Publications

Export 434 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
B. Biggio, Fumera, G., Roli, F., e Didaci, L., «Poisoning adaptive biometric systems», in 9th Int'l Workshop on Statistical Techniques in Pattern Recognition (SPR 2012), 2012, vol 7626, pagg 417-425. (637.79 KB)
B. Biggio, Fumera, G., Marcialis, G. L., e Roli, F., «Security of pattern recognition systems in adversarial environments». 2012. (235.41 KB)
B. Biggio, Fumera, G., e Roli, F., «Design of Robust Classifiers for Adversarial Environments», in IEEE International Conference on Systems, Man, and Cybernetics (SMC 2011), Anchorage, Alaska, USA, 2011, pagg 977–982. (328.68 KB)
B. Biggio, Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., Giacinto, G., e Roli, F., «Evasion attacks against machine learning at test time», in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2013, vol 8190, pagg 387-402. (473.78 KB)
B. Biggio, Fumera, G., e Roli, F., «Bayesian Linear Combination of Neural Networks», in Innovations in Neural Information Paradigms and Applications, vol 247, M. Bianchini, Maggini, M., Scarselli, F., e Jain, L. C. Springer Berlin / Heidelberg, 2009, pagg 201-230. (435.32 KB)
B. Biggio, Fumera, G., Pillai, I., e Roli, F., «A survey and experimental evaluation of image spam filtering techniques», Pattern Recognition Letters, vol 32, pagg 1436 - 1446, 2011. (2.12 MB)
J. Atli Benediktsson, Kittler, J., e Roli, F., Multiple Classifier Systems, vol 5519. Reykjavik, Iceland: Springer, 2009, pag 540.
G. B. Benciolini, Roli, F., e Wilkinson, G., Proceedings of the workshop "Il Telerilevamento ed i Sistemi Informativi Territoriali nella Gestione delle Risorse Ambientali". Trento, Italy: , 1994.
A
J. Austin, Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G., e Wilkinson, G., «The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing data», in 9th International Conference on Image Analysis and Processing, 1997, vol 1311, pagg 765-772.
J. Armin, Thompson, B., Kijewski, P., Ariu, D., Giacinto, G., e Roli, F., «2020 Cybercrime Economic Costs: No measure No solution», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (526.44 KB)
D. Ariu, Giacinto, G., e Roli, F., «Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security)», in AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011. (379.05 KB)
D. Ariu e Giacinto, G., «A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers», in 10th Int. Workshop on Multiple Classifier Systems (MCS 2011), Naples, Italy, 2011. (244.9 KB)
D. Ariu, Giacinto, G., e Perdisci, R., «Sensing attacks in Computers Network with Hidden Markov Models», in Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol 4571, pagg 449-463. (315.94 KB)
D. Ariu, Corona, I., Giacinto, G., Perdisci, R., e Roli, F., «Intrusion Detection Systems based on anomaly detection techniques», in Italian Workshop on Privacy and Security (PRISE), Rome, 2007.
D. Ariu, Marcialis, G. L., Mauri, M., Muntoni, D., Ristori, M., e Roli, F., «Fatevi Riconoscere». 2012. (1.84 MB)
D. Ariu, «Host and Network based Anomaly Detectors for HTTP Attacks», University of Cagliari, Cagliari (Italy), 2010. (5.95 MB)
D. Ariu, Corona, I., Giacinto, G., e Roli, F., «McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications», in Italian Workshop on Privacy and Security (PRISE), Rome, 2008. (309.2 KB)
D. Ariu, Tronci, R., e Giacinto, G., «HMMpayl: An Intrusion Detection System Based On Hidden Markov Models», Computers & Security, vol 30, pagg 221 - 241, 2011. (1.88 MB)
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
D. Ariu e Giacinto, G., «HMMPayl: an application of HMM to the analysis of the HTTP Payload», in Workshop on Applications of Pattern Analysis, 2010. (273.18 KB)
D. Ariu, Corona, I., Tronci, R., e Giacinto, G., «Machine Learning in Security Applications», in Machine Learning, Software Engineering and Standardization, P. Perner ibai-publishing, 2013.
M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., e Giacinto, G., «Clustering Android Malware Families by Http Traffic», in 10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015. (168.36 KB)
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., e Ortega, J., «Performance of fingerprint quality measures depending on sensor technology», Journal of Electronic Imaging, vol 17, 2008.
F. Alonso, Roli, F., Marcialis, G. L., Fierrez, J., e Ortega, J., «Comparison of fingerprint quality measures using an optical and a capacitive sensor», in IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS07), Washington DC (USA), 2007, pagg 1-6.
Z. Akhtar, Fumera, G., Marcialis, G. L., e Roli, F., «Evaluation of Multimodal Biometric Score Fusion Rules under Spoof Attacks», in 5th IAPR Int’l Conference on Biometrics (ICB), New Delhi, India, 2012, pagg 402-407. (612.37 KB)

Pages