Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Conference Proceedings
G. Malandrone, Virdis, G., Maiorca, D., and Giacinto, G., PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis, 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
D. Ugarte, Maiorca, D., Cara, F., and Giacinto, G., PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware, 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pp. 240-259, 2019. (352.39 KB)
L. Borzacchiello, Coppa, E., Maiorca, D., Columbu, A., Demetrescu, C., and Giacinto, G., Reach Me if You Can: On Native Vulnerability Reachability in Android Apps, 27th European Symposium on Research in Computer Security (ESORICS). 2022. (979.51 KB)
D. Maiorca, Ariu, D., Corona, I., and Giacinto, G., A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files, Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pp. 27-36, 2015. (267.78 KB)
Journal Article
I. Corona, Giacinto, G., and Roli, F., Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues, Information Sciences, vol. 239, 2013. (1.49 MB)
D. Maiorca, Demontis, A., Biggio, B., Roli, F., and Giacinto, G., Adversarial Detection of Flash Malware: Limitations and Open Issues, Computers & Security, vol. 96, 2020. (1.08 MB)
R. Perdisci, Giacinto, G., and Roli, F., Alarm clustering for intrusion detection systems in computer networks, Engineering Applications of Artificial Intelligence, vol. 19, pp. 429-438, 2006.
G. Giacinto, Paolucci, R., and Roli, F., Application of Neural Networks and Statistical Pattern Recognition Algorithms to Earthquake Risk Evaluations, Pattern Recognition Letters, vol. 18, pp. 1353-1362, 1997.
G. Giacinto and Roli, F., An Approach to the Automatic Design of Multiple Classifier Systems, Pattern Recognition Letters, vol. 22, pp. 25-33, 2001.
R. Paolucci, Coli, P., and Giacinto, G., Assessment of seismic site effects in 2-D alluvial valleys using neural networks, Earthquake Spectra, vol. 16, pp. 661-680, 2000.
G. Giacinto and Roli, F., Bayesian Relevance Feedback for Content-Based Image Retrieval, Pattern Recognition, vol. 37, pp. 1499-1508, 2004.
G. Giacinto, Roli, F., and Bruzzone, L., Combination of Neural and Statistical Algorithms for Supervised Classification of Remote-Sensing Images, Pattern Recognition Letters, vol. 21, pp. 385-397, 2000.
G. Giacinto and Roli, F., Design of effective neural network ensembles for image classification, Image and Vision Computing Journal, vol. 19, pp. 697-705, 2001.
R. Tronci, Giacinto, G., and Roli, F., Designing multiple biometric systems: measures of ensemble effectiveness, Engineering Applications of Artificial Intelligence, vol. 22, pp. 66-78, 2009.
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., and Sami, A., DLLMiner: structural mining for malware detection, Security and Communication Networks, 2015. (731.78 KB)
M. Melis, Scalas, M., Demontis, A., Maiorca, D., Biggio, B., Giacinto, G., and Roli, F., Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?, International Journal of Machine Learning and Cybernetics, vol. 13, pp. 217-232, 2022. (1.2 MB)
G. Giacinto and Roli, F., Dynamic Classifier Selection Based on Multiple Classifier Behaviour, Pattern Recognition, vol. 34, pp. 179-181, 2001.
R. Perdisci, Corona, I., and Giacinto, G., Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 714-726, 2012. (1.37 MB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., and Giacinto, G., On the Effectiveness of System API-Related Information for Android Ransomware Detection, Computers and Security, vol. 86, pp. 162-182, 2019. (706.92 KB)
F. Cara, Scalas, M., Giacinto, G., and Maiorca, D., On the Feasibility of Adversarial Sample Creation Using the Android System API, Information, no. 11(9): 433, 2020. (1.26 MB)
G. Giacinto, Roli, F., and Didaci, L., Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
D. Ariu, Tronci, R., and Giacinto, G., HMMpayl: An Intrusion Detection System Based On Hidden Markov Models, Computers & Security, vol. 30, pp. 221 - 241, 2011. (1.88 MB)
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., and Sansone, C., Information fusion for computer security: State of the art and open issues, Information Fusion, vol. 10, pp. 274-284, 2009.
L. Piras and Giacinto, G., Information Fusion in Content Based Image Retrieval: A Comprehensive Overview, Information Fusion, vol. 37, pp. 50-60, 2017. (734.6 KB)
G. Giacinto, Perdisci, R., Del Rio, M., and Roli, F., Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, vol. 9, 2008.

Pages