez Tangil, Guillermo; Dash, Santanu Kumar; Ahmadi, Mansour; Kinder, Johannes; Giacinto, Giorgio; Cavallaro, Lorenzo | - | Association for Computing Machinery |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile