Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Daniele Ucci"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 4, Pp 794-807 (2023)
In the very recent years, cybersecurity attacks have increased at an unprecedented pace, becoming ever more sophisticated and costly. Their impact has involved both private/public companies and critical infrastructures. At the same time, due to the C
Externí odkaz:
https://doaj.org/article/08bb328084eb4bde9c1cd27398eb0613
Autor:
Luca Massarelli, Leonardo Aniello, Claudio Ciccotelli, Leonardo Querzoni, Daniele Ucci, Roberto Baldoni
Publikováno v:
Information, Vol 11, Iss 6, p 326 (2020)
The vast majority of today’s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families. In this paper, we propose AndroDFA (DFA, detrended fluctuation analysis): an
Externí odkaz:
https://doaj.org/article/18a55b3bccf34c8cb2ac7aebd58ca99e
Publikováno v:
2021 IEEE Symposium Series on Computational Intelligence (SSCI).
Publikováno v:
Computers & Security. 81:123-147
Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of the most common approaches in literature is using machine learning techniques, to automatically learn models and patterns behind
Publikováno v:
ACSAC
Spam phone calls have been rapidly growing from nuisance to an increasingly effective scam delivery tool. To counter this increasingly successful attack vector, a number of commercial smartphone apps that promise to block spam phone calls have appear
Autor:
Daniele Ucci, Leonardo Querzoni, Leonardo Aniello, Luca Massarelli, Roberto Baldoni, Claudio Ciccotelli
Publikováno v:
Information, Vol 11, Iss 326, p 326 (2020)
Information
Volume 11
Issue 6
Information
Volume 11
Issue 6
The vast majority of today&rsquo
s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families. In this paper, we propose AndroDFA (DFA, detrended fluctuation analy
s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families. In this paper, we propose AndroDFA (DFA, detrended fluctuation analy
Autor:
Luca Massarelli, Roberto Baldoni, Claudio Ciccotelli, Leonardo Aniello, Daniele Ucci, Leonardo Querzoni
Publikováno v:
MALWARE
The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years. An important task of malware analysis is the classification of malware samples into known families
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::998534d242db3113b3569808e0c2f29b
Publikováno v:
CODASPY
Knowledge base (KB) sharing among parties has been proven to be beneficial in several scenarios. However such sharing can arise considerable privacy concerns depending on the sensitivity of the information stored in each party's KB. In this paper, we
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dadf6cbecafa468a00d3bcde7cb0625d
http://hdl.handle.net/11573/972513
http://hdl.handle.net/11573/972513
Publikováno v:
VizSEC
Malware associated with Web downloads is responsible for many attacks trying to execute malicious code on a remote machine. Web browsers are protected by anti-malware utilities that try to distinguish between good downloads and bad downloads, blockin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e6da59ce6988d40101cd4b06f128f95e
http://hdl.handle.net/11573/1017448
http://hdl.handle.net/11573/1017448
Publikováno v:
DSN Workshops
Critical Infrastructures (CIs) are among the main targets of activists, cyber terrorists and state sponsored attacks. To protect itself, a CI needs to build and keep updated a domestic knowledge base of cyber threats. It cannot indeed completely rely
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::401e4582f09ea15d695565cb23507eac
http://hdl.handle.net/11573/933397
http://hdl.handle.net/11573/933397