Publications

Export 66 results:
Filters: First Letter Of Last Name is A  [Clear All Filters]
Conference Paper
D. Ariu e Giacinto, G., «HMMPayl: an application of HMM to the analysis of the HTTP Payload», in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
I. Corona, Ariu, D., e Giacinto, G., «HMM-Web: a framework for the detection of attacks against Web applications», in IEEE ICC 2009, Dresden, Germany, 2009. (391.14 KB)
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., e Roli, F., «Intrusion Detection Systems based on anomaly detection techniques», in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
I. Corona, Maiorca, D., Ariu, D., e Giacinto, G., «Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
D. Ariu, Giacinto, G., e Roli, F., «Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security)», in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
C. Ruiz, Arroyo, S., Krsteski, I., Dago, P., Sanchez, J., Perez-Freire, L., De Rosa, A., Fontani, M., Costanzo, A., Piva, A., Ariu, D., Piras, L., Ahumada, R., e Jerian, M., «The maven project: Management and Authenticity Verification of multimedia contents», in Multimedia Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, pagg 1-4. (194.87 KB)
C. Ruiz, Arroyo, S., Krsteski, I., Dago, P., Sanchez, J., Perez-Freire, L., De Rosa, A., Fontani, M., Costanzo, A., Piva, A., Ariu, D., Piras, L., Ahumada, R., e Jerian, M., «The maven project: Management and Authenticity Verification of multimedia contents», in Multimedia Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, pagg 1-4. (194.87 KB)
C. Ruiz, Arroyo, S., Krsteski, I., Dago, P., Sanchez, J., Perez-Freire, L., De Rosa, A., Fontani, M., Costanzo, A., Piva, A., Ariu, D., Piras, L., Ahumada, R., e Jerian, M., «The maven project: Management and Authenticity Verification of multimedia contents», in Multimedia Expo Workshops (ICMEW), 2015 IEEE International Conference on, 2015, pagg 1-4. (194.87 KB)
D. Ariu, Corona, I., Giacinto, G., e Roli, F., «McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications», in Italian Workshop on Privacy and Security (PRISE), Rome, 2008. (309.2 KB)
D. Ariu e Giacinto, G., «A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers», in 10th Int. Workshop on Multiple Classifier Systems (MCS 2011), Naples, Italy, 2011. (244.9 KB)
D. - T. Dang-Nguyen, Boato, G., De Natale, F. G. B., Piras, L., Giacinto, G., Tuveri, F., e Angioni, M., «Multimodal-based Diversified Summarization in Social Image Retrieval», in Working Notes Proceedings of the MediaEval 2015 Workshop, Wurzen, Germany, September 14-15, 2015., 2015. (755.79 KB)
M. Ahmadi, Ulyanov, D., Semenov, S., Trofimov, M., e Giacinto, G., «Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification», in Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016, pagg 183–194. (6.49 MB)
B. Ionescu, Müller, H., Villegas, M., Arenas, H., Boato, G., Dang-Nguyen, D. - T., Cid, Y. Dicente, Eickhoff, C., de Herrera, A. García Se, Gurrin, C., Islam, B., Kovalev, V., Liauchuk, V., Mothe, J., Piras, L., Riegler, M., e Schwall, I., «Overview of ImageCLEF 2017: Information extraction from images», in CLEF 2017 Proceedings, Dublin, Ireland, 2017, pagg 315-337.
B. Ionescu, Müller, H., Villegas, M., de Herrera, A. García Se, Eickhoff, C., Andrearczyk, V., Cid, Y. Dicente, Liauchuk, V., Kovalev, V., Hasan, S. A., Ling, Y., Farri, O., Liu, J., Lungren, M., Dang-Nguyen, D. - T., Piras, L., Riegler, M., Zhou, L., Lux, M., e Gurrin, C., «Overview of ImageCLEF 2018: Challenges, Datasets and Evaluation», in Experimental {IR} Meets Multilinguality, Multimodality, and Interaction - 9th International Conference of the {CLEF} Association, {CLEF} 2018, Avignon, France, September 10-14, 2018, Proceedings, 2018, pagg 309–334.
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness analysis of likelihood ratio score fusion rule for multi-modal biometric systems under spoof attacks», in 45th IEEE Int’l Carnahan Conference on Security Technology (ICCST) , Barcelona, Spain, 2011, pagg 237-244. (812.36 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness Evaluation of Biometric Systems under Spoof Attacks», in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pagg 159-168. (220.73 KB)
Z. Akhtar, Biggio, B., Fumera, G., e Marcialis, G. L., «Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits», in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pagg 5-10. (954 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
D. Ariu, Giacinto, G., e Perdisci, R., «Sensing attacks in Computers Network with Hidden Markov Models», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 449-463. (315.94 KB)
P. Temple, Acher, M., Perrouin, G., Biggio, B., Jezequel, J. - M., e Roli, F., «Towards Quality Assurance of Software Product Lines with Adversarial Configurations», in Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A, New York, NY, USA, 2019, pagg 277–288. (2.09 MB)
G. L. Marcialis, Roli, F., Andronico, P., Multineddu, P., Coli, P., e Delogu, G., «Video Biometric Surveillance and Forensic Image Analysis», in First Workshop on Video Surveillance projects in Italy (VISIT 2008), Modena (Italy), 2008.
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
Conference Proceedings
M. Mauri, Mulas, A., e Ariu, D., «The Dark Side of Open Data», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)

Pages