Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Report
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., and Holz, T., Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation, Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
Journal Article
A. Demontis, Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K., Corona, I., Giacinto, G., and Roli, F., Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection, IEEE Trans. Dependable and Secure Computing, vol. 16, no. 4, pp. 711-724, 2019. (3.61 MB)
D. Maiorca, Biggio, B., and Giacinto, G., Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks, ACM Computing Surveys, vol. 52, no. 4, 2019. (1.21 MB)
A. Fanni, Giacinto, G., Marchesi, M., and Serri, A., Tabu search coupled with deterministic strategies for the optimal design of MRI devices, Int. J. of Applied Electromagnetics and Mechanics, vol. 10, pp. 21-31, 1999.
E. Costamagna, Fanni, A., and Giacinto, G., A Tabu Search algorithm for the optimisation of telecommunication networks, European Journal of Operational Research, vol. 106, pp. 357-372, 1998.
L. Piras and Giacinto, G., Synthetic Pattern Generation for Imbalanced Learning in Image Retrieval, Pattern Recognition Letters, vol. 33, p. 7, 2012. (236.64 KB)
L. Didaci, Giacinto, G., Roli, F., and Marcialis, G. L., A study on the performances of Dynamic Classifier Selection based on Local Accuracy Estimation, Pattern Recognition, vol. 38, pp. 2188-2191, 2005.
D. Maiorca, Ariu, D., Corona, I., Aresu, M., and Giacinto, G., Stealth Attacks: An Extended Insight into the Obfuscation Effects on Android Malware, Computers And Security (Elsevier), vol. 51 (June), pp. 16-31, 2015. (413.99 KB)
G. Giacinto, Roli, F., and Fumera, G., Selection of image classifiers, Electronics Letters, vol. 36, pp. 420-422, 2000.
R. Perdisci, Ariu, D., and Giacinto, G., Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware, Computer Networks - Special Issue on Botnet Activity: Analysis, Detection and Shutdown, vol. 57, pp. 487-500, 2013. (797.8 KB)
G. Fumera, Roli, F., and Giacinto, G., Reject Option with Multiple Thresholds, Pattern Recognition, vol. 33, pp. 2099-2101, 2000.
R. Tronci, Piras, L., and Giacinto, G., Performance Evaluation of Relevance Feedback for Image Retrieval by “Real-World” Multi-Tagged Image Datasets, International Journal of Multimedia Data Engineering and Management (IJMDEM), vol. 3, p. 16, 2012. (357.99 KB)
A. Gambardella, Giacinto, G., Migliaccio, M., and Montali, A., One-class classification for oil spill detection, Pattern Analysis and Applications, 2009.
R. Perdisci, Ariu, D., Fogla, P., Giacinto, G., and Lee, W., McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection, Computer Networks, vol. 53, pp. 864-881, 2009. (882.94 KB)
G. Giacinto, Perdisci, R., Del Rio, M., and Roli, F., Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, vol. 9, 2008.
L. Piras and Giacinto, G., Information Fusion in Content Based Image Retrieval: A Comprehensive Overview, Information Fusion, vol. 37, pp. 50-60, 2017. (734.6 KB)
I. Corona, Giacinto, G., Mazzariello, C., Roli, F., and Sansone, C., Information fusion for computer security: State of the art and open issues, Information Fusion, vol. 10, pp. 274-284, 2009.
D. Ariu, Tronci, R., and Giacinto, G., HMMpayl: An Intrusion Detection System Based On Hidden Markov Models, Computers & Security, vol. 30, pp. 221 - 241, 2011. (1.88 MB)
G. Giacinto, Roli, F., and Didaci, L., Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
M. Scalas, Maiorca, D., Mercaldo, F., Visaggio, C. Aaron, Martinelli, F., and Giacinto, G., On the Effectiveness of System API-Related Information for Android Ransomware Detection, Computers and Security, vol. 86, pp. 162-182, 2019. (706.92 KB)
R. Perdisci, Corona, I., and Giacinto, G., Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis, IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 714-726, 2012. (1.37 MB)
G. Giacinto and Roli, F., Dynamic Classifier Selection Based on Multiple Classifier Behaviour, Pattern Recognition, vol. 34, pp. 179-181, 2001.
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., and Sami, A., DLLMiner: structural mining for malware detection, Security and Communication Networks, 2015. (731.78 KB)
R. Tronci, Giacinto, G., and Roli, F., Designing multiple biometric systems: measures of ensemble effectiveness, Engineering Applications of Artificial Intelligence, vol. 22, pp. 66-78, 2009.
G. Giacinto and Roli, F., Design of effective neural network ensembles for image classification, Image and Vision Computing Journal, vol. 19, pp. 697-705, 2001.

Pages