Zobrazeno 1 - 10
of 72
pro vyhledávání: '"Angelo Spognardi"'
Autor:
Jovana Mijalkovic, Angelo Spognardi
Publikováno v:
Algorithms, Vol 15, Iss 8, p 258 (2022)
Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of net
Externí odkaz:
https://doaj.org/article/0122bfab5a294deb86599a67cbd60b22
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 188, Iss Proc. WWV 2015, Pp 51-58 (2015)
Major search engines deploy personalized Web results to enhance users' experience, by showing them data supposed to be relevant to their interests. Even if this process may bring benefits to users while browsing, it also raises concerns on the select
Externí odkaz:
https://doaj.org/article/9c7924bf290b4cec98e9f3d5c90a0c80
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2011 (2011)
Externí odkaz:
https://doaj.org/article/19c7bfe38fda4ba6afefba54e90f5d0a
Autor:
Angelo Spognardi
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b435079e007a7938048634a30a4df0f4
https://doi.org/10.1007/978-3-642-27739-9_1798-1
https://doi.org/10.1007/978-3-642-27739-9_1798-1
Publikováno v:
IEEE internet computing (2021).
info:cnr-pdr/source/autori:S. Cresci (1); M. Petrocchi (1); A. Spognardi (2); S. Tognazzi (3)/titolo:Adversarial machine learning for protecting against online manipulation/doi:/rivista:IEEE internet computing/anno:2021/pagina_da:/pagina_a:/intervallo_pagine:/volume
info:cnr-pdr/source/autori:S. Cresci (1); M. Petrocchi (1); A. Spognardi (2); S. Tognazzi (3)/titolo:Adversarial machine learning for protecting against online manipulation/doi:/rivista:IEEE internet computing/anno:2021/pagina_da:/pagina_a:/intervallo_pagine:/volume
Adversarial examples are inputs to a machine learning system that result in an incorrect output from that system. Attacks launched through this type of input can cause severe consequences: for example, in the field of image recognition, a stop signal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::181b31a6fcc1321e8320cdfeeffbcd90
http://arxiv.org/abs/2111.12034
http://arxiv.org/abs/2111.12034
Publikováno v:
EDOARDO DI PAOLO
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ee5cde9be1a7adcaa923ab27909483e9
http://hdl.handle.net/11573/1568050
http://hdl.handle.net/11573/1568050
Publikováno v:
Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications ISBN: 9781785616389
Spambot detection is a must for the protection of cyberspace, in terms of both threats to sensitive information of users and trolls that may want to cheat and influence the public opinion. Unfortunately, new waves of malicious accounts are characteri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b608f1d75a0779784f712d56e6cfa17d
http://hdl.handle.net/11573/1594243
http://hdl.handle.net/11573/1594243
Publikováno v:
WebSci
11th International ACM Conference on Web Science (WebSci'19), pp. 47–56, Boston, USA, 2019
info:cnr-pdr/source/autori:Cresci S.; Petrocchi M.; Spognardi A.; Tognazzi S./congresso_nome:11th International ACM Conference on Web Science (WebSci'19)/congresso_luogo:Boston, USA/congresso_data:2019/anno:2019/pagina_da:47/pagina_a:56/intervallo_pagine:47–56
11th International ACM Conference on Web Science (WebSci'19), pp. 47–56, Boston, USA, 2019
info:cnr-pdr/source/autori:Cresci S.; Petrocchi M.; Spognardi A.; Tognazzi S./congresso_nome:11th International ACM Conference on Web Science (WebSci'19)/congresso_luogo:Boston, USA/congresso_data:2019/anno:2019/pagina_da:47/pagina_a:56/intervallo_pagine:47–56
The arm race between spambots and spambot-detectors is made of several cycles (or generations): a new wave of spambots is created (and new spam is spread), new spambot filters are derived and old spambots mutate (or evolve) to new species. Recently,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::18a940eeb884d24f6e38079ea36a4449
Publikováno v:
Computer communications 150 (2019): 47–61. doi:10.1016/j.comcom.2019.10.019
info:cnr-pdr/source/autori:Cresci S.; Di Pietro R.; Petrocchi M.; Spognardi A.; Tesconi M./titolo:Emergent properties, models, and laws of behavioral similarities within groups of twitter users/doi:10.1016%2Fj.comcom.2019.10.019/rivista:Computer communications/anno:2019/pagina_da:47/pagina_a:61/intervallo_pagine:47–61/volume:150
info:cnr-pdr/source/autori:Cresci S.; Di Pietro R.; Petrocchi M.; Spognardi A.; Tesconi M./titolo:Emergent properties, models, and laws of behavioral similarities within groups of twitter users/doi:10.1016%2Fj.comcom.2019.10.019/rivista:Computer communications/anno:2019/pagina_da:47/pagina_a:61/intervallo_pagine:47–61/volume:150
DNA-inspired online behavioral modeling techniques have been proposed and successfully applied to a broad range of tasks. In this paper, we investigate the fundamental laws that drive the occurrence of behavioral similarities among Twitter users, emp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::43b8734ed181b4fb7cf9106d65517a9e
https://publications.cnr.it/doc/424959
https://publications.cnr.it/doc/424959
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually du