Bitiodine: Extracting intelligence from the bitcoin network M Spagnuolo, F Maggi, S Zanero Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 442 | 2014 |
Unsupervised learning techniques for an intrusion detection system S Zanero, SM Savaresi Proceedings of the 2004 ACM symposium on Applied computing, 412-419, 2004 | 383 | 2004 |
Shieldfs: a self-healing, ransomware-aware filesystem A Continella, A Guagnelli, G Zingaro, G De Pasquale, A Barenghi, ... Proceedings of the 32nd annual conference on computer security applications …, 2016 | 353 | 2016 |
HelDroid: Dissecting and Detecting Mobile Ransomware N Andronio, S Zanero, F Maggi Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015 | 304 | 2015 |
Phoenix: DGA-based botnet tracking and intelligence S Schiavoni, F Maggi, L Cavallaro, S Zanero International Conference on detection of intrusions and malware, and …, 2014 | 298 | 2014 |
Computer virus propagation models G Serazzi, S Zanero International Workshop on Modeling, Analysis, and Simulation of Computer and …, 2003 | 213 | 2003 |
An Experimental Security Analysis of an Industrial Robot Controller D Quarta, M Pogliani, M Polino, F Maggi, AM Zanchettin, S Zanero IEEE Symposium on Security and Privacy (Oakland) 2017, 2017 | 211 | 2017 |
Detecting intrusions through system call sequence and argument analysis F Maggi, M Matteucci, S Zanero IEEE Transactions on Dependable and Secure Computing 7 (4), 381-395, 2008 | 209 | 2008 |
A stealth, selective, link-layer denial-of-service attack against automotive networks A Palanca, E Evenchick, F Maggi, S Zanero Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017 | 162 | 2017 |
Identifying dormant functionality in malware programs PM Comparetti, G Salvaneschi, E Kirda, C Kolbitsch, C Kruegel, S Zanero 2010 IEEE Symposium on Security and Privacy, 61-76, 2010 | 157 | 2010 |
Cyber-physical systems S Zanero Computer 50 (4), 14-16, 2017 | 139 | 2017 |
BankSealer: A decision support system for online banking fraud analysis and investigation M Carminati, R Caron, F Maggi, I Epifani, S Zanero computers & security 53, 175-186, 2015 | 120 | 2015 |
Studying Bluetooth Malware Propagation: The BlueBag Project L Carettoni, C Merloni, S Zanero IEEE Security & Privacy 5 (2), 17-25, 2007 | 105 | 2007 |
A fast eavesdropping attack against touchscreens F Maggi, A Volpatto, S Gasparini, G Boracchi, S Zanero 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 103 | 2011 |
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network S Longari, DHN Valcarcel, M Zago, M Carminati, S Zanero IEEE Transactions on Network and Service Management 18 (2), 1913-1924, 2021 | 97 | 2021 |
AndRadar: fast discovery of android applications in alternative markets M Lindorfer, S Volanis, A Sisto, M Neugschwandtner, E Athanasopoulos, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 96 | 2014 |
Lines of malicious code: Insights into the malicious software industry M Lindorfer, A Di Federico, F Maggi, PM Comparetti, S Zanero Proceedings of the 28th annual computer security applications conference …, 2012 | 92 | 2012 |
Two years of short urls internet measurement: security threats and countermeasures F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ... proceedings of the 22nd international conference on World Wide Web, 861-872, 2013 | 89 | 2013 |
Constrained concealment attacks against reconstruction-based anomaly detectors in industrial control systems A Erba, R Taormina, S Galelli, M Pogliani, M Carminati, S Zanero, ... Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 81* | 2020 |
Stranger danger: exploring the ecosystem of ad-based url shortening services N Nikiforakis, F Maggi, G Stringhini, MZ Rafique, W Joosen, C Kruegel, ... Proceedings of the 23rd international conference on World wide web, 51-62, 2014 | 80 | 2014 |