Francesco Mercaldo
Orcid: 0000-0002-9425-1657
According to our database1,
Francesco Mercaldo
authored at least 257 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Comput. Virol. Hacking Tech., June, 2024
Picker Blinder: a framework for automatic injection of malicious inter-app communication.
J. Comput. Virol. Hacking Tech., June, 2024
LA-ViT: A Network With Transformers Constrained by Learned-Parameter-Free Attention for Interpretable Grading in a New Laryngeal Histopathology Image Dataset.
IEEE J. Biomed. Health Informatics, June, 2024
Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection.
Comput., June, 2024
Alzheimer's Disease Evaluation Through Visual Explainability by Means of Convolutional Neural Networks.
Int. J. Neural Syst., February, 2024
EAI Endorsed Trans. Pervasive Health Technol., 2024
MamlFormer: Priori-experience guiding transformer network via manifold adversarial multi-modal learning for laryngeal histopathological grading.
Inf. Fusion, 2024
A Proposal for Privacy-preserving Ransomware Detection by means of Federated Machine Learning.
ERCIM News, 2024
Isolation forest-voting fusion-multioutput: A stroke risk classification method based on the multidimensional output of abnormal sample detection.
Comput. Methods Programs Biomed., 2024
An automatic radiomic-based approach for disease localization: A pilot study on COVID-19.
Comput. Medical Imaging Graph., 2024
On the Adoption of Explainable Deep Learning for Image-Based Network Traffic Classification.
Proceedings of the 14th International Conference on Simulation and Modeling Methodologies, 2024
Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Fifth International Conference on Intelligent Data Science Technologies and Applications, 2024
Proceedings of the 19th International Conference on Software Technologies, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning.
Proceedings of the 26th International Conference on Enterprise Information Systems, 2024
Spiral Drawing Test and Explainable Convolutional Neural Networks for Parkinson's Disease Detection.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024
Evaluating the Impact of Generative Adversarial Network in Android Malware Detection.
Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering, 2024
Security Policy Generation and Verification through Large Language Models: A Proposal.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies, 2024
Formal Methods for Attack Detection in Autonomous Driving Systems: The FORESEEN Project.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2024
2023
Explainable Convolutional Neural Networks for Brain Cancer Detection and Localisation.
Sensors, September, 2023
Diabetic retinopathy detection and diagnosis by means of robust and explainable convolutional neural networks.
Neural Comput. Appl., August, 2023
Interpretable laryngeal tumor grading of histopathological images via depth domain adaptive network with integration gradient CAM and priori experience-guided attention.
Comput. Biol. Medicine, March, 2023
A ViT-AMC Network With Adaptive Model Fusion and Multiobjective Optimization for Interpretable Laryngeal Tumor Grading From Histopathological Images.
IEEE Trans. Medical Imaging, 2023
ACM Trans. Knowl. Discov. Data, 2023
A deep-learning approach to game bot identification via behavioural features analysis in complex massively-cooperative environments.
Int. J. Data Min. Model. Manag., 2023
IEEE Access, 2023
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification.
Proceedings of the ACM Web Conference 2023, 2023
A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Benchmarking YOLO Models for Automatic Reading in Smart Metering Systems: A Performance Comparison Analysis.
Proceedings of the International Conference on Machine Learning and Applications, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
J. Comput. Virol. Hacking Tech., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
FABNet: Fusion Attention Block and Transfer Learning for Laryngeal Cancer Tumor Grading in P63 IHC Histopathology Images.
IEEE J. Biomed. Health Informatics, 2022
Int. J. Decis. Support Syst. Technol., 2022
Smart sensors in vehicular communication networks: Principles, algorithms, systems and applications.
Int. J. Commun. Syst., 2022
Fighting Cybercrime by Introducing Trustworthiness and Interpretability in Deep Learning Malware Detection.
ERCIM News, 2022
Comput. Methods Programs Biomed., 2022
A novel methodology for head and neck carcinoma treatment stage detection by means of model checking.
Artif. Intell. Medicine, 2022
Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Intelligent Decision Technologies, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
On the Resilience of Shallow Machine Learning Classification in Image-based Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Explainable Retinopathy Diagnosis and Localisation by means of Class Activation Mapping.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the Fifteenth International Conference on Machine Vision, 2022
Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Smart Grid monitoring through Deep Learning for Image-based Automatic Dial Meter Reading.
Proceedings of the IEEE International Conference on Big Data, 2022
Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal.
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022
AII, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
J. Comput. Virol. Hacking Tech., 2021
A framework for supporting ransomware detection and prevention based on hybrid analysis.
J. Comput. Virol. Hacking Tech., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Am. Medical Informatics Assoc., 2021
Towards an interpretable deep learning model for mobile malware detection and family identification.
Comput. Secur., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the NLPIR 2021: 5th International Conference on Natural Language Processing and Information Retrieval, Sanya, China, December 17, 2021
Detecting Call Indirection Obfuscation through Equivalence Checking in Android environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Exploiting Supervised Machine Learning for Driver Detection in a Real-World Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
A Method for Automatic Penetration Testing and Mitigation: A <i>Red Hat</i> Approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Colluding Covert Channel for Malicious Information Exfiltration in Android Environment.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
A Framework for Supporting Ransomware Detection and Prevention Based on Hybrid Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
Hide and Seek Game: A Machine Learning Approach for Detecting Malicious Samples in Analysis Environment.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021
SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
J. Comput. Virol. Hacking Tech., 2020
Model checking and machine learning techniques for <i>HummingBad</i> mobile malware detection and mitigation.
Simul. Model. Pract. Theory, 2020
DECAB-LSTM: Deep Contextualized Attentional Bidirectional LSTM for cancer hallmark classification.
Knowl. Based Syst., 2020
D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
J. Inf. Secur. Appl., 2020
Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences.
Inf., 2020
BPM perspectives to support ICSs: Exploiting the integration of formal verifications into investment service provision processes.
Ind. Manag. Data Syst., 2020
Cognitive computing for big data systems over internet of things for enterprise information systems.
Enterp. Inf. Syst., 2020
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020
Model checking for malicious family detection and phylogenetic analysis in mobile environment.
Comput. Secur., 2020
Explainable Deep Learning for Pulmonary Disease and Coronavirus COVID-19 Detection from X-rays.
Comput. Methods Programs Biomed., 2020
An ensemble learning approach for brain cancer detection exploiting radiomic features.
Comput. Methods Programs Biomed., 2020
Comput. Electr. Eng., 2020
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
A Deep-Learning-Based Framework for Supporting Analysis and Detection of Attacks on CAN Buses.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Evaluating Deep Learning Classification Reliability in Android Malware Family Detection.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020
Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques.
Proceedings of the 5th International Conference on Internet of Things, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEEE Trans. Software Eng., 2019
Soft Comput., 2019
Soft Comput., 2019
Multim. Tools Appl., 2019
Int. J. Inf. Sec., 2019
Classification of ransomware families with machine learning based on N-gram of opcodes.
Future Gener. Comput. Syst., 2019
On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019
Prostate Gleason Score Detection and Cancer Treatment Through Real-Time Formal Verification.
IEEE Access, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
A Blockchain Based Proposal for Protecting Healthcare Systems through Formal Methods.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics.
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
A machine-learning framework for supporting intelligent web-phishing detection and analysis.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019
Proceedings of the Intelligent Distributed Computing XIII, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
An Innovative Framework for Supporting Social Network Polluting-content Detection and Analysis.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
A Methodology for Real-Time Data Verification exploiting Deep Learning and Model Checking.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
J. Softw. Evol. Process., 2018
Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments.
J. Reliab. Intell. Environ., 2018
J. Parallel Distributed Comput., 2018
J. Inf. Knowl. Manag., 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Proceedings of the Computer Safety, Reliability, and Security, 2018
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018
Detecting and Analyzing Anomalies Across Historical Data Changes: A Data-Driven Approach.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Phylogenetic Analysis for Ransomware Detection and Classification into Families.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
A Formal Methodology for Notational Analysis and Real-Time Decision Support in Sport Environment.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics, 2017
Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
Android apps and user feedback: a dataset for software evolution and quality improvement.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
Diabetes Mellitus Affected Patients Classification and Diagnosis through Machine Learning Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Proceedings of the Software Technologies - 12th International Joint Conference, 2017
Proceedings of the 12th International Conference on Software Technologies, 2017
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
An HMM and structural entropy based detector for Android malware: An empirical study.
Comput. Secur., 2016
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Product-Focused Software Process Improvement, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Product-Focused Software Process Improvement, 2015
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Inf. Secur. J. A Glob. Perspect., 2014
e Informatica Softw. Eng. J., 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013