Titolo | Pubblicato in | Anno |
---|---|---|
Analysis of DDoS-capable IoT malwares | Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017 | 2017 |
Exploiting digital DNA for the analysis of similarities in twitter behaviours | Proceedings - 2017 International Conference on Data Science and Advanced Analytics, DSAA 2017 | 2017 |
Security flaws in OAuth 2.0 framework: A case study | Computer Safety, Reliability, and Security. SAFECOMP 2017 | 2017 |
SafeDroid: a distributed malware detection service for android | Proceedings - 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications, SOCA 2016 | 2016 |
DNA-inspired online behavioral modeling and its application to spambot detection | IEEE INTELLIGENT SYSTEMS | 2016 |
Mind the tracker you wear - A security analysis of wearable health trackers | Proceedings of the ACM Symposium on Applied Computing | 2016 |
Bioinspired security analysis of wireless protocols | MOBILE NETWORKS AND APPLICATIONS | 2016 |
Experimental measures of news personalization in Google News | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
A matter of words: NLP for quality evaluation of wikipedia medical articles | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
Evaluation of professional cloud password management tools | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
TRAP: Using Targeted ads to unveil Google personal profiles | Proceedings of 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 | 2015 |
Fame for sale: efficient detection of fake Twitter followers | DECISION SUPPORT SYSTEMS | 2015 |
Domain-specific queries and Web search personalization: some investigations | Electronic Proceedings in Theoretical Computer Science, EPTCS | 2015 |
Visual detection of singularities in review platforms | Proceedings of the ACM Symposium on Applied Computing | 2015 |
VISIO: a visual approach for singularity detection in recommendation systems | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 |
Twitlang(er): Interactions modeling language (and Interpreter) for twitter | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 |
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers | INTERNATIONAL JOURNAL OF SECURITY AND NETWORKS | 2015 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma