McPAD: A multiple classifier system for accurate payload-based anomaly detection R Perdisci, D Ariu, P Fogla, G Giacinto, W Lee Computer networks 53 (6), 864-881, 2009 | 356 | 2009 |
Stealth attacks: An extended insight into the obfuscation effects on android malware D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto Computers & Security 51, 16-31, 2015 | 195 | 2015 |
HMMPayl: An intrusion detection system based on Hidden Markov Models D Ariu, R Tronci, G Giacinto computers & security 30 (4), 221-241, 2011 | 164 | 2011 |
Poisoning behavioral malware clustering B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli Proceedings of the 2014 workshop on artificial intelligent and security …, 2014 | 156 | 2014 |
Is data clustering in adversarial settings secure? B Biggio, I Pillai, S Rota Bulò, D Ariu, M Pelillo, F Roli Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013 | 135 | 2013 |
Scalable fine-grained behavioral clustering of http-based malware R Perdisci, D Ariu, G Giacinto Computer Networks 57 (2), 487-500, 2013 | 93 | 2013 |
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references I Corona, D Maiorca, D Ariu, G Giacinto Proceedings of the 2014 workshop on artificial intelligent and security …, 2014 | 82 | 2014 |
Deltaphish: Detecting phishing webpages in compromised websites I Corona, B Biggio, M Contini, L Piras, R Corda, M Mereu, G Mureddu, ... Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 77 | 2017 |
Hmm-web: A framework for the detection of attacks against web applications I Corona, D Ariu, G Giacinto 2009 IEEE International Conference on Communications, 1-6, 2009 | 68 | 2009 |
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files D Maiorca, D Ariu, I Corona, G Giacinto Proceedings of the 1st International Conference on Information Systems …, 2015 | 57 | 2015 |
Clustering android malware families by http traffic M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto 10th International Conference on Malicious and Unwanted Software (MALWARE), 2015 | 53 | 2015 |
2020 cybercrime economic costs: No measure no solution J Armin, B Thompson, D Ariu, G Giacinto, F Roli, P Kijewski 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 52 | 2015 |
Sensing attacks in computers networks with Hidden Markov Models D Ariu, G Giacinto, R Perdisci Machine Learning and Data Mining in Pattern Recognition: 5th International …, 2007 | 32 | 2007 |
Machine learning in computer forensics (and the lessons learned from machine learning in computer security) D Ariu, G Giacinto, F Roli Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011 | 25 | 2011 |
Social engineering 2.0: A foundational work D Ariu, E Frumento, G Fumera Proceedings of the computing frontiers conference, 319-325, 2017 | 24 | 2017 |
Detecting misuse of google cloud messaging in android badware M Ahmadi, B Biggio, S Arzt, D Ariu, G Giacinto Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 20 | 2016 |
HMMPayl: an application of HMM to the analysis of the HTTP Payload D Ariu, G Giacinto Proceedings of the First Workshop on Applications of Pattern Analysis, 81-87, 2010 | 16 | 2010 |
Deepsquatting: Learning-based typosquatting detection at deeper domain levels P Piredda, D Ariu, B Biggio, I Corona, L Piras, G Giacinto, F Roli AI* IA 2017 Advances in Artificial Intelligence: XVIth International …, 2017 | 14 | 2017 |
Security of the Digital Natives D Ariu, F Bosco, V Ferraris, P Perri, G Spolti, P Stirparo, G Vaciago, ... http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2442037, 2014 | 10 | 2014 |
The role of Social Engineering in evolution of attacks E Frumento, R Puricelli, F Freschi, D Ariu, N Weiss, C Dambra, I Cotoi, ... Eoropean Commission, 2016 | 9 | 2016 |