Publications

Export 135 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Conference Proceedings
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
Conference Paper
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
G. Giacinto, Roli, F., e Fumera, G., «Unsupervised Learning of Neural Network Ensembles for Image Classification», in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol III, pagg 155-159.
L. Piras e Giacinto, G., «Unbalanced learning in Content-Based Image Classification and Retrieval», in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)
G. Giacinto e Roli, F., «A theoretical framework for dynamic classifier selection», in 15th International Conference on Pattern Recognition, Barcelona, Spain, 2000, vol 2, pagg 8-11.
L. Putzu, Piras, L., e Giacinto, G., «Ten years of Relevance Score for Content Based Image Retrieval», in 14th International Conference Machine Learning and Data Mining (MLDM), New York, 2018, vol 10935.
I. Corona, Tronci, R., e Giacinto, G., «SuStorID: A Multiple Classifier System for the Protection of Web Services», in International Conference on Pattern Recognition (ICPR 2012), Tsukuba International Congress Center, Tsukuba Science City, JAPAN, 2012, pagg 2375-2378. (286.16 KB)
A. Montali, Giacinto, G., Migliaccio, M., e Gambardella, A., «Supervised Pattern Classification Techniques for Oil Spill Classification in SAR Images: Preliminary Results», in SEASAR2006 Workshop, ESA-ESRIN, Frascati, Italy, 2006, pagg 23-26.
R. Tronci, Piras, L., Falqui, L., e Giacinto, G., «A study on the evaluation of relevance feedback in multi-tagged image datasets», in 7th IEEE International Workshop on Multimedia Information Processing and Retrieval, California, USA, 2011. (259.03 KB)
E. Costamagna, Fanni, A., e Giacinto, G., «A simulated annealing algorithm for the optimization of communication network», in Int. Symp. on Signals, Systems and Electronics (ISSSE '95), 1995, pagg 405-408.
D. Ariu, Giacinto, G., e Perdisci, R., «Sensing attacks in Computers Network with Hidden Markov Models», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 449-463. (315.94 KB)
R. Tronci, Giacinto, G., e Roli, F., «Selection of experts for the design of multiple biometric systems», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 795-809.

Pages