Search

Your search keyword '"FEDERICO MAGGI"' showing total 41 results

Search Constraints

Start Over You searched for: "FEDERICO MAGGI" Remove constraint "FEDERICO MAGGI" Topic computer.software_genre Remove constraint Topic: computer.software_genre
41 results on '"FEDERICO MAGGI"'

Search Results

1. Detecting Insecure Code Patterns in Industrial Robot Programs

2. FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds

3. Scalable Testing of Mobile Antivirus Applications

4. BankSealer: A decision support system for online banking fraud analysis and investigation

5. Reconstructing the fractal dimension of granular aggregates from light intensity spectra

6. Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks

7. An Experimental Security Analysis of an Industrial Robot Controller

8. GreatEatlon: Fast, Static Detection of Mobile Ransomware

9. ShieldFS

10. Trellis: Privilege Separation for Multi-user Applications Made Easy

11. Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

12. XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners

13. DroydSeuss: A Mobile Banking Trojan Tracker - Short Paper

14. Reducing false positives in anomaly detectors through fuzzy alert aggregation

15. Seeing the invisible

16. Grab 'n Run

17. HelDroid: Dissecting and Detecting Mobile Ransomware

18. Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software

19. Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries

20. A Practical Attack Against a KNX-based Building Automation System

21. ZARATHUSTRA: Extracting Webinject signatures from banking trojans

22. Stranger danger

23. Black-box forensic and antiforensic characteristics of solid-state drives

24. BankSealer: An Online Banking Fraud Analysis and Decision Support System

25. Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

26. Phoenix: DGA-Based Botnet Tracking and Intelligence

27. AndRadar: Fast Discovery of Android Applications in Alternative Markets

28. AndroTotal

29. Integrated detection of anomalous behavior of computer infrastructures

30. All your face are belong to us: breaking Facebook's social authentication

31. Lines of malicious code: insights into the malicious software industry

32. BURN: Baring unknown rogue networks

33. Finding non-trivial malware naming inconsistencies

34. Detecting Intrusions through System Call Sequence and Argument Analysis

35. Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds

36. A Recognizer of Rational Trace Languages

37. Integrated Detection of Attacks Against Browsers, Web Applications and Databases

38. Selecting and Improving System Call Models for Anomaly Detection

39. On the use of different statistical tests for alert correlation - Short Paper

40. On the Privacy and Security of the Ultrasound Ecosystem

41. Two years of short URLs internet measurement: Security threats and countermeasures

Catalog

Books, media, physical & digital resources