Search

Your search keyword '"APRUZZESE, GIOVANNI"' showing total 65 results

Search Constraints

Start Over You searched for: Author "APRUZZESE, GIOVANNI" Remove constraint Author: "APRUZZESE, GIOVANNI"
65 results on '"APRUZZESE, GIOVANNI"'

Search Results

1. LLM4PM: A case study on using Large Language Models for Process Modeling in Enterprise Organizations

2. Machine Learning in Space: Surveying the Robustness of on-board ML models to Radiation

3. 'Are Adversarial Phishing Webpages a Threat in Reality?' Understanding the Users' Perception of Adversarial Webpages

4. Understanding the Process of Data Labeling in Cybersecurity

5. Attacking logo-based phishing website detectors with adversarial perturbations

6. SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

7. Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations

8. 'Real Attackers Don't Compute Gradients': Bridging the Gap Between Adversarial ML Research and Practice

9. Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors

10. Cybersecurity in the Smart Grid: Practitioners' Perspective

11. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

12. Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

13. Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

14. The Role of Machine Learning in Cybersecurity

15. SoK: The Impact of Unlabelled Data in Cyberthreat Detection

16. Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike

17. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

18. Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

19. On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

20. Hardening Random Forest Cyber Detectors Against Adversarial Attacks

23. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning.

27. The Role of Machine Learning in Cybersecurity

35. Towards an Efficient Detection of Pivoting Activity

49. Detection and Threat Prioritization of Pivoting Attacks in Large Networks

50. Addressing Adversarial Attacks Against Security Systems Based on Machine Learning

Catalog

Books, media, physical & digital resources