Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Daniele Ucci
@article{DBLP:journals/jocsap/SobreroCUB23, author = {Filippo Sobrero and Beatrice Clavarezza and Daniele Ucci and Federica Bisio}, title = {Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {4}, pages = {794--807}, year = {2023}, url = {https://doi.org/10.3390/jcp3040035}, doi = {10.3390/JCP3040035}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SobreroCUB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ol2a/GrazianoUBO23, author = {Giovanni Graziano and Daniele Ucci and Federica Bisio and Luca Oneto}, editor = {Ana I. Pereira and Armando B. Mendes and Florbela P. Fernandes and Maria F. Pacheco and Jo{\~{a}}o Paulo Coelho and Jos{\'{e}} Lima}, title = {PhishVision: {A} Deep Learning Based Visual Brand Impersonation Detector for Identifying Phishing Attacks}, booktitle = {Optimization, Learning Algorithms and Applications - Third International Conference, {OL2A} 2023, Ponta Delgada, Portugal, September 27-29, 2023, Revised Selected Papers, Part {I}}, series = {Communications in Computer and Information Science}, volume = {1981}, pages = {123--134}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53025-8\_9}, doi = {10.1007/978-3-031-53025-8\_9}, timestamp = {Thu, 08 Feb 2024 12:05:00 +0100}, biburl = {https://dblp.org/rec/conf/ol2a/GrazianoUBO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-12720, author = {Filippo Sobrero and Beatrice Clavarezza and Daniele Ucci and Federica Bisio}, title = {Towards a Near-real-time Protocol Tunneling Detector based on Machine Learning Techniques}, journal = {CoRR}, volume = {abs/2309.12720}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.12720}, doi = {10.48550/ARXIV.2309.12720}, eprinttype = {arXiv}, eprint = {2309.12720}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-12720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/UcciSBZ21, author = {Daniele Ucci and Filippo Sobrero and Federica Bisio and Matteo Zorzino}, title = {Near-real-time Anomaly Detection in Encrypted Traffic using Machine Learning Techniques}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021, Orlando, FL, USA, December 5-7, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SSCI50451.2021.9659955}, doi = {10.1109/SSCI50451.2021.9659955}, timestamp = {Thu, 03 Feb 2022 09:28:31 +0100}, biburl = {https://dblp.org/rec/conf/ssci/UcciSBZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-05625, author = {Nicola Loi and Claudio Borile and Daniele Ucci}, title = {Towards an Automated Pipeline for Detecting and Classifying Malware through Machine Learning}, journal = {CoRR}, volume = {abs/2106.05625}, year = {2021}, url = {https://arxiv.org/abs/2106.05625}, eprinttype = {arXiv}, eprint = {2106.05625}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-05625.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/MassarelliACQUB20, author = {Luca Massarelli and Leonardo Aniello and Claudio Ciccotelli and Leonardo Querzoni and Daniele Ucci and Roberto Baldoni}, title = {AndroDFA: Android Malware Classification Based on Resource Consumption}, journal = {Inf.}, volume = {11}, number = {6}, pages = {326}, year = {2020}, url = {https://doi.org/10.3390/info11060326}, doi = {10.3390/INFO11060326}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/MassarelliACQUB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/UcciPLA20, author = {Daniele Ucci and Roberto Perdisci and Jaewoo Lee and Mustaque Ahamad}, title = {Towards a Practical Differentially Private Collaborative Phone Blacklisting System}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {100--115}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427239}, doi = {10.1145/3427228.3427239}, timestamp = {Tue, 15 Dec 2020 12:22:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/UcciPLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-09287, author = {Daniele Ucci and Roberto Perdisci and Jaewoo Lee and Mustaque Ahamad}, title = {Building a Collaborative Phone Blacklisting System with Local Differential Privacy}, journal = {CoRR}, volume = {abs/2006.09287}, year = {2020}, url = {https://arxiv.org/abs/2006.09287}, eprinttype = {arXiv}, eprint = {2006.09287}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-09287.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/UcciAB19, author = {Daniele Ucci and Leonardo Aniello and Roberto Baldoni}, title = {Survey of machine learning techniques for malware analysis}, journal = {Comput. Secur.}, volume = {81}, pages = {123--147}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.11.001}, doi = {10.1016/J.COSE.2018.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/UcciAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/UcciAB17, author = {Daniele Ucci and Leonardo Aniello and Roberto Baldoni}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {\emph{Share a pie?}: Privacy-Preserving Knowledge Base Export through Count-min Sketches}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {95--106}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029817}, doi = {10.1145/3029806.3029817}, timestamp = {Wed, 16 Sep 2020 11:48:10 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/UcciAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MassarelliACQUB17, author = {Luca Massarelli and Leonardo Aniello and Claudio Ciccotelli and Leonardo Querzoni and Daniele Ucci and Roberto Baldoni}, title = {Android malware family classification based on resource consumption over time}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323954}, doi = {10.1109/MALWARE.2017.8323954}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/MassarelliACQUB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AngeliniALSU17, author = {Marco Angelini and Leonardo Aniello and Simone Lenti and Giuseppe Santucci and Daniele Ucci}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062199}, doi = {10.1109/VIZSEC.2017.8062199}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AngeliniALSU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-00875, author = {Luca Massarelli and Leonardo Aniello and Claudio Ciccotelli and Leonardo Querzoni and Daniele Ucci and Roberto Baldoni}, title = {Android Malware Family Classification Based on Resource Consumption over Time}, journal = {CoRR}, volume = {abs/1709.00875}, year = {2017}, url = {http://arxiv.org/abs/1709.00875}, eprinttype = {arXiv}, eprint = {1709.00875}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-00875.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-08189, author = {Daniele Ucci and Leonardo Aniello and Roberto Baldoni}, title = {Survey on the Usage of Machine Learning Techniques for Malware Analysis}, journal = {CoRR}, volume = {abs/1710.08189}, year = {2017}, url = {http://arxiv.org/abs/1710.08189}, eprinttype = {arXiv}, eprint = {1710.08189}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-08189.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LaurenzaUAB16, author = {Giuseppe Laurenza and Daniele Ucci and Leonardo Aniello and Roberto Baldoni}, title = {An Architecture for Semi-Automatic Collaborative Malware Analysis for CIs}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {137--142}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN-W.2016.40}, doi = {10.1109/DSN-W.2016.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LaurenzaUAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ngmast/ShehuCUAB16, author = {Zigrid Shehu and Claudio Ciccotelli and Daniele Ucci and Leonardo Aniello and Roberto Baldoni}, editor = {Khalid Al{-}Begain}, title = {Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware}, booktitle = {10th International Conference on Next Generation Mobile Applications, Security and Technologies, {NGMAST} 2016, Cardiff, United Kingdom, August 24-26, 2016}, pages = {121--126}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NGMAST.2016.16}, doi = {10.1109/NGMAST.2016.16}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ngmast/ShehuCUAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/BaldoniDMU14, author = {Roberto Baldoni and Fabrizio d'Amore and Massimo Mecella and Daniele Ucci}, title = {A Software Architecture for Progressive Scanning of On-line Communities}, booktitle = {34th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}, pages = {207--212}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCSW.2014.37}, doi = {10.1109/ICDCSW.2014.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/BaldoniDMU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.