Publications

Export 66 results:
Filters: First Letter Of Last Name is A  [Clear All Filters]
Thesis
Z. Akhtar, «Security of Multimodal Biometric Systems against Spoof Attacks», University of Cagliari, Cagliari (Italy), 2012. (6.38 MB)
D. Ariu, «Host and Network based Anomaly Detectors for HTTP Attacks», University of Cagliari, Cagliari (Italy), 2010. (5.95 MB)
Journal Article
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., e Roli, F., «Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection», IEEE Trans. Dependable and Secure Computing, vol 16, n° 4, pagg 711-724, 2019. (3.61 MB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., e Lavi, B., «Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation», Theoretical and Applied Informatics, In Press.
D. Maiorca, Ariu, D., Corona, I., Aresu, M., e Giacinto, G., «Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware», Computers And Security (Elsevier), vol 51 (June), pagg 16-31, 2015. (413.99 KB)
D. Maiorca, Ariu, D., Corona, I., Aresu, M., e Giacinto, G., «Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware», Computers And Security (Elsevier), vol 51 (June), pagg 16-31, 2015. (413.99 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Security evaluation of biometric authentication systems under real spoofing attacks», IET Biometrics, vol 1, n° 1, pagg 11-24, 2012. (3.21 MB)
R. Perdisci, Ariu, D., e Giacinto, G., «Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware», Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol 57, pagg 487-500, 2013. (797.8 KB)
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., e Ortega, J., «Performance of fingerprint quality measures depending on sensor technology», Journal of Electronic Imaging, vol 17, 2008.
R. Perdisci, Ariu, D., Fogla, P., Giacinto, G., e Lee, W., «McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection», Computer Networks, vol 53, pagg 864-881, 2009. (882.94 KB)
D. Ariu, Tronci, R., e Giacinto, G., «HMMpayl: An Intrusion Detection System Based On Hidden Markov Models», Computers & Security, vol 30, pagg 221 - 241, 2011. (1.88 MB)
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
Conference Proceedings
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
M. Mauri, Mulas, A., e Ariu, D., «The Dark Side of Open Data», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (124.62 KB) (1.33 MB)
Conference Paper
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
G. L. Marcialis, Roli, F., Andronico, P., Multineddu, P., Coli, P., e Delogu, G., «Video Biometric Surveillance and Forensic Image Analysis», in First Workshop on Video Surveillance projects in Italy (VISIT 2008), Modena (Italy), 2008.
P. Temple, Acher, M., Perrouin, G., Biggio, B., Jezequel, J. - M., e Roli, F., «Towards Quality Assurance of Software Product Lines with Adversarial Configurations», in Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A, New York, NY, USA, 2019, pagg 277–288. (2.09 MB)
D. Ariu, Giacinto, G., e Perdisci, R., «Sensing attacks in Computers Network with Hidden Markov Models», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 449-463. (315.94 KB)
B. Biggio, Akhtar, Z., Fumera, G., Marcialis, G. L., e Roli, F., «Robustness of multi-modal biometric verification systems under realistic spoofing attacks», in Int’l Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011. (2.25 MB)
Z. Akhtar, Biggio, B., Fumera, G., e Marcialis, G. L., «Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits», in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pagg 5-10. (954 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Robustness Evaluation of Biometric Systems under Spoof Attacks», in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pagg 159-168. (220.73 KB)

Pages