Publications

Export 30 results:
Filters: Author is Igino Corona  [Clear All Filters]
2007
I. Corona, Giacinto, G., e Roli, F., «Intrusion detection in computer systems as a pattern recognition task in adversarial environment: a critical review», in Workshop on Neural Information Processing Systems (NIPS), Whistler, British Columbia, Canada, 2007.
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., e Roli, F., «Intrusion Detection Systems based on anomaly detection techniques», in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
2008
I. Corona, Giacinto, G., e Roli, F., «Intrusion Detection in Computer Systems using Multiple Classifer Systems», in Supervised and Unsupervised Ensemble Methods and Their Applications, O. Okun and G. Valentini., Springer-Verlag, Berlin/Heidelberg, 2008, pagg 91-114.
D. Ariu, Corona, I., Giacinto, G., e Roli, F., «McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications», in Italian Workshop on Privacy and Security (PRISE), Rome, 2008. (309.2 KB)
2010
I. Corona e Giacinto, G., «Detection of server side web attacks», in Workshop on Applications of Pattern Analysis, Cumberland Lodge, London, UK, 2010. (308.33 KB)
I. Corona, «Detection of Web-based attacks», University of Cagliari, Cagliari (Italy), 2010.
2011
B. Biggio, Corona, I., Fumera, G., Giacinto, G., e Roli, F., «Bagging classifiers for fighting poisoning attacks in adversarial classification tasks», in Multiple Classifier Systems (MCS 2011), 2011, vol 6713, pagg 350-359. (231.43 KB)
2012
R. Perdisci, Corona, I., e Giacinto, G., «Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis», IEEE Transactions on Dependable and Secure Computing, vol 9, pagg 714-726, 2012. (1.37 MB)
D. Maiorca, Giacinto, G., e Corona, I., «A Pattern Recognition System for Malicious PDF Files Detection», in MLDM - International Conference on Machine Learning and Data Mining, Berlin, 2012, vol 7376, pagg 510-524. (1.74 MB)
I. Corona, Tronci, R., e Giacinto, G., «SuStorID: A Multiple Classifier System for the Protection of Web Services», in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pagg 2375-2378. (286.16 KB)
2013
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
D. Maiorca, Corona, I., e Giacinto, G., «Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection», in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
2014
I. Corona, Maiorca, D., Ariu, D., e Giacinto, G., «Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014. (455.14 KB)
B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., e Roli, F., «Poisoning Behavioral Malware Clustering», in AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pagg 27-36. (375.58 KB)
B. Biggio, Corona, I., Nelson, B., Rubinstein, B. I. P., Maiorca, D., Fumera, G., Giacinto, G., e Roli, F., «Security Evaluation of Support Vector Machines in Adversarial Environments», in Support Vector Machines Applications, Y. Ma e Guo, G. Springer International Publishing, 2014, pagg 105-153. (687.1 KB)
2015
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «An Evasion Resilient Approach to the Detection of Malicious PDF Files», in Information Systems Security and Privacy (Communication in Computer and Information Science), vol 576, Springer, 2015, pagg 68-85. (503.11 KB)
D. Ariu, Corona, I., Tronci, R., e Giacinto, G., «Machine Learning in Security Applications», Trans. Mach. Learn. Data Min., vol 8, pagg 3-39, 2015.
B. Biggio, Corona, I., He, Z. - M., Chan, P. P. K., Giacinto, G., Yeung, D. S., e Roli, F., «One-and-a-half-class Multiple Classifier Systems for Secure Learning against Evasion Attacks at Test Time», in Int'l Workshop on Multiple Classifier Systems (MCS), 2015, vol 9132, pagg 168-180. (467.23 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
D. Maiorca, Ariu, D., Corona, I., Aresu, M., e Giacinto, G., «Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware», Computers And Security (Elsevier), vol 51 (June), pagg 16-31, 2015. (413.99 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)

Pages