关注
Fabio Di Troia
Fabio Di Troia
在 sjsu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
A comparison of static, dynamic, and hybrid analysis for malware detection
A Damodaran, FD Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13, 1-12, 2017
5132017
Transfer learning for image-based malware classification
N Bhodia, P Prajapati, F Di Troia, M Stamp
arXiv preprint arXiv:1903.11551, 2019
1222019
Detecting malware evolution using support vector machines
M Wadkar, F Di Troia, M Stamp
Expert Systems with Applications 143, 113022, 2020
992020
Deep Learning versus Gist Descriptors for Image-based Malware Classification.
S Yajamanam, VRS Selvin, F Di Troia, M Stamp
Icissp, 553-561, 2018
992018
Support vector machines and malware detection
T Singh, F Di Troia, VA Corrado, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 12, 203-212, 2016
842016
Clustering for malware classification
S Pai, FD Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13, 95-107, 2017
812017
Feature analysis of encrypted malicious traffic
AS Shekhawat, F Di Troia, M Stamp
Expert Systems with Applications 125, 130-141, 2019
792019
Static and dynamic analysis of android malware
A Kapratwar, F Di Troia, M Stamp
International Workshop on FORmal methods for Security Engineering 2, 653-662, 2017
622017
Malware detection using dynamic birthmarks
S Vemparala, F Di Troia, VA Corrado, TH Austin, M Stamo
Proceedings of the 2016 ACM on international workshop on security and …, 2016
542016
Clustering versus SVM for malware detection
U Narra, FD Troia, VA Corrado, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 12, 213-224, 2016
432016
Convolutional neural networks for image spam detection
T Sharmin, F Di Troia, K Potika, M Stamp
Information Security Journal: A Global Perspective 29 (3), 103-117, 2020
312020
Malware classification with word2vec, hmm2vec, bert, and elmo
AS Kale, V Pandya, F Di Troia, M Stamp
Journal of Computer Virology and Hacking Techniques 19 (1), 1-16, 2023
292023
Support vector machines for image spam analysis
A Chavda, K Potika, F Di Troia, M Stamp
272018
An analysis of Android adware
S Suresh, F Di Troia, K Potika, M Stamp
Journal of Computer Virology and Hacking Techniques 15, 147-160, 2019
232019
Hidden Markov models with random restarts versus boosting for malware detection
A Raghavan, F Di Troia, M Stamp
Journal of Computer Virology and Hacking Techniques 15, 97-107, 2019
232019
Multifamily malware models
S Basole, F Di Troia, M Stamp
Journal of Computer Virology and Hacking Techniques 16, 79-92, 2020
222020
A comparative analysis of android malware
N Chavan, F Di Troia, M Stamp
arXiv preprint arXiv:1904.00735, 2019
222019
Classic cryptanalysis using hidden Markov models
R Vobbilisetty, F Di Troia, RM Low, CA Visaggio, M Stamp
Cryptologia 41 (1), 1-28, 2017
222017
Malware classification using long short-term memory models
D Dang, F Di Troia, M Stamp
arXiv preprint arXiv:2103.02746, 2021
212021
Generative adversarial networks and image-based malware classification
H Nguyen, F Di Troia, G Ishigaki, M Stamp
Journal of Computer Virology and Hacking Techniques 19 (4), 579-595, 2023
172023
系统目前无法执行此操作,请稍后再试。
文章 1–20