default search action
Davide Ariu
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Petra Saskia Bayerl, Babak Akhgar, Ernesto La Mattina, Barbara Pirillo, Ioana Cotoi, Davide Ariu, Matteo Mauri, Jorge Garcia, Dimitris Kavallieros, Antonia Kardara, Konstantina Karagiorgou:
Strategies to Counter Artificial Intelligence in Law Enforcement: Cross-Country Comparison of Citizens in Greece, Italy and Spain. CoRR abs/2405.19970 (2024) - [i5]Christian Scano, Giuseppe Floris, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio:
ModSec-Learn: Boosting ModSecurity with Machine Learning. CoRR abs/2406.13547 (2024) - 2023
- [i4]Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio:
Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning. CoRR abs/2308.04964 (2023)
2010 – 2019
- 2018
- [i3]Battista Biggio, Ignazio Pillai, Samuel Rota Bulò, Davide Ariu, Marcello Pelillo, Fabio Roli:
Is Data Clustering in Adversarial Settings Secure? CoRR abs/1811.09982 (2018) - [i2]Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli:
Poisoning Behavioral Malware Clustering. CoRR abs/1811.09985 (2018) - 2017
- [c21]Paolo Piredda, Davide Ariu, Battista Biggio, Igino Corona, Luca Piras, Giorgio Giacinto, Fabio Roli:
Deepsquatting: Learning-Based Typosquatting Detection at Deeper Domain Levels. AI*IA 2017: 347-358 - [c20]Davide Ariu, Enrico Frumento, Giorgio Fumera:
Social Engineering 2.0: A Foundational Work: Invited Paper. Conf. Computing Frontiers 2017: 319-325 - [c19]Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto Corda, Mauro Mereu, Guido Mureddu, Davide Ariu, Fabio Roli:
DeltaPhish: Detecting Phishing Webpages in Compromised Websites. ESORICS (1) 2017: 370-388 - [i1]Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto Corda, Mauro Mereu, Guido Mureddu, Davide Ariu, Fabio Roli:
DeltaPhish: Detecting Phishing Webpages in Compromised Websites. CoRR abs/1707.00317 (2017) - 2016
- [c18]Mansour Ahmadi, Battista Biggio, Steven Arzt, Davide Ariu, Giorgio Giacinto:
Detecting Misuse of Google Cloud Messaging in Android Badware. SPSM@CCS 2016: 103-112 - [c17]Matteo Contini, Igino Corona, Alessio Mulas, Giorgio Giacinto, Davide Ariu:
Pharmaguard WebApp: An Application for the Detection of Illegal Online Pharmacies. KDWeb 2016 - [c16]Matteo Mauri, Alessio Mulas, Davide Ariu:
The Dark Side of Open Data. KDWeb 2016 - 2015
- [j5]Davide Maiorca, Davide Ariu, Igino Corona, Marco Aresu, Giorgio Giacinto:
Stealth attacks: An extended insight into the obfuscation effects on Android malware. Comput. Secur. 51: 16-31 (2015) - [j4]Davide Ariu, Igino Corona, Roberto Tronci, Giorgio Giacinto:
Machine Learning in Security Applications. Trans. Mach. Learn. Data Min. 8(1): 3-39 (2015) - [c15]Jart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski:
2020 Cybercrime Economic Costs: No Measure No Solution. ARES 2015: 701-710 - [c14]Davide Ariu, Luca Didaci, Giorgio Fumera, Enrico Frumento, Federica Freschi, Giorgio Giacinto, Fabio Roli:
Yet Another Cybersecurity Roadmapping Methodology. ARES 2015: 719-726 - [c13]Igino Corona, Matteo Contini, Davide Ariu, Giorgio Giacinto, Fabio Roli, Michael Lund, Giorgio Marinelli:
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies. CYBCONF 2015: 324-329 - [c12]Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files. ICISSP 2015: 27-36 - [c11]Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto:
An Evasion Resilient Approach to the Detection of Malicious PDF Files. ICISSP (Revised Selected Papers) 2015: 68-85 - [c10]Carlos Ruiz, Sinuhe Arroyo, Igor Krsteski, Pablo Dago, J. Sánchez, Luis Pérez-Freire, Alessia De Rosa, Marco Fontani, Andrea Costanzo, Alessandro Piva, Davide Ariu, Luca Piras, Raimundo Ahumada, Martino Jerian:
The maven project: Management and Authenticity Verification of multimedia contents. ICME Workshops 2015: 1-4 - [c9]Marco Aresu, Davide Ariu, Mansour Ahmadi, Davide Maiorca, Giorgio Giacinto:
Clustering android malware families by http traffic. MALWARE 2015: 128-135 - 2014
- [c8]Battista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli:
Poisoning behavioral malware clustering. AISec@CCS 2014: 27-36 - [c7]Igino Corona, Davide Maiorca, Davide Ariu, Giorgio Giacinto:
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References. AISec@CCS 2014: 47-57 - 2013
- [j3]Roberto Perdisci, Davide Ariu, Giorgio Giacinto:
Scalable fine-grained behavioral clustering of HTTP-based malware. Comput. Networks 57(2): 487-500 (2013) - [c6]Battista Biggio, Ignazio Pillai, Samuel Rota Bulò, Davide Ariu, Marcello Pelillo, Fabio Roli:
Is data clustering in adversarial settings secure? AISec 2013: 87-98 - 2011
- [j2]Davide Ariu, Roberto Tronci, Giorgio Giacinto:
HMMPayl: An intrusion detection system based on Hidden Markov Models. Comput. Secur. 30(4): 221-241 (2011) - [c5]Davide Ariu, Giorgio Giacinto, Fabio Roli:
Machine learning in computer forensics (and the lessons learned from machine learning in computer security). AISec 2011: 99-104 - [c4]Davide Ariu, Giorgio Giacinto:
A Modular Architecture for the Analysis of HTTP Payloads Based on Multiple Classifiers. MCS 2011: 330-339 - 2010
- [c3]Davide Ariu, Giorgio Giacinto:
HMMPayl: an application of HMM to the analysis of the HTTP Payload. WAPA 2010: 81-87
2000 – 2009
- 2009
- [j1]Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee:
McPAD: A multiple classifier system for accurate payload-based anomaly detection. Comput. Networks 53(6): 864-881 (2009) - [c2]Igino Corona, Davide Ariu, Giorgio Giacinto:
HMM-Web: A Framework for the Detection of Attacks Against Web Applications. ICC 2009: 1-6 - 2007
- [c1]Davide Ariu, Giorgio Giacinto, Roberto Perdisci:
Sensing Attacks in Computers Networks with Hidden Markov Models. MLDM 2007: 449-463
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint