Publications

Export 27 results:
Filters: Keyword is ids00  [Clear All Filters]
Book Chapter
I. Corona, Giacinto, G., and Roli, F., Intrusion Detection in Computer Systems using Multiple Classifer Systems, in Supervised and Unsupervised Ensemble Methods and Their Applications, O. Okun and G. Valentini., Springer-Verlag, Berlin/Heidelberg, 2008, pp. 91-114.
D. Ariu, Corona, I., Tronci, R., and Giacinto, G., Machine Learning in Security Applications, in Machine Learning, Software Engineering and Standardization, P. Perner ibai-publishing, 2013.
F. Roli and Giacinto, G., Pattern Recognition for Intrusion Detection in Computer Networks, in Pattern Recognition and String Matching, D. Chen and Cheng, X. Kluwer Academic Publishers, 2002.
Conference Paper
G. Giacinto, Perdisci, R., and Roli, F., Alarm Clustering for Intrusion Detection Systems in Computer Networks, in Machine Learning and Data Mining in Pattern Recognition (MLDM 2005), Leipzig, Germany, 2005, vol. 3587, pp. 184-193.
R. Perdisci, Corona, I., Dagon, D., and Lee, W., Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces, in Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, 2009. (206.97 KB)
L. Didaci, Giacinto, G., and Roli, F., Ensemble Learning for Intrusion Detection in Computer Networks, in AI*IA, Workshop on "Apprendimento automatico: metodi e applicazioni", Siena, Italy, 2002.
D. Ariu and Giacinto, G., HMMPayl: an application of HMM to the analysis of the HTTP Payload, in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
I. Corona, Ariu, D., and Giacinto, G., HMM-Web: a framework for the detection of attacks against Web applications, in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
G. Giacinto and Roli, F., Intrusion Detection in Computer Networks by Multiple Classifier Systems, in 16th International Conference on Pattern Recognition (ICPR 2002), Quebec City, Canada, 2002, vol. II, pp. 390-393.
I. Corona, Giacinto, G., and Roli, F., Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review, in Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., and Roli, F., Intrusion Detection Systems based on anomaly detection techniques, in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
D. Ariu, Giacinto, G., and Roli, F., Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security), in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
D. Ariu and Giacinto, G., A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers, in 10th Int. Workshop on Multiple Classifier Systems (MCS 2011), Naples, Italy, 2011. (244.9 KB)
G. Giacinto, Roli, F., and Didaci, L., A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks, in 4th Int. Workshop on Multiple Classifier Systems (MCS 2003), Guildford, United Kingdom, 2003, vol. 2709, pp. 346-355.
G. Giacinto, Perdisci, R., and Roli, F., Network Intrusion Detection by Combining One-class Classifiers, in 13th International Conference on Image Analysis and Processing (ICIAP 2005), Cagliari, Italy, 2005, vol. 3617, pp. 58-65.
D. Maiorca, Giacinto, G., and Corona, I., A Pattern Recognition System for Malicious PDF Files Detection, in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol. 7376, pp. 510-524. (1.74 MB)
D. Ariu, Giacinto, G., and Perdisci, R., Sensing attacks in Computers Network with Hidden Markov Models, in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol. 4571, pp. 449-463. (315.94 KB)
Journal Article
R. Perdisci, Giacinto, G., and Roli, F., Alarm clustering for intrusion detection systems in computer networks, Engineering Applications of Artificial Intelligence, vol. 19, pp. 429-438, 2006.
R. Perdisci, Corona, I., and Giacinto, G., Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 714-726, 2012. (1.37 MB)
G. Giacinto, Roli, F., and Didaci, L., Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
D. Ariu, Tronci, R., and Giacinto, G., HMMpayl: An Intrusion Detection System Based On Hidden Markov Models, Computers & Security, vol. 30, pp. 221 - 241, 2011. (1.88 MB)
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., and Sansone, C., Information fusion for computer security: State of the art and open issues, Information Fusion, vol. 10, pp. 274-284, 2009.
G. Giacinto, Perdisci, R., Del Rio, M., and Roli, F., Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, vol. 9, 2008.
R. Perdisci, Ariu, D., Fogla, P., Giacinto, G., and Lee, W., McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection, Computer Networks, vol. 53, pp. 864-881, 2009. (882.94 KB)
R. Perdisci, Ariu, D., and Giacinto, G., Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware, Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol. 57, pp. 487-500, 2013. (797.8 KB)

Pages