Fabio Di Troia

Orcid: 0000-0003-2355-7146

According to our database1, Fabio Di Troia authored at least 55 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A comparison of adversarial malware generators.
J. Comput. Virol. Hacking Tech., November, 2024

Creating valid adversarial examples of malware.
J. Comput. Virol. Hacking Tech., November, 2024

Classification and online clustering of zero-day malware.
J. Comput. Virol. Hacking Tech., November, 2024

An Advanced Malware Detection System Based on NLP to Generate Genetic Markers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

2023
Generative adversarial networks and image-based malware classification.
J. Comput. Virol. Hacking Tech., November, 2023

Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo.
J. Comput. Virol. Hacking Tech., March, 2023

Advancement on Security Applications of Private Intersection Sum Protocol.
CoRR, 2023

Hidden Markov Models with Random Restarts vs Boosting for Malware Detection.
CoRR, 2023

Malware Detection through Contextualized Vector Embeddings.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

Enhancing Malware Detection Using "Genetic Markers" and Machine Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Hidden Markov Models with Momentum.
CoRR, 2022

Robustness of Image-Based Malware Analysis.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

Word Embeddings for Fake Malware Generation.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

Twitter Bots' Detection with Benford's Law and Machine Learning.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

A Blockchain-Based Tamper-Resistant Logging Framework.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

NLP-based User Authentication through Mouse Dynamics.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Profile Hidden Markov Model Malware Detection and API Call Obfuscation.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication.
CoRR, 2021

Clickbait Detection in YouTube Videos.
CoRR, 2021

Sentiment Analysis for Troll Detection on Weibo.
CoRR, 2021

Fake Malware Generation Using HMM and GAN.
Proceedings of the Silicon Valley Cybersecurity Conference - Second Conference, 2021

Malware Classification with Word Embedding Features.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A New Dataset for Smartphone Gesture-based Authentication.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Malware Classification using Long Short-term Memory Models.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Machine learning classification for advanced malware detection.
PhD thesis, 2020

Multifamily malware models.
J. Comput. Virol. Hacking Tech., 2020

Convolutional neural networks for image spam detection.
Inf. Secur. J. A Glob. Perspect., 2020

Detecting malware evolution using support vector machines.
Expert Syst. Appl., 2020

Black box analysis of android malware detectors.
Array, 2020

2019
An analysis of Android adware.
J. Comput. Virol. Hacking Tech., 2019

Hidden Markov models with random restarts versus boosting for malware detection.
J. Comput. Virol. Hacking Tech., 2019

Feature analysis of encrypted malicious traffic.
Expert Syst. Appl., 2019

A Comparative Analysis of Android Malware.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Transfer Learning for Image-based Malware Classification.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Function Call Graphs Versus Machine Learning for Malware Detection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Masquerade Detection on Mobile Devices.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Vigenère scores for malware detection.
J. Comput. Virol. Hacking Tech., 2018

Deep Learning versus Gist Descriptors for Image-based Malware Classification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Autocorrelation Analysis of Financial Botnet Traffic.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Acoustic Gait Analysis using Support Vector Machines.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Robust Hashing for Image-based Malware Classification.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Support Vector Machines for Image Spam Analysis.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

On the Effectiveness of Generic Malware Models.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Hidden Markov Models for Vigenère Cryptanalysis.
Proceedings of the 1st International Conference on Historical Cryptology, 2018

2017
Clustering for malware classification.
J. Comput. Virol. Hacking Tech., 2017

A comparison of static, dynamic, and hybrid analysis for malware detection.
J. Comput. Virol. Hacking Tech., 2017

SocioBot: a Twitter-based botnet.
Int. J. Secur. Networks, 2017

Classic cryptanalysis using hidden Markov models.
Cryptologia, 2017

Static and Dynamic Analysis of Android Malware.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Support vector machines and malware detection.
J. Comput. Virol. Hacking Tech., 2016

Clustering versus SVM for malware detection.
J. Comput. Virol. Hacking Tech., 2016

Advanced transcriptase for JavaScript malware.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Malware Detection Using Dynamic Birthmarks.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Static Analysis of Malicious Java Applets.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016


  Loading...