André Ricardo Abed Grégio
Orcid: 0000-0003-1766-5757Affiliations:
- Federal University of Paraná, PR, Brazil
According to our database1,
André Ricardo Abed Grégio
authored at least 59 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ANDROIDGYNY: Reviewing Clustering Techniques for Android Malware Family Classification.
DTRAP, 2024
2023
Expert Syst. Appl., 2023
People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023
Proceedings of the International Conference on Machine Learning and Applications, 2023
2022
IEEE Trans. Neural Networks Learn. Syst., 2022
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints.
ACM Trans. Priv. Secur., 2022
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022
Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles.
IEEE Trans. Biom. Behav. Identity Sci., 2022
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection.
Expert Syst. Appl., 2022
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
2021
ACM Trans. Priv. Secur., 2021
Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios.
Digit. Investig., 2021
Malware MultiVerse: From Automatic Logic Bomb Identification to Automatic Patching and Tracing.
CoRR, 2021
A [in]Segurança dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas.
CoRR, 2021
CoRR, 2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
2020
J. Comput. Virol. Hacking Tech., 2020
The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support.
J. Comput. Virol. Hacking Tech., 2020
Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak.
CoRR, 2020
Concurr. Comput. Pract. Exp., 2020
Comput. Secur., 2020
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020
Proceedings of the MEMSYS 2020: The International Symposium on Memory Systems, 2020
A Systematic Literature Mapping of Artificial Intelligence Planning in Software Testing.
Proceedings of the 15th International Conference on Software Technologies, 2020
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
2019
"VANILLA" malware: vanishing antiviruses by interleaving layers and layers of attacks.
J. Comput. Virol. Hacking Tech., 2019
Proceedings of the 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2019
WebMBO: Uma Ontologia para Comportamento de Malware Web(WebMBO: an Ontology of Web Malware Behavior).
Proceedings of the XII Seminar on Ontology Research in Brazil and III Doctoral and Masters Consortium on Ontologies, 2019
L(a)ying in (Test)Bed - How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification.
Proceedings of the Information Security - 22nd International Conference, 2019
The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
J. Comput. Virol. Hacking Tech., 2018
Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging.
ACM Trans. Priv. Secur., 2018
IEEE Secur. Priv., 2018
Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms.
ACM Comput. Surv., 2018
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems.
Comput. Secur., 2018
Proceedings of the Information Security - 21st International Conference, 2018
2017
Enhancing the Creation of Detection Rules for Malicious Software through Ontologies and Crowdsourcing.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
2016
2015
J. Comput. Virol. Hacking Tech., 2015
2014
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014
2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
2012
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012
Pinpointing Malicious Activities through Network and System-Level Malware Execution Behavior.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
2009
Malware distributed collection and pre-classification system using honeypot technology.
Proceedings of the Data Mining, 2009
2007
Evaluation of data mining techniques for suspicious network activity classification using honeypots data.
Proceedings of the Data Mining, 2007