Publications

Export 26 results:
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
J. Austin, Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G., and Wilkinson, G., The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing data, in 9th International Conference on Image Analysis and Processing, 1997, vol. 1311, pp. 765-772.
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., and Roli, F., 2020 Cybercrime Economic Costs: No measure No solution, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., and Roli, F., Intrusion Detection Systems based on anomaly detection techniques, in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
D. Ariu, Host and Network based Anomaly Detectors for HTTP Attacks, University of Cagliari, Cagliari (Italy), 2010. (5.95 MB)
D. Ariu, Corona, I., Tronci, R., and Giacinto, G., Machine Learning in Security Applications, Trans. Mach. Learn. Data Min., vol. 8, pp. 3-39, 2015.
D. Ariu, Corona, I., Giacinto, G., and Roli, F., McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications, in Italian Workshop on Privacy and Security (PRISE), Rome, 2008. (309.2 KB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., and Giacinto, G., Yet Another Cybersecurity Roadmapping Methodology, in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
D. Ariu, Giacinto, G., and Roli, F., Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security), in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
D. Ariu, Tronci, R., and Giacinto, G., HMMpayl: An Intrusion Detection System Based On Hidden Markov Models, Computers & Security, vol. 30, pp. 221 - 241, 2011. (1.88 MB)
D. Ariu and Giacinto, G., HMMPayl: an application of HMM to the analysis of the HTTP Payload, in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
D. Ariu and Giacinto, G., A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers, in 10th Int. Workshop on Multiple Classifier Systems (MCS 2011), Naples, Italy, 2011. (244.9 KB)
D. Ariu, Giacinto, G., and Perdisci, R., Sensing attacks in Computers Network with Hidden Markov Models, in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol. 4571, pp. 449-463. (315.94 KB)
D. Ariu, Marcialis, G. L., Mauri, M., Muntoni, D., Ristori, M., and Roli, F., Fatevi Riconoscere. 2012. (1.84 MB)
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G., Clustering Android Malware Families by Http Traffic, in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., and Ortega, J., Comparison of fingerprint quality measures using an optical and a capacitive sensor, in IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS07), Washington DC (USA), 2007, pp. 1-6.
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., and Ortega, J., Performance of fingerprint quality measures depending on sensor technology, Journal of Electronic Imaging, vol. 17, 2008.
Z. Akhtar, Biggio, B., Fumera, G., and Marcialis, G. L., Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits, in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Milan, Italy, 2011, pp. 5-10. (954 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks, in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pp. 402-407. (612.37 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Robustness analysis of likelihood ratio score fusion rule for multi-modal biometric systems under spoof attacks, in 45th IEEE Int’l Carnahan Conference on Security Technology (ICCST) , Barcelona, Spain, 2011, pp. 237-244. (812.36 KB)
Z. Akhtar, Security of Multimodal Biometric Systems against Spoof Attacks, University of Cagliari, Cagliari (Italy), 2012. (6.38 MB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Robustness Evaluation of Biometric Systems under Spoof Attacks, in 16th Int’l Conference on Image Analysis and Processing (ICIAP), Ravenna, Italy, 2011, pp. 159-168. (220.73 KB)
Z. Akhtar, Fumera, G., Marcialis, G. L., and Roli, F., Evaluation of serial and parallel multibiometric systems under spoofing attacks, in 5th IEEE Int'l Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, USA, 2012, vol. . (573.02 KB)
M. Ahmed, Didaci, L., Fumera, G., Roli, F., and Lavi, B., Using Diversity for Classifier Ensemble Pruning: An Empirical Investigation, Theoretical and Applied Informatics, vol. 29, no. 1&2, pp. 25-39, 2017.
M. A. O. Ahmed, Didaci, L., Fumera, G., and Roli, F., An Empirical Investigation on the Use of Diversity for Creation of Classifier Ensembles, in Multiple Classifier Systems, 2015, vol. 9132, pp. 206-219. (216.76 KB)
M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G., Detecting Misuse of Google Cloud Messaging in Android Badware, in 6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112. (626.38 KB)

Pages