Search

Your search keyword '"Conti, Mauro"' showing total 12 results
12 results on '"Conti, Mauro"'

Search Results

2. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning.

4. Can machine learning model with static features be fooled: an adversarial machine learning approach.

5. On defending against label flipping attacks on malware detection systems.

6. Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel.

7. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.

8. Detecting Android Malware Leveraging Text Semantics of Network Flows.

9. Computational Intelligence Approaches for Energy Load Forecasting in Smart Energy Management Grids: State of the Art, Future Challenges, and Research Directions.

10. BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.

11. Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions.

12. Identification of Android malware using refined system calls.

Catalog

Books, media, physical & digital resources