Export 141 results:
Filters: Author is Giorgio Giacinto  [Clear All Filters]
Journal Article
M. Narouei, Ahmadi, M., Giacinto, G., Takabi, H., e Sami, A., «DLLMiner: structural mining for malware detection», Security and Communication Networks, 2015. (731.78 KB)
R. Tronci, Giacinto, G., e Roli, F., «Designing multiple biometric systems: measures of ensemble effectiveness», Engineering Applications of Artificial Intelligence, vol 22, pagg 66-78, 2009.
G. Giacinto e Roli, F., «Design of effective neural network ensembles for image classification», Image and Vision Computing Journal, vol 19, pagg 697-705, 2001.
G. Giacinto, Roli, F., e Bruzzone, L., «Combination of Neural and Statistical Algorithms for Supervised Classification of Remote-Sensing Images», Pattern Recognition Letters, vol 21, pagg 385-397, 2000.
G. Giacinto e Roli, F., «Bayesian Relevance Feedback for Content-Based Image Retrieval», Pattern Recognition, vol 37, pagg 1499-1508, 2004.
R. Paolucci, Coli, P., e Giacinto, G., «Assessment of seismic site effects in 2-D alluvial valleys using neural networks», Earthquake Spectra, vol 16, pagg 661-680, 2000.
G. Giacinto e Roli, F., «An Approach to the Automatic Design of Multiple Classifier Systems», Pattern Recognition Letters, vol 22, pagg 25-33, 2001.
G. Giacinto, Paolucci, R., e Roli, F., «Application of Neural Networks and Statistical Pattern Recognition Algorithms to Earthquake Risk Evaluations», Pattern Recognition Letters, vol 18, pagg 1353-1362, 1997.
R. Perdisci, Giacinto, G., e Roli, F., «Alarm clustering for intrusion detection systems in computer networks», Engineering Applications of Artificial Intelligence, vol 19, pagg 429-438, 2006.
D. Maiorca, Demontis, A., Biggio, B., Roli, F., e Giacinto, G., «Adversarial Detection of Flash Malware: Limitations and Open Issues», Computers & Security, vol 96, 2020. (1.08 MB)
I. Corona, Giacinto, G., e Roli, F., «Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues», Information Sciences, vol 239, 2013. (1.49 MB)
Conference Proceedings
D. Maiorca, Ariu, D., Corona, I., e Giacinto, G., «A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files», Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015, 9-11th February 2015, Angers, France). pagg 27-36, 2015. (267.78 KB)
L. Borzacchiello, Coppa, E., Maiorca, D., Columbu, A., Demetrescu, C., e Giacinto, G., «Reach Me if You Can: On Native Vulnerability Reachability in Android Apps», 27th European Symposium on Research in Computer Security (ESORICS). 2022. (979.51 KB)
D. Ugarte, Maiorca, D., Cara, F., e Giacinto, G., «PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware», 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Springer, Gothenburg, Sweden, pagg 240-259, 2019. (352.39 KB)
G. Malandrone, Virdis, G., Maiorca, D., e Giacinto, G., «PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis», 5th Italian Conference on CyberSecurity (ITASEC). 2021. (982.03 KB)
M. Contini, Corona, I., Mulas, A., Giacinto, G., e Ariu, D., «Pharmaguard WebApp: an application for the detection of illegal online pharmacies», 2nd International Workshop on Knowledge Discovery on the WEB (KDWEB). Cagliari, 2016. (120.57 KB)
I. Corona, Contini, M., Ariu, D., Giacinto, G., Roli, F., Lund, M., e Marinelli, G., «PharmaGuard: Automatic Identification of Illegal Search-Indexed Online Pharmacies», IEEE International Conference on Cybernetics - Special session Cybersecurity (CYBERSEC). IEEE, Gdynia, Poland , pagg 324 - 329, 2015. (1.44 MB) (3.4 MB)
A. Janovsky, Maiorca, D., Marko, D., Matyas, V., e Giacinto, G., «A Longitudinal Study of Cryptographic API: A Decade of Android Malware», 19th International Conference on Security and Cryptography (SECRYPT). pagg 121-133, 2022. (251.06 KB)
F. Meloni, Sanna, A., Maiorca, D., e Giacinto, G., «Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware», 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). pagg 42-52, 2022. (328.32 KB)
J. Hoffmann, Rytilahti, T., Maiorca, D., Winandy, M., Giacinto, G., e Holz, T., «Evaluating Analysis Tools for Android Apps: Status Quo and Robustness against Obfuscation», Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 09-11 March, 2016). 2016. (726.65 KB)
Conference Paper
D. Ariu, Didaci, L., Fumera, G., Frumento, E., Freschi, F., e Giacinto, G., «Yet Another Cybersecurity Roadmapping Methodology», in First International Workshop on Future Scenarios for Cybercrime and Cyber-terrorism, co-located with the 10th International Conference on Availability, Reliability and Security (ARES), 2015. (1.34 MB)
D. M. Freeman, Jain, S., Duermuth, M., Biggio, B., e Giacinto, G., «Who Are You? A Statistical Approach to Measuring User Authenticity», in Proc. 23rd Annual Network & Distributed System Security Symposium (NDSS), 2016. (764.14 KB)
L. Piras, Furcas, D., e Giacinto, G., «User-driven Nearest-Neighbour Exploration of Image Archives», in 4th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Lisbon, Portugal, 2015, pagg 181 - 189. (376.55 KB)
G. Giacinto, Roli, F., e Fumera, G., «Unsupervised Learning of Neural Network Ensembles for Image Classification», in IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), Como, Italy, 2000, vol III, pagg 155-159.
L. Piras e Giacinto, G., «Unbalanced learning in Content-Based Image Classification and Retrieval», in IEEE International Conference on Multimedia & Expo (ICME), Singapore, 2010. (177.33 KB)