Nome |
# |
An Experimental Security Analysis of an Industrial Robot Controller, file e0c31c0c-0c48-4599-e053-1705fe0aef77
|
1.819
|
BankSealer: A decision support system for online banking fraud analysis and investigation, file e0c31c0c-2269-4599-e053-1705fe0aef77
|
1.744
|
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets, file e0c31c0c-5a7f-4599-e053-1705fe0aef77
|
1.704
|
Computer Virus Propagation Models, file e0c31c10-4ba3-4599-e053-1705fe0aef77
|
1.286
|
A Natural Language Processing Approach for Financial Fraud Detection, file 74744273-308b-42c7-b888-cb36e891786b
|
964
|
ShieldFS: a self-healing, ransomware-aware filesystem, file e0c31c0c-16af-4599-e053-1705fe0aef77
|
893
|
Security of controlled manufacturing systems in the connected factory: the case of industrial robots, file e0c31c0c-ed5a-4599-e053-1705fe0aef77
|
874
|
Unsupervised Learning Techniques for an Intrusion Detection System, file e0c31c10-36cc-4599-e053-1705fe0aef77
|
804
|
Security Evaluation of a Banking Fraud Analysis System, file e0c31c0c-827c-4599-e053-1705fe0aef77
|
783
|
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds, file e0c31c0f-357b-4599-e053-1705fe0aef77
|
720
|
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network, file e0c31c0d-fcee-4599-e053-1705fe0aef77
|
719
|
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network, file e0c31c10-1bbb-4599-e053-1705fe0aef77
|
704
|
Measuring and Defeating Anti-Instrumentation-Equipped Malware, file e0c31c0b-c2cb-4599-e053-1705fe0aef77
|
670
|
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks, file e0c31c0f-d10a-4599-e053-1705fe0aef77
|
636
|
Prometheus: Analyzing WebInject-based information stealers, file e0c31c0c-2cbd-4599-e053-1705fe0aef77
|
559
|
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities, file e0c31c0b-4e60-4599-e053-1705fe0aef77
|
520
|
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots, file e0c31c0e-09f1-4599-e053-1705fe0aef77
|
504
|
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware, file e0c31c12-2823-4599-e053-1705fe0aef77
|
473
|
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation, file e0c31c0c-0fc3-4599-e053-1705fe0aef77
|
460
|
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis, file e0c31c0e-f4b1-4599-e053-1705fe0aef77
|
454
|
A methodology for the repeatable forensic analysis of encrypted drives, file e0c31c10-4ba5-4599-e053-1705fe0aef77
|
439
|
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System, file e0c31c0c-2cba-4599-e053-1705fe0aef77
|
438
|
GreatEatlon: Fast, Static Detection of Mobile Ransomware, file e0c31c0b-c257-4599-e053-1705fe0aef77
|
424
|
Quantum matching pursuit: A quantum algorithm for sparse representations, file e0c31c12-6496-4599-e053-1705fe0aef77
|
410
|
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries, file e0c31c0c-09fb-4599-e053-1705fe0aef77
|
388
|
Black-box forensic and antiforensic characteristics of solid-state drives, file e0c31c0e-f72c-4599-e053-1705fe0aef77
|
353
|
Studying Bluetooth Malware Propagation: the BlueBag Project, file e0c31c0f-d10c-4599-e053-1705fe0aef77
|
308
|
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems, file e0c31c11-edfd-4599-e053-1705fe0aef77
|
300
|
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems, file e0c31c0c-d116-4599-e053-1705fe0aef77
|
297
|
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation, file ea250d5c-7b64-470b-82fc-37d470b2df50
|
286
|
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation, file e0c31c10-a6d6-4599-e053-1705fe0aef77
|
285
|
Amaretto: An Active Learning Framework for Money Laundering Detection, file e0c31c12-a998-4599-e053-1705fe0aef77
|
253
|
Up Close and Personal: Cybersecurity in Medical IoT Devices, file e0c31c0a-39e3-4599-e053-1705fe0aef77
|
235
|
On-chip system call tracing: A feasibility study and open prototype, file e0c31c0b-ffc9-4599-e053-1705fe0aef77
|
221
|
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS, file a91b6073-455e-49c1-ab66-9c7785bca934
|
220
|
SysTaint: Assisting Reversing of Malicious Network Communications, file e0c31c0c-f9c6-4599-e053-1705fe0aef77
|
211
|
BitIodine: Extracting Intelligence from the Bitcoin Network, file e0c31c08-274f-4599-e053-1705fe0aef77
|
208
|
Behavioral Intrusion Detection, file e0c31c10-4b9c-4599-e053-1705fe0aef77
|
194
|
BankSealer: An Online Banking Fraud Analysis and Decision Support System, file e0c31c0c-2266-4599-e053-1705fe0aef77
|
182
|
Seeing the Invisible - Forensic Uses of Anomaly Detection and Machine Learning, file e0c31c0f-fdda-4599-e053-1705fe0aef77
|
181
|
Open Problems in Computer Virology, file e0c31c10-4a0b-4599-e053-1705fe0aef77
|
181
|
Scalable Testing of Mobile Antivirus Applications, file e0c31c0f-d6d1-4599-e053-1705fe0aef77
|
177
|
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication, file e0c31c08-274d-4599-e053-1705fe0aef77
|
171
|
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth, file e0c31c08-0e37-4599-e053-1705fe0aef77
|
166
|
Lessons Learned from the Italian Law on Privacy - Part I, file e0c31c0f-d6ca-4599-e053-1705fe0aef77
|
161
|
Security and Trust in the Italian Legal Digital Signature Framework, file e0c31c10-36c3-4599-e053-1705fe0aef77
|
159
|
ReCAN – Dataset for reverse engineering of Controller Area Networks, file e0c31c0e-f652-4599-e053-1705fe0aef77
|
154
|
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems, file e0c31c0d-ec22-4599-e053-1705fe0aef77
|
149
|
Wireless Malware Propagation: A Reality Check, file e0c31c0f-d6cc-4599-e053-1705fe0aef77
|
142
|
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN, file 5021e17e-2fc7-4ad4-ba62-4f5a91af3102
|
135
|
Trellis: Privilege Separation for Multi-user Applications Made Easy, file e0c31c10-cb36-4599-e053-1705fe0aef77
|
133
|
BINO: Automatic Recognition of Inline Binary Functions from Template Classes, file b3685a1e-b3fe-4d49-aff3-26bcbf965b7d
|
123
|
Detecting Intrusions through System Call Sequence and Argument Analysis, file e0c31c0f-f133-4599-e053-1705fe0aef77
|
123
|
Performance Issues in Video Streaming Environments, file e0c31c10-4c91-4599-e053-1705fe0aef77
|
117
|
Apícula: Static Detection of API Calls in Generic Streams of Bytes, file e0c31c12-eb8c-4599-e053-1705fe0aef77
|
103
|
Analyzing TCP Traffic Patterns using Self Organizing Maps., file e0c31c10-36c7-4599-e053-1705fe0aef77
|
100
|
On the use of different statistical tests for alert correlation - Short Paper, file e0c31c10-4a0c-4599-e053-1705fe0aef77
|
97
|
GIVS: Integrity Validation for Grid Security, file e0c31c10-36c4-4599-e053-1705fe0aef77
|
93
|
Coming of Age, file 2f805530-f562-4f12-81e9-ab7889bf1571
|
87
|
Optimal Number of Nodes for Computations in Grid Enviroments, file e0c31c10-36c5-4599-e053-1705fe0aef77
|
81
|
GIVS: Integrity Validation for Grid Security, file e0c31c0f-d6c8-4599-e053-1705fe0aef77
|
71
|
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation, file e0c31c0f-c587-4599-e053-1705fe0aef77
|
70
|
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks, file 84de863d-40c4-42d6-9ec0-f7244b28ba2b
|
67
|
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis, file a8001fd2-e186-4baf-8e10-3fe0b5f480e9
|
65
|
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks, file a9eb3ac8-98aa-438e-9872-f6a488226632
|
57
|
Evasion Attacks against Banking Fraud Detection Systems, file e0c31c0f-c7ba-4599-e053-1705fe0aef77
|
57
|
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services, file e0c31c10-1c0d-4599-e053-1705fe0aef77
|
57
|
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning, file e0c31c11-860e-4599-e053-1705fe0aef77
|
48
|
Poster: Detecting WebInjects through Live Memory Inspection, file e0c31c0b-25c4-4599-e053-1705fe0aef77
|
45
|
Context-Based File Block Classification, file e0c31c11-9352-4599-e053-1705fe0aef77
|
42
|
Task Aware Intrusion Detection for Industrial Robots, file 74974e42-4b06-41e9-9ac7-6a6422e04725
|
39
|
Quantum algorithms for SVD-based data representation and analysis, file 80af633e-f993-48b7-ad5e-1d1c10ccb289
|
39
|
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks, file 32cf1bd0-8995-4819-b57e-98bd3c33067d
|
34
|
HACK: a Holistic modeling Approach for Cubesat cyberattacKs, file 62491ff4-e223-4cb3-8495-d22d50ad35b0
|
26
|
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment, file a2b4da96-7e82-4d30-b414-02bd4c1f39ca
|
23
|
A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids, file d24b4f97-8fa8-43bc-a6e7-b4aff41eb259
|
18
|
Improving Self Organizing Map Performance for Network Intrusion Detection., file e0c31c10-4c8e-4599-e053-1705fe0aef77
|
18
|
Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection, file 85966e19-6da9-4236-a6a7-aae3d39322b6
|
16
|
Remote monitoring of cardiac implanted electronic devices: legal requirements and ethical principles - ESC Regulatory Affairs Committee/EHRA joint task force report, file e0c31c0f-cf21-4599-e053-1705fe0aef77
|
14
|
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of “Crypto Wars” in Security Research, file e0c31c0f-2b55-4599-e053-1705fe0aef77
|
13
|
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems, file 384e4fad-cad3-4d56-9695-fa5a0d100cfa
|
7
|
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies, file 1984f11d-50c0-4cf3-a264-1c5b8dc6760c
|
5
|
Quantum matching pursuit: A quantum algorithm for sparse representations, file 2d9952de-8bbb-497b-a178-a53488cd0e09
|
2
|
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors, file 62f62629-a578-496d-a44d-733cb28600e6
|
2
|
Advancing Fraud Detection Systems through Online Learning, file c257320c-89ae-4d43-ae48-ced821ba0603
|
2
|
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners, file e0c31c0f-fdd6-4599-e053-1705fe0aef77
|
2
|
Detecting Intrusions through System Call Sequence and Argument Analysis, file e0c31c07-e829-4599-e053-1705fe0aef77
|
1
|
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation, file e0c31c08-3830-4599-e053-1705fe0aef77
|
1
|
Totale |
26.616 |