Merged MSG and EPS land surface albedo products in the frame of the LSA SAF project: Method and validation over Europe.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
Proceedings of the 24th USENIX Security Symposium, 2015
Attack Volume Model: Geometrical Approach and Application.
Proceedings of the Risks and Security of Internet and Systems, 2015
RORI-based countermeasure selection using the OrBAC formalism.
Int. J. Inf. Sec., 2014
PUBCRAWL: Protecting Users and Businesses from CRAWLers.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation.
Proceedings of the Computer Network Security, 2012
Individual Countermeasure Selection Based on the Return On Response Investment Index.
Proceedings of the Computer Network Security, 2012
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
JACKSTRAWS: Picking Command and Control Connections from Bot Traffic.
Proceedings of the 20th USENIX Security Symposium, 2011
FORECAST: skimming off the malware cream.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Formalization of Viruses and Malware Through Process Algebras.
Proceedings of the ARES 2010, 2010
Functional polymorphic engines: formalisation, implementation and use cases.
J. Comput. Virol., 2009
Formalization of malware through process calculi
CoRR, 2009
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
CoRR, 2009
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Malware as interaction machines: a new framework for behavior modelling.
J. Comput. Virol., 2008
Behavioral detection of malware: from a survey towards an established taxonomy.
J. Comput. Virol., 2008
Evaluation methodology and theoretical model for antiviral behavioural detection strategies.
J. Comput. Virol., 2007