Sfoglia per Correlatore MAGGI, FEDERICO
Analisi sperimentale di cluster di malware basati su caratteristiche statiche e dinamiche
2010/2011 CRESSERI, MARCO
AndroCrawl : studying alternative Android marketplaces
2012/2013 SISTO, ALESSANDRO
AndroTotal : a flexible platform for scalable Android antivirus testing
2011/2012 VALDI, ANDREA
Automated collection and analysis of runtime generated strings in a Web browser
2010/2011 FOSSEMO', MANUEL
Banksealer : a transaction monitoring system for Internet banking fraud detection
2012/2013 CARON, ROBERTO
Detecting Android malware campaigns via application similarity analysis
2014/2015 PRETI, LEONARDO
DroidSaGe : an automated Android sandbox generator
2012/2013 LEVER, EROS
Embedded system security: attacks, impacts & defenses
QUARTA, DAVIDE
Evolution of client side web attacks and defences against malicious JavaScript code : a retrospective, systematization study
2012/2013 YIN, ZHINING
Evoluzione del malware per piattaforma Android
2011/2012 PETRACCA, ALESSIO
Extracting common malicious temporal dependent behaviors from malware
2014/2015 MASSETTI, ALESSIO
Finding, characterizing and tracking domain generation algorithms from passive DNS monitoring
2011/2012 SCHIAVONI, STEFANO
FraudBuster : time-based analysis of Internet banking fraud
2014/2015 BAGGIO, ALESSANDRO
Fraudhunter : a supervised fraud detection tool for Internet banking transactions
2015/2016 BIONDANI, ANDREA
Genetic algorithms for optimizing Internet banking fraud detection
2013/2014 VALENTINI, LUCA
Internet banking dataset generator for fraud detection benchmarking
2014/2015 MARIANI, EMANUELE
Jackdaw : automatic behavior extractor and semantic tagger
2012/2013 SCORTI, ANDREA
JavaScript threats : a systematization study
2012/2013 PRIMON, ALESSANDRO
MoKey : exploiting multiple sensors for keylogging from smartphones
2013/2014 BENEFICO, SIMONE
NetQuack : a distributed system for collecting and searching radio signals
2019/2020 Fiorillo, Alessandro
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili