Roberto Perdisci
Orcid: 0000-0002-7339-0041
According to our database1,
Roberto Perdisci
authored at least 83 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the ACM on Web Conference 2024, 2024
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
2020
CoRR, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns.
Proceedings of the Internet Measurement Conference, 2019
2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
ACM Trans. Priv. Secur., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015
Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Comput. Networks, 2013
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis.
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Understanding the prevalence and use of alternative plans in malware with network games.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010
Proceedings of the Computer Security, 2010
2009
Comput. Networks, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Pattern Recognit. Lett., 2008
Intrusion detection in computer networks by a modular ensemble of one-class classifiers.
Inf. Fusion, 2008
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2007
2006
Eng. Appl. Artif. Intell., 2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
2005
Proceedings of the Image Analysis and Processing, 2005