Davide Ariu
Davide Ariu
CEO & Co-Founder of Pluribus One, Research Assistant @ University of Cagliari
Потвърден имейл адрес: diee.unica.it - Начална страница
McPAD: A multiple classifier system for accurate payload-based anomaly detection
R Perdisci, D Ariu, P Fogla, G Giacinto, W Lee
Computer networks 53 (6), 864-881, 2009
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
HMMPayl: An intrusion detection system based on Hidden Markov Models
D Ariu, R Tronci, G Giacinto
computers & security 30 (4), 221-241, 2011
Poisoning behavioral malware clustering
B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
Is data clustering in adversarial settings secure?
B Biggio, I Pillai, S Rota Bulò, D Ariu, M Pelillo, F Roli
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
Scalable fine-grained behavioral clustering of http-based malware
R Perdisci, D Ariu, G Giacinto
Computer Networks 57 (2), 487-500, 2013
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
Hmm-web: A framework for the detection of attacks against web applications
I Corona, D Ariu, G Giacinto
2009 IEEE International Conference on Communications, 1-6, 2009
Deltaphish: Detecting phishing webpages in compromised websites
I Corona, B Biggio, M Contini, L Piras, R Corda, M Mereu, G Mureddu, ...
European Symposium on Research in Computer Security, 370-388, 2017
Clustering android malware families by http traffic
M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto
10th International Conference on Malicious and Unwanted Software (MALWARE), 2015
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files
D Maiorca, D Ariu, I Corona, G Giacinto
Proceedings of the 1st International Conference on Information Systems …, 2015
2020 cybercrime economic costs: No measure no solution
J Armin, B Thompson, D Ariu, G Giacinto, F Roli, P Kijewski
2015 10th International Conference on Availability, Reliability and Security …, 2015
Sensing attacks in computers networks with Hidden Markov Models
D Ariu, G Giacinto, R Perdisci
International Workshop on Machine Learning and Data Mining in Pattern …, 2007
Machine learning in computer forensics (and the lessons learned from machine learning in computer security)
D Ariu, G Giacinto, F Roli
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
Social engineering 2.0: A foundational work
D Ariu, E Frumento, G Fumera
Proceedings of the Computing Frontiers Conference, 319-325, 2017
Detecting misuse of google cloud messaging in android badware
M Ahmadi, B Biggio, S Arzt, D Ariu, G Giacinto
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016
HMMPayl: an application of HMM to the analysis of the HTTP Payload
D Ariu, G Giacinto
Proceedings of the First Workshop on Applications of Pattern Analysis, 81-87, 2010
Deepsquatting: Learning-based typosquatting detection at deeper domain levels
P Piredda, D Ariu, B Biggio, I Corona, L Piras, G Giacinto, F Roli
Conference of the Italian Association for Artificial Intelligence, 347-358, 2017
Security of the Digital Natives
D Ariu, F Bosco, V Ferraris, P Perri, G Spolti, P Stirparo, G Vaciago, ...
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2442037, 2014
The role of Social Engineering in evolution of attacks
E Frumento, R Puricelli, F Freschi, D Ariu, N Weiss, C Dambra, I Cotoi, ...
Eoropean Commission, 2016
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20