Stefano Zanero
Stefano Zanero
Email verificata su - Home page
TitoloCitata daAnno
Unsupervised learning techniques for an intrusion detection system
S Zanero, SM Savaresi
Proceedings of the 2004 ACM symposium on Applied computing, 412-419, 2004
Computer virus propagation models
G Serazzi, S Zanero
Performance Tools and Applications to Networked Systems, 26-50, 2004
Bitiodine: Extracting intelligence from the bitcoin network
M Spagnuolo, F Maggi, S Zanero
International Conference on Financial Cryptography and Data Security, 457-468, 2014
Detecting intrusions through system call sequence and argument analysis
F Maggi, M Matteucci, S Zanero
IEEE Transactions on Dependable and Secure Computing 7 (4), 381-395, 2010
Identifying dormant functionality in malware programs
PM Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, S Zanero
2010 IEEE Symposium on Security and Privacy (SP), 61-76, 2010
Phoenix: DGA-based botnet tracking and intelligence
S Schiavoni, F Maggi, L Cavallaro, S Zanero
International Conference on Detection of Intrusions and Malware, and …, 2014
Studying Bluetooth Malware Propagation: The BlueBag Project
L Carettoni, C Merloni, S Zanero
IEEE Security & Privacy 5 (2), 17-25, 2007
Heldroid: Dissecting and detecting mobile ransomware
N Andronio, S Zanero, F Maggi
International Workshop on Recent Advances in Intrusion Detection, 382-404, 2015
A fast eavesdropping attack against touchscreens
F Maggi, A Volpatto, S Gasparini, G Boracchi, S Zanero
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
ShieldFS: a self-healing, ransomware-aware filesystem
A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors
F Maggi, A Valdi, S Zanero
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
Reducing false positives in anomaly detectors through fuzzy alert aggregation
F Maggi, M Matteucci, S Zanero
Information Fusion 10 (4), 300-311, 2009
Analyzing TCP traffic patterns using self organizing maps
S Zanero
International Conference on Image Analysis and Processing, 83-90, 2005
Open problems in computer virology
E Filiol, M Helenius, S Zanero
Journal in Computer Virology 1 (3-4), 55-66, 2006
AndRadar: fast discovery of android applications in alternative markets
M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ...
International Conference on Detection of Intrusions and Malware, and …, 2014
Two years of short urls internet measurement: security threats and countermeasures
F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ...
proceedings of the 22nd international conference on World Wide Web, 861-872, 2013
Unsupervised learning algorithms for intrusion detection
S Zanero, G Serazzi
Network Operations and Management Symposium, 2008. NOMS 2008. IEEE, 1043-1048, 2008
Selecting and improving system call models for anomaly detection
A Frossi, F Maggi, GL Rizzo, S Zanero
International Conference on Detection of Intrusions and Malware, and …, 2009
Lines of malicious code: insights into the malicious software industry
M Lindorfer, A Di Federico, F Maggi, PM Comparetti, S Zanero
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Behavioral intrusion detection
S Zanero
International Symposium on Computer and Information Sciences, 657-666, 2004
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20