M. Aresu, Ariu, D., Ahmadi, M., Maiorca, D., and Giacinto, G.,
“Clustering Android Malware Families by Http Traffic”, in
10h International Conference on Malicious and Unwanted Software (MALCON 2015), October 20-22th 2015, Fajardo, Puerto Rico, USA, 2015.
(168.36 KB) B. Biggio, Pillai, I., Rota Bulò, S., Ariu, D., Pelillo, M., and Roli, F.,
“Is Data Clustering in Adversarial Settings Secure?”, in
AISec'13: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Berlin, 2013, pp. 87-98.
(300.52 KB) P. Piredda, Ariu, D., Biggio, B., Corona, I., Piras, L., Giacinto, G., and Roli, F.,
“Deepsquatting: Learning-based Typosquatting Detection at Deeper Domain Levels”, in
16th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2017), 2017, vol. 10640 of LNCS, pp. 347-358.
(1.21 MB) M. Ahmadi, Biggio, B., Arzt, S., Ariu, D., and Giacinto, G.,
“Detecting Misuse of Google Cloud Messaging in Android Badware”, in
6th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Vienna, Austria, 2016, pp. 103-112.
(626.38 KB) I. Corona, Maiorca, D., Ariu, D., and Giacinto, G.,
“Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References”, in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottdale, Arizona, USA, 2014.
(455.14 KB) D. Ariu, Giacinto, G., and Roli, F.,
“Machine Learning in Computer Forensics (and the Lessons Learned from Machine Learning in Computer Security)”, in
AISec 2011: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011.
(379.05 KB) B. Biggio, Rieck, K., Ariu, D., Wressnegger, C., Corona, I., Giacinto, G., and Roli, F.,
“Poisoning Behavioral Malware Clustering”, in
AISec'14: Proceedings of the 2014 ACM Workshop on Artificial Intelligence and Security, co-located with CCS '14, Scottsdale, Arizona, USA, 2014, pp. 27-36.
(375.58 KB) D. Ariu, Giacinto, G., and Perdisci, R.,
“Sensing attacks in Computers Network with Hidden Markov Models”, in
Machine Learning and Data Mining in Pattern Recognition, MLDM 2007, Leipzig, 2007, vol. 4571, pp. 449-463.
(315.94 KB)