Search

Your search keyword '"PIERAZZI, FABIO"' showing total 50 results

Search Constraints

Start Over You searched for: Author "PIERAZZI, FABIO" Remove constraint Author: "PIERAZZI, FABIO"
50 results on '"PIERAZZI, FABIO"'

Search Results

1. On the Effectiveness of Adversarial Training on Malware Classifiers

2. Demystifying Behavior-Based Malware Detection at Endpoints

3. How to Train your Antivirus: RL-based Hardening through the Problem-Space

4. Unraveling the Key of Machine Learning Solutions for Android Malware Detection

5. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)

6. Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses

7. 'Real Attackers Don't Compute Gradients': Bridging the Gap Between Adversarial ML Research and Practice

8. Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers

9. Pitfalls in Machine Learning for Computer Security.

10. Realizable Universal Adversarial Perturbations for Malware

11. Dos and Don'ts of Machine Learning in Computer Security

12. Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

13. Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]

14. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

15. How to Train your Antivirus: RL-based Hardening through the Problem-Space

16. Are Machine Learning Models for Malware Detection Ready for Prime Time?

27. INSOMNIA

34. Intriguing Properties of Adversarial ML Attacks in the Problem Space

37. A Probabilistic Logic of Cyber Deception

39. <inline-formula><tex-math notation="LaTeX">$\sf {DBank}$</tex-math><alternatives><mml:math><mml:mi mathvariant="sans-serif">DBank</mml:mi></mml:math><inline-graphic xlink:href="pierazzi-ieq1-2909902.gif"/></alternatives></inline-formula>: Predictive Behavioral Analysis of Recent Android Banking Trojans

46. Detection and Threat Prioritization of Pivoting Attacks in Large Networks

47. Exploratory security analytics for anomaly detection

48. Efficient detection of unauthorized data modification in cloud databases

49. Scalable architecture for multi-user encrypted SQL operations on cloud database services

50. Countering Advanced Persistent Threats through Security Intelligence and Big Data Analytics

Catalog

Books, media, physical & digital resources