Publications

Export 420 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
M. Haindl, Kittler, J., e Roli, F., Multiple Classifier Systems, vol 4472. Springer, 2007, pag 524.
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation», Horst Görtz Institut for IT Security (Ruhr-University Bochum), Technical Report TR-HGI-2016-003, 2016. (519.16 KB)
T. Hupperich, Maiorca, D., Kührer, M., Holz, T., e Giacinto, G., «On the Robustness of Mobile Device Fingerprinting», in 31st Annual Computer Security and Applications Conference (ACSAC 2015), 7-10th December 2015, Los Angeles, USA, 2015, pagg 191-200. (301.87 KB)
K
J. Kittler e Roli, F., Multiple Classifier Systems, vol 1857. Springer-Verlag, 2000.
J. Kittler e Roli, F., Multiple Classifier Systems, vol 2096. Springer-Verlag, 2001.
B. Kolosnjaji, Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C., e Roli, F., «Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables», in 2018 26th European Signal Processing Conference (EUSIPCO), Rome, 2018, pagg 533-537. (674.62 KB)
L. Kuncheva, Roli, F., Marcialis, G. L., e Shipp, C., «Complexity of Data Subsets Generated by the Random Subspace Method: an Experimental Investigation», in 2nd International Workshop on Multiple Classifier Systems (MCS 2001), 2001, vol 2096, pagg 349-358.
L
B. Lavi, Fumera, G., e Roli, F., «A Multi-Stage Ranking Approach for Fast Person Re-Identification», IET Computer Vision, In Press. (1.07 MB)
C. - T. Li e Satta, R., «On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics», in 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), London, United Kingdom, 2011. (399.99 KB)
C. - T. Li e Satta, R., «Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise», IET Computer Vision, vol 6, n° 6, pagg 560-566, 2012.
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F., «Dynamic Linear Combination of Two-Class Classifiers», in Lecture Notes in Computer Science, 2010, vol 6218, pagg 473-482.
C. Lobrano, Tronci, R., Giacinto, G., e Roli, F., «A Score Decidability Index for Dynamic Score Combination», in Pattern Recognition, International Conference on, Los Alamitos, CA, USA, 2010, pagg 69-72.
M
D. Maiorca, Corona, I., e Giacinto, G., «Looking at the Bag is not Enough to Find the Bomb: an Evasion of Structural Methods for Malicious PDF Files Detection», in 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, 2013. (2.12 MB)
D. Maiorca e Biggio, B., «Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware», IEEE Security and Privacy: Special Issue on Digital Forensics, vol 17, n° 1, pagg 63-71, 2019. (838.95 KB)
D. Maiorca, Mercaldo, F., Giacinto, G., Visaggio, A., e Martinelli, F., «R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware», in ACM Symposium on Applied Computing (SAC 2017 - Acceptance Rate 15.7%), 2017, pagg 1718-1723. (272.44 KB)
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «An Evasion Resilient Approach to the Detection of Malicious PDF Files», in Information Systems Security and Privacy (Communication in Computer and Information Science), vol 576, Springer, 2015, pagg 68-85. (503.11 KB)
D. Maiorca, Russu, P., Corona, I., Biggio, B., e Giacinto, G., «Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis», in 1st Italian Conference on CyberSecurity (ITASEC), 2017, vol 1816, pagg 96-105. (371.53 KB)

Pages