skip to content
  • it
UNIVERSITÀ DEGLI STUDI
DEL SANNIO   Benevento

Pubblicazioni di ateneo

Found 9 results
Author Titolo Tipo [ Anno(Asc)]
Filters: Author is Fabio Di Troia  [Clear All Filters]
2017
Vobbilisetty, R., F. Di Troia, R. M. Low, C. Aaron Visaggio, and M. Stamp, "Classic cryptanalysis using hidden Markov models", Cryptologia, vol. 41, no. 1, pp. 1–28, 2017.
Pai, S., F. Di Troia, C. Aaron Visaggio, T. H. Austin, and M. Stamp, "Clustering for malware classification", J. Computer Virology and Hacking Techniques, vol. 13, no. 2, pp. 95–107, 2017.
Damodaran, A., F. Di Troia, C. Aaron Visaggio, T. H. Austin, and M. Stamp, "A comparison of static, dynamic, and hybrid analysis for malware detection", J. Computer Virology and Hacking Techniques, vol. 13, no. 1, pp. 1–12, 2017.
Makkar, I. Kaur, F. Di Troia, C. Aaron Visaggio, T. H. Austin, and M. Stamp, "SocioBot: a Twitter-based botnet", {IJSN}, vol. 12, no. 1, pp. 1–12, 2017.
2016
Di Troia, F., C. Aaron Visaggio, T. H. Austin, and M. Stamp, "Advanced transcriptase for JavaScript malware", 11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016, pp. 121–128, 2016.
Narra, U., F. Di Troia, C. Aaron Visaggio, T. H. Austin, and M. Stamp, "Clustering versus SVM for malware detection", J. Computer Virology and Hacking Techniques, vol. 12, no. 4, pp. 213–224, 2016.
Vemparala, S., F. Di Troia, C. Aaron Visaggio, T. H. Austin, and M. Stamp, "Malware Detection Using Dynamic Birthmarks", Proceedings of the 2016 {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March 11, 2016, pp. 41–46, 2016.
Ganesh, N., F. Di Troia, C. Aaron Visaggio, T. H. Austin, and M. Stamp, "Static Analysis of Malicious Java Applets", Proceedings of the 2016 {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March 11, 2016, pp. 58–63, 2016.
Singh, T., F. Di Troia, C. Aaron Visaggio, T. H. Austin, and M. Stamp, "Support vector machines and malware detection", J. Computer Virology and Hacking Techniques, vol. 12, no. 4, pp. 203–212, 2016.