Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems

N Cassavia, L Caviglione, M Guarascio… - Journal of Intelligent …, 2024 - Springer
Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate
resource-constrained devices within a botnet or leak sensitive information. A major research …

A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores

N Cassavia, L Caviglione, M Guarascio… - Social Network Analysis …, 2023 - Springer
An increasing volume of malicious software exploits information hiding techniques to cloak
additional attack stages or bypass frameworks enforcing security. This trend has intensified …

[PDF][PDF] Using AI to face covert attacks in IoT and softwarized scenarios: challenges and opportunities.

A Liguori, S Mungari, M Zuppelli, C Comito… - Ital-IA, 2023 - ceur-ws.org
Recently, the number of attacks aiming at breaching networked and softwarized
environments has been growing exponentially. In particular, information hiding methods and …