Publications

Export 460 results:
Conference Proceedings
I. Corona, Biggio, B., Contini, M., Piras, L., Corda, R., Mereu, M., Mureddu, G., Ariu, D., e Roli, F., «DeltaPhish: Detecting Phishing Webpages in Compromised Websites», 22nd European Symposium on Research in Computer Security (ESORICS), vol 10492. Springer International Publishing, Norway, September 11-15, 2017, pagg 370–388, 2017. (4.13 MB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
F. Meloni, Sanna, A., Maiorca, D., e Giacinto, G., «Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware», 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pagg 42-52, 2022. (328.32 KB)
A. Demontis, Biggio, B., Fumera, G., Giacinto, G., e Roli, F., «Infinity-norm Support Vector Machines against Adversarial Label Contamination», 1st Italian Conference on CyberSecurity (ITASEC). Venice, Italy , pagg 106-115, 2017. (504.93 KB)
A. Janovsky, Maiorca, D., Marko, D., Matyas, V., e Giacinto, G., «A Longitudinal Study of Cryptographic API: A Decade of Android Malware», 19th International Conference on Security and Cryptography (SECRYPT). pagg 121-133, 2022. (251.06 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
G. Malandrone, Virdis, G., Maiorca, D., e Giacinto, G., «PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis», 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
C. Gurrin, Schoeffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the 2018 {ACM} Workshop on The Lifelog Search Challenge, LSC@ICMR 2018, Yokohama, Japan, June 11, 2018». {ACM}, 2018.
C. Gurrin, Schöffmann, K., Joho, H., Dang-Nguyen, D. - T., Riegler, M., e Piras, L., «Proceedings of the {ACM} Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019». ACM, 2019.
L. Borzacchiello, Coppa, E., Maiorca, D., Columbu, A., Demetrescu, C., e Giacinto, G., «Reach Me if You Can: On Native Vulnerability Reachability in Android Apps», 27th European Symposium on Research in Computer Security (ESORICS). 2022. (979.51 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)
Journal Article
M. A. A. Dewan, Granger, E., Marcialis, G. L., Sabourin, R., e Roli, F., «Adaptive Appearance Model Tracking for Still-to-Video Face Recognition», Pattern Recognition, vol 49, n° 1, 2016. (6.51 MB)
F. Roli, «Adaptive Biometric Systems», 2011.
C. Pagano, Granger, E., Sabourin, R., Marcialis, G. L., e Roli, F., «Adaptive Ensembles for Face Recognition in Changing Video Surveillance Environments», Information Sciences, vol 206, 2014. (3.17 MB)
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
B. Biggio, Fumera, G., Russu, P., Didaci, L., e Roli, F., «Adversarial Biometric Recognition: A Review on Biometric System Security from the Adversarial Machine Learning Perspective», IEEE Signal Processing Magazine, vol 32, n° 5, pagg 31-41, 2015. (751.08 KB)
D. Maiorca, Demontis, A., Biggio, B., Roli, F., e Giacinto, G., «Adversarial Detection of Flash Malware: Limitations and Open Issues», Computers & Security, vol 96, 2020. (1.08 MB)
L. Demetrio, Coull, S. E., Biggio, B., Lagorio, G., Armando, A., e Roli, F., «Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection», ACM Trans. Priv. Secur., vol 24, 2021.
F. Zhang, Chan, P. P. K., Biggio, B., Yeung, D. S., e Roli, F., «Adversarial Feature Selection Against Evasion Attacks», IEEE Transactions on Cybernetics, vol 46, n° 3, pagg 766-777, 2016. (2.12 MB)
H. - Y. Lin e Biggio, B., «Adversarial Machine Learning: Attacks From Laboratories to the Real World», Computer, vol 54, pagg 56-60, 2021.
F. Roli, «Adversarial Pattern Classification», 2009.
R. Perdisci, Giacinto, G., e Roli, F., «Alarm clustering for intrusion detection systems in computer networks», Engineering Applications of Artificial Intelligence, vol 19, pagg 429-438, 2006.
G. Fumera e Roli, F., «Analysis of error-reject trade-off in linearly combined multiple classifiers», Pattern Recognition, vol 37, pagg 1245-1265, 2004.

Pages