Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peel the Onion: Recognition of Android Apps Behind the Tor Network., , , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 95-112. Springer, (2019)Malware triage for early identification of Advanced Persistent Threat activities., , and . CoRR, (2018)dAPTaset: A Comprehensive Mapping of APT-Related Data., and . IOSec/MSTEC/FINSEC@ESORICS, volume 11981 of Lecture Notes in Computer Science, page 217-225. Springer, (2019)MalFamAware: automatic family identification and malware classification through online clustering., , , , and . Int. J. Inf. Sec., 20 (3): 371-386 (2021)Malware family identification with BIRCH clustering., , , , and . ICCST, page 1-6. IEEE, (2017)Critical infrastructures security: improving defense against novel malware and Advanced Persistent Threats.. Sapienza University of Rome, Italy, (2020)base-search.net (ftunivromairis:oai:iris.uniroma1.it:11573/1362189).An Architecture for Semi-Automatic Collaborative Malware Analysis for CIs., , , and . DSN Workshops, page 137-142. IEEE Computer Society, (2016)Malware Triage Based on Static Features and Public APT Reports., , , and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 288-305. Springer, (2017)