Sfoglia per Autore
Download Malware? No, thanks. How Formal Methods can Block Update Attacks
2016-01-01 Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca
Identification of Android Malware Families with Model Checking
2016-01-01 Battista, P; Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca
Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection
2016-01-01 G, Canfora; Medvet, Eric; Mercaldo, Francesco; Visaggio, CORRADO AARON
How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis
2016-01-01 Canfora, Gerardo; Mercaldo, Francesco; Antonio, Pirozzi; Visaggio, CORRADO AARON
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features
2016-01-01 Mercaldo, Francesco; Visaggio, CORRADO AARON; Ferrante, Alberto; Medvet, Eric; Milosevic, Jelena
An HMM and structural entropy based detector for Android malware: An empirical study
2016-01-01 G, Canfora; Mercaldo, Francesco; Visaggio, CORRADO AARON
Exploring Mobile User Experience Through Code Quality Metrics
2016-01-01 Canfora, Gerardo; Di Sorbo, Andrea; Mercaldo, Francesco; Visaggio, CORRADO AARON
Silent and Continuous Authentication in Mobile Environment
2016-01-01 Canfora, Gerardo; Mercaldo, Francesco; Visaggio, CORRADO AARON; Di Notte, Paolo
Mobile malware detection in the real world
2016-01-01 Mercaldo, Francesco; Visaggio, CORRADO AARON; G, Canfora; Cimitile, Aniello
Game bot detection in online role player game through behavioural features
2017-01-01 Bernardi, ; M, L; Cimitile, M; Martinelli, F; Mercaldo, F
Let's gossip: Exploring malware zero-day time windows by social network analysis
2017-01-01 Marulli, F; Mercaldo, F
A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware
2017-01-01 Faiella, ; M, ; Marra, A; Martinelli, F; Mercaldo, F; Saracino, ; A, ; Sheikhalishahi, M
BRIDEMAID: An hybrid tool for accurate detection of android malware
2017-01-01 Martinelli, F; Mercaldo, F; Saracino, A
A Methodology for Silent and Continuous Authentication in Mobile Environment
2017-01-01 Canfora, G; di Notte, P; Mercaldo, F; Visaggio, ; C, A
A fuzzy-based process mining approach for dynamic malware detection
2017-01-01 Bernardi, M L; Cimitile, M; Martinelli, F; Mercaldo, F
Evaluating Convolutional Neural Network for Effective Mobile Malware Detection
2017-01-01 Martinelli, F; Marulli, F; Mercaldo, F
Process mining meets malware evolution: A study of the behavior of malicious code
2017-01-01 Bernardi, ; M, L; Cimitile, M; Mercaldo, F
Formal methods meet mobile code obfuscation identification of code reordering technique
2017-01-01 Cimitile, A; Martinelli, F; Mercaldo, F; Nardone, V; Santone, A
A time series classification approach to game bot detection
2017-01-01 Bernardi, M L; Cimitile, M; Martinelli, F; Mercaldo, F
Android malware detection based on system call sequences and LSTM
2017-01-01 Xiao, X; Zhang, S; Mercaldo, F; Hu, G; Sangaiah, A K
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Download Malware? No, thanks. How Formal Methods can Block Update Attacks | 1-gen-2016 | Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca | |
Identification of Android Malware Families with Model Checking | 1-gen-2016 | Battista, P; Mercaldo, F; Nardone, V; Santone, Antonella; Visaggio, Ca | |
Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection | 1-gen-2016 | G, Canfora; Medvet, Eric; Mercaldo, Francesco; Visaggio, CORRADO AARON | |
How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis | 1-gen-2016 | Canfora, Gerardo; Mercaldo, Francesco; Antonio, Pirozzi; Visaggio, CORRADO AARON | |
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features | 1-gen-2016 | Mercaldo, Francesco; Visaggio, CORRADO AARON; Ferrante, Alberto; Medvet, Eric; Milosevic, Jelena | |
An HMM and structural entropy based detector for Android malware: An empirical study | 1-gen-2016 | G, Canfora; Mercaldo, Francesco; Visaggio, CORRADO AARON | |
Exploring Mobile User Experience Through Code Quality Metrics | 1-gen-2016 | Canfora, Gerardo; Di Sorbo, Andrea; Mercaldo, Francesco; Visaggio, CORRADO AARON | |
Silent and Continuous Authentication in Mobile Environment | 1-gen-2016 | Canfora, Gerardo; Mercaldo, Francesco; Visaggio, CORRADO AARON; Di Notte, Paolo | |
Mobile malware detection in the real world | 1-gen-2016 | Mercaldo, Francesco; Visaggio, CORRADO AARON; G, Canfora; Cimitile, Aniello | |
Game bot detection in online role player game through behavioural features | 1-gen-2017 | Bernardi, ; M, L; Cimitile, M; Martinelli, F; Mercaldo, F | |
Let's gossip: Exploring malware zero-day time windows by social network analysis | 1-gen-2017 | Marulli, F; Mercaldo, F | |
A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware | 1-gen-2017 | Faiella, ; M, ; Marra, A; Martinelli, F; Mercaldo, F; Saracino, ; A, ; Sheikhalishahi, M | |
BRIDEMAID: An hybrid tool for accurate detection of android malware | 1-gen-2017 | Martinelli, F; Mercaldo, F; Saracino, A | |
A Methodology for Silent and Continuous Authentication in Mobile Environment | 1-gen-2017 | Canfora, G; di Notte, P; Mercaldo, F; Visaggio, ; C, A | |
A fuzzy-based process mining approach for dynamic malware detection | 1-gen-2017 | Bernardi, M L; Cimitile, M; Martinelli, F; Mercaldo, F | |
Evaluating Convolutional Neural Network for Effective Mobile Malware Detection | 1-gen-2017 | Martinelli, F; Marulli, F; Mercaldo, F | |
Process mining meets malware evolution: A study of the behavior of malicious code | 1-gen-2017 | Bernardi, ; M, L; Cimitile, M; Mercaldo, F | |
Formal methods meet mobile code obfuscation identification of code reordering technique | 1-gen-2017 | Cimitile, A; Martinelli, F; Mercaldo, F; Nardone, V; Santone, A | |
A time series classification approach to game bot detection | 1-gen-2017 | Bernardi, M L; Cimitile, M; Martinelli, F; Mercaldo, F | |
Android malware detection based on system call sequences and LSTM | 1-gen-2017 | Xiao, X; Zhang, S; Mercaldo, F; Hu, G; Sangaiah, A K |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile