Publications

Export 65 results:
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
2
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., e Roli, F., «2020 Cybercrime Economic Costs: No measure No solution», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., e Roli, F., «2020 Cybercrime Economic Costs: No measure No solution», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
C
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., e Giacinto, G., «Clustering Android Malware Families by Http Traffic», in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., e Giacinto, G., «Clustering Android Malware Families by Http Traffic», in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., e Giacinto, G., «Clustering Android Malware Families by Http Traffic», in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
R. Tronci, Giacinto, G., e Roli, F., «Combination of experts by classifiers in similarity score spaces», in Joint IAPR Int. Workshop on Structural and Syntactical Pattern Recognition and Statistical Techniques in Pattern Recognition S+SSPR08, Orlando (Florida, USA), 2008, vol 5342, pagg 821-830.
J. Austin, Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G., e Wilkinson, G., «The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing data», in 9th International Conference on Image Analysis and Processing, 1997, vol 1311, pagg 765-772.
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., e Ortega, J., «Comparison of fingerprint quality measures using an optical and a capacitive sensor», in IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS07), Washington DC (USA), 2007, pagg 1-6.
M. Mohan Chakka, Anjos, A., Marcel, S., Tronci, R., Muntoni, D., Fadda, G., Pili, M., Sirena, N., Murgia, G., Ristori, M., e Roli, F., «Competition on Counter Measures to 2-D Facial Spoofing Attacks», in International Joint Conference on Biometrics (IJCB 2011), 2011.
D
M. Mauri, Mulas, A., e Ariu, D., «The Dark Side of Open Data», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., e Roli, F., «Is Data Clustering in Adversarial Settings Secure?», in AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pagg 87-98. (300.52 KB)
P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., e Roli, F., «Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels», in 16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol 10640 of LNCS, pagg 347-358. (1.21 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., e Giacinto, G., «Detecting Misuse of Google Cloud Messaging in Android Badware», in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pagg 103-112. (626.38 KB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
S. Kumar Dash, Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J., e Cavallaro, L., «DroidScribe: Classifying Android Malware Based on Runtime Behavior», in Mobile Security Technologies (MoST 2016), 2016. (571.22 KB)
G. Suarez-Tangil, Dash, S. Kumar, Ahmadi, M., Kinder, J., Giacinto, G., e Cavallaro, L., «DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware», in Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, In Press. (478.59 KB)
E
M. A. O. Ahmed, Didaci, L., Fumera, G., e Roli, F., «An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles», in Multiple Classifier Systems, 2015, vol 9132, pagg 206-219. (216.76 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks», in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pagg 402-407. (612.37 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of serial and parallel multibiometric systems under spoofing attacks», in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol . (573.02 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «An Evasion Resilient Approach to the Detection of Malicious PDF Files», in Information Systems Security and Privacy (Communication in Computer and Information Science), vol 576, Springer, 2015, pagg 68-85. (503.11 KB)
L. Demetrio, Biggio, B., Lagorio, G., Roli, F., e Armando, A., «Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries», in 3rd Italian Conference on Cyber Security, ITASEC 2019, Pisa, Italy, 2019, vol 2315.

Pages