Extinguishing ransomware-a hybrid approach to android ransomware detection A Ferrante, M Malek, F Martinelli, F Mercaldo, J Milosevic Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 96 | 2018 |
Scheduling energy consumption with local renewable micro-generation and dynamic electricity prices O Derin, A Ferrante First Workshop on Green and Smart Embedded System Technology …, 2010 | 60 | 2010 |
Spotting the malicious moment: Characterizing malware behavior using dynamic features A Ferrante, E Medvet, F Mercaldo, J Milosevic, CA Visaggio 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 48 | 2016 |
Precise agriculture: effective deep learning strategies to detect pest insects L Butera, A Ferrante, M Jermini, M Prevostini, C Alippi IEEE/CAA Journal of Automatica Sinica 9 (2), 246-258, 2021 | 45 | 2021 |
A Friend or a Foe? Detecting Malware using Memory and CPU Features. J Milosevic, M Malek, A Ferrante SECRYPT, 73-84, 2016 | 39 | 2016 |
IPSec hardware resource requirements evaluation A Ferrante, V Piuri, J Owen Next Generation Internet Networks, 2005, 240-246, 2005 | 39 | 2005 |
Qos and security in energy-harvesting wireless sensor networks AV Taddeo, M Mura, A Ferrante 2010 International conference on security and cryptography (SECRYPT), 1-10, 2010 | 31 | 2010 |
Time, accuracy and power consumption tradeoff in mobile malware detection systems J Milosevic, M Malek, A Ferrante Computers & Security 82, 314-328, 2019 | 17 | 2019 |
Gradual adaptation of security for sensor networks AV Taddeo, L Micconi, A Ferrante 2010 IEEE International Symposium on" A World of Wireless, Mobile and …, 2010 | 17 | 2010 |
Coordinated management of hardware and software self-adaptivity O Derin, A Ferrante, AV Taddeo Journal of Systems Architecture 55 (3), 170-179, 2009 | 16 | 2009 |
Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach. A Ferrante, G Piscopo, S Scaldaferri IEEE Real-Time and Embedded Technology and Applications Symposium, 128-137, 2005 | 16 | 2005 |
Malaware: Effective and efficient run-time mobile malware detector J Milosevic, A Ferrante, M Malek 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 14 | 2016 |
What does the memory say? towards the most indicative features for efficient malware detection J Milosevic, A Ferrante, M Malek 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016 | 14 | 2016 |
A resource-optimized approach to efficient early detection of mobile malware J Milosevic, A Dittrich, A Ferrante, M Malek 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 14 | 2014 |
A packet scheduling algorithm for IPSec multi-accelerator based systems F Castanier, A Ferrante, V Piuri Proceedings. 15th IEEE International Conference on Application-Specific …, 2004 | 14 | 2004 |
Run-time selection of security algorithms for networked devices AV Taddeo, A Ferrante Proceedings of the 5th ACM symposium on QoS and security for wireless and …, 2009 | 13 | 2009 |
A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems A Ferrante, V Piuri, F Castanier Proceedings of the 2nd Conference on Computing Frontiers, 221-229, 2005 | 13 | 2005 |
Security enhanced linux on embedded systems: A hardware-accelerated implementation L Fiorin, A Ferrante, K Padarnitsas, F Regazzoni 17th Asia and South Pacific Design Automation Conference, 29-34, 2012 | 11 | 2012 |
A security-enhanced design methodology for embedded systems A Ferrante, J Milosevic, M Janjušević 2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013 | 10 | 2013 |
Risk assessment of atrial fibrillation: a failure prediction approach J Milosevic, A Dittrich, A Ferrante, M Malek, CR Quiros, R Braojos, ... Computing in Cardiology 2014, 801-804, 2014 | 9 | 2014 |