Publications

Export 140 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Conference Proceedings
G. Malandrone, Virdis, G., Maiorca, D., e Giacinto, G., «PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis», 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
L. Borzacchiello, Coppa, E., Maiorca, D., Columbu, A., Demetrescu, C., e Giacinto, G., «Reach Me if You Can: On Native Vulnerability Reachability in Android Apps», 27th European Symposium on Research in Computer Security (ESORICS). 2022. (979.51 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)
Journal Article
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
D. Maiorca, Demontis, A., Biggio, B., Roli, F., e Giacinto, G., «Adversarial Detection of Flash Malware: Limitations and Open Issues», Computers & Security, vol 96, 2020. (1.08 MB)
R. Perdisci, Giacinto, G., e Roli, F., «Alarm clustering for intrusion detection systems in computer networks», Engineering Applications of Artificial Intelligence, vol 19, pagg 429-438, 2006.
G. Giacinto, Paolucci, R., e Roli, F., «Application of Neural Networks and Statistical Pattern Recognition Algorithms to Earthquake Risk Evaluations», Pattern Recognition Letters, vol 18, pagg 1353-1362, 1997.
G. Giacinto e Roli, F., «An Approach to the Automatic Design of Multiple Classifier Systems», Pattern Recognition Letters, vol 22, pagg 25-33, 2001.
R. Paolucci, Coli, P., e Giacinto, G., «Assessment of seismic site effects in 2-D alluvial valleys using neural networks», Earthquake Spectra, vol 16, pagg 661-680, 2000.
G. Giacinto e Roli, F., «Bayesian Relevance Feedback for Content-Based Image Retrieval», Pattern Recognition, vol 37, pagg 1499-1508, 2004.
G. Giacinto, Roli, F., e Bruzzone, L., «Combination of Neural and Statistical Algorithms for Supervised Classification of Remote-Sensing Images», Pattern Recognition Letters, vol 21, pagg 385-397, 2000.
G. Giacinto e Roli, F., «Design of effective neural network ensembles for image classification», Image and Vision Computing Journal, vol 19, pagg 697-705, 2001.
R. Tronci, Giacinto, G., e Roli, F., «Designing multiple biometric systems: measures of ensemble effectiveness», Engineering Applications of Artificial Intelligence, vol 22, pagg 66-78, 2009.
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
M. Melis, Scalas, M., Demontis, A., Maiorca, D., Biggio, B., Giacinto, G., e Roli, F., «Do Gradient-Based Explanations Tell Anything About Adversarial Robustness to Android Malware?», International Journal of Machine Learning and Cybernetics, vol 13, pagg 217-232, 2022. (1.2 MB)
G. Giacinto e Roli, F., «Dynamic Classifier Selection Based on Multiple Classifier Behaviour», Pattern Recognition, vol 34, pagg 179-181, 2001.
R. Perdisci, Corona, I., e Giacinto, G., «Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis», IEEE Transactions on Dependable and Secure Computing, vol 9, pagg 714-726, 2012. (1.37 MB)
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., e Giacinto, G., «On the Effectiveness of System API-Related Information for Android Ransomware Detection», Computers and Security, vol 86, pagg 162-182, 2019. (706.92 KB)
F. Cara, Scalas, M., Giacinto, G., e Maiorca, D., «On the Feasibility of Adversarial Sample Creation Using the Android System API», Information, n° 11(9): 433, 2020. (1.26 MB)
G. Giacinto, Roli, F., e Didaci, L., «Fusion of multiple classifiers for intrusion detection in computer networks», Pattern Recognition Letters, vol 24, pagg 1795-1803, 2003.
D. Ariu, Tronci, R., e Giacinto, G., «HMMpayl: An Intrusion Detection System Based On Hidden Markov Models», Computers & Security, vol 30, pagg 221 - 241, 2011. (1.88 MB)
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., e Sansone, C., «Information fusion for computer security: State of the art and open issues», Information Fusion, vol 10, pagg 274-284, 2009.
L. Piras e Giacinto, G., «Information Fusion in Content Based Image Retrieval: A Comprehensive Overview», Information Fusion, vol 37, pagg 50-60, 2017. (734.6 KB)
G. Giacinto, Perdisci, R., Del Rio, M., e Roli, F., «Intrusion detection in computer networks by a modular ensemble of one-class classifiers», Information Fusion, vol 9, 2008.

Pages