Davide Ariu
Davide Ariu
CEO & Co-Founder of Pluribus One, Research Assistant @ University of Cagliari
Verified email at diee.unica.it - Homepage
TitleCited byYear
McPAD: A multiple classifier system for accurate payload-based anomaly detection
R Perdisci, D Ariu, P Fogla, G Giacinto, W Lee
Computer networks 53 (6), 864-881, 2009
2662009
HMMPayl: An intrusion detection system based on Hidden Markov Models
D Ariu, R Tronci, G Giacinto
computers & security 30 (4), 221-241, 2011
1082011
Is data clustering in adversarial settings secure?
B Biggio, I Pillai, S Rota Bulò, D Ariu, M Pelillo, F Roli
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
712013
Poisoning behavioral malware clustering
B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli
Proceedings of the 2014 workshop on artificial intelligent and security …, 2014
702014
Scalable fine-grained behavioral clustering of http-based malware
R Perdisci, D Ariu, G Giacinto
Computer Networks 57 (2), 487-500, 2013
682013
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
632015
Hmm-web: A framework for the detection of attacks against web applications
I Corona, D Ariu, G Giacinto
2009 IEEE International Conference on Communications, 1-6, 2009
442009
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
412014
Sensing attacks in computers networks with hidden markov models
D Ariu, G Giacinto, R Perdisci
International Workshop on Machine Learning and Data Mining in Pattern …, 2007
302007
2020 cybercrime economic costs: No measure no solution
J Armin, B Thompson, D Ariu, G Giacinto, F Roli, P Kijewski
2015 10th International Conference on Availability, Reliability and Security …, 2015
262015
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files
D Maiorca, D Ariu, I Corona, G Giacinto
Proceedings of the 1st International Conference on Information Systems …, 2015
262015
Clustering android malware families by http traffic
M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto
10th International Conference on Malicious and Unwanted Software (MALWARE), 2015
232015
Deltaphish: Detecting phishing webpages in compromised websites
I Corona, B Biggio, M Contini, L Piras, R Corda, M Mereu, G Mureddu, ...
European Symposium on Research in Computer Security, 370-388, 2017
142017
HMMPayl: an application of HMM to the analysis of the HTTP Payload
D Ariu, G Giacinto
Proceedings of the First Workshop on Applications of Pattern Analysis, 81-87, 2010
142010
Machine learning in computer forensics (and the lessons learned from machine learning in computer security)
D Ariu, G Giacinto, F Roli
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
92011
Detecting misuse of google cloud messaging in android badware
M Ahmadi, B Biggio, S Arzt, D Ariu, G Giacinto
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016
82016
Host and Network based Anomaly Detectors for HTTP Attacks
D Ariu
Diss. PhD thesis, PhD Program in Electronic and Computer Eng.(DRIEI …, 2010
82010
Igino Corona, Marco Aresu, Giorgio Giacinto, Stealth attacks
D Maiorca, D Ariu
Computers and Security 51, 16-31, 2015
72015
An Evasion Resilient Approach to the Detection of Malicious PDF Files
D Maiorca, D Ariu, I Corona, G Giacinto
International Conference on Information Systems Security and Privacy, 68-85, 2015
62015
Deepsquatting: Learning-based typosquatting detection at deeper domain levels
P Piredda, D Ariu, B Biggio, I Corona, L Piras, G Giacinto, F Roli
Conference of the Italian Association for Artificial Intelligence, 347-358, 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–20