Mostrati risultati da 1 a 20 di 30
Titolo Data di pubblicazione Autore(i) Rivista Editore
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 1-gen-2019 Demontis, Ambra; Melis, Marco; Biggio, Battista; Maiorca, Davide; Arp, Daniel; Rieck, Konrad; Corona, Igino; Giacinto, Giorgio; Roli, Fabio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING -
DeltaPhish: Detecting phishing webpages in compromised websites 1-gen-2017 Corona, Igino; Biggio, Battista; Contini, Matteo; Piras, Luca; Corda, Roberto; Mereu, Mauro; Mureddu, Guido; Ariu, Davide; Roli, Fabio - Springer
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 1-gen-2017 Piredda, Paolo; Ariu, Davide; Biggio, Battista; Corona, Igino; Piras, Luca; Giacinto, Giorgio; Roli, Fabio - Springer
Detection of malicious scripting code through discriminant and adversary-aware API analysis 1-gen-2017 Maiorca, Davide; Russu, Paolo; Corona, Igino; Biggio, Battista; Giacinto, Giorgio - CEUR-WS
Pharmaguard WebApp: An application for the detection of illegal online pharmacies 1-gen-2016 Contini, Matteo; Corona, Igino; Mulas, Alessio; Giacinto, Giorgio; Ariu, Davide - CEUR-WS
Machine Learning in Security Applications 1-gen-2015 Ariu, Davide; Corona, Igino; Tronci, Roberto; Giacinto, Giorgio TRANSACTIONS ON MACHINE LEARNING AND DATA MINING -
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 1-gen-2015 Biggio, Battista; Corona, Igino; He, Z. M.; Chan P., P; Giacinto, Giorgio; Yeung D., S; Roli, Fabio - Springer Verlag
An Evasion Resilient Approach to the Detection of Malicious PDF Files 1-gen-2015 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio - Springer
Stealth attacks: An extended insight into the obfuscation effects on Android malware 1-gen-2015 Maiorca, Davide; Ariu, D; Corona, Igino; Aresu, M; Giacinto, Giorgio COMPUTERS & SECURITY -
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies 1-gen-2015 Corona, Igino; Contini, Matteo; Ariu, Davide; Giacinto, Giorgio; Roli, Fabio; Lund, M; Marinelli, G. - IEEE
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files 1-gen-2015 Maiorca, Davide; Ariu, Davide; Corona, Igino; Giacinto, Giorgio - SciTePress
Poisoning behavioral malware clustering 1-gen-2014 Biggio, Battista; Rieck, K; Ariu, Davide; Wressnegger, C; Corona, Igino; Giacinto, Giorgio; Roli, Fabio - ACM
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References 1-gen-2014 Corona, Igino; Maiorca, Davide; Ariu, Davide; Giacinto, Giorgio - ACM
Security Evaluation of Support Vector Machines in Adversarial Environments 1-gen-2014 Biggio, Battista; Corona, Igino; Nelson, BLAINE ALAN; Rubinstein, Bip; Maiorca, Davide; Fumera, Giorgio; Giacinto, Giorgio; Roli, Fabio - Springer International Publishing
Machine Learning in Security Applications 1-gen-2013 Ariu, Davide; Corona, Igino; Tronci, Roberto; Giacinto, Giorgio - ibai-publishing
Evasion attacks against machine learning at test time 1-gen-2013 Biggio, Battista; Corona, Igino; Maiorca, Davide; Nelson, B; Srndic, N; Laskov, P; Giacinto, Giorgio; Roli, Fabio - Springer
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues 1-gen-2013 Corona, Igino; Giacinto, Giorgio; Roli, Fabio INFORMATION SCIENCES -
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection 1-gen-2013 Maiorca, Davide; Corona, Igino; Giacinto, Giorgio - ACM
A Pattern Recognition System for Malicious PDF Files Detection 1-gen-2012 Maiorca, Davide; Giacinto, Giorgio; Corona, Igino - Springer-Verlag
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis 1-gen-2012 Perdisci, R; Corona, Igino; Giacinto, Giorgio IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING -
Mostrati risultati da 1 a 20 di 30
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile

Questionario e social

Condividi su:
Impostazioni cookie