Visual-similarity-based phishing detection E Medvet, E Kirda, C Kruegel Proceedings of the 4th international conference on Security and privacy in …, 2008 | 259 | 2008 |
Detecting android malware using sequences of system calls G Canfora, E Medvet, F Mercaldo, CA Visaggio Proceedings of the 3rd international workshop on software development …, 2015 | 174 | 2015 |
Effectiveness of opcode ngrams for detection of multi family android malware G Canfora, A De Lorenzo, E Medvet, F Mercaldo, CA Visaggio 2015 10th international conference on availability, reliability and security …, 2015 | 147 | 2015 |
Inference of Regular Expressions for Text Extraction from Examples A Bartoli, A De Lorenzo, E Medvet, F Tarlao Knowledge and Data Engineering, IEEE Transactions on 28 (5), 1217-1230, 2016 | 135 | 2016 |
Crossing the reality gap: A survey on sim-to-real transferability of robot controllers in reinforcement learning E Salvato, G Fenu, E Medvet, FA Pellegrino IEEE Access 9, 153171-153187, 2021 | 118 | 2021 |
Publication venue recommendation based on paper abstract E Medvet, A Bartoli, G Piccinin 2014 IEEE 26th international conference on tools with artificial …, 2014 | 82 | 2014 |
Automatic synthesis of regular expressions from examples A Bartoli, G Davanzo, A De Lorenzo, E Medvet, E Sorio Computer 47 (12), 72-80, 2014 | 80 | 2014 |
Automatic generation of regular expressions from examples with genetic programming A Bartoli, G Davanzo, A De Lorenzo, M Mauri, E Medvet, E Sorio Proceedings of the 14th annual conference companion on Genetic and …, 2012 | 71 | 2012 |
Visualizing the outcome of dynamic analysis of Android malware with VizMal A De Lorenzo, F Martinelli, E Medvet, F Mercaldo, A Santone Journal of Information Security and Applications 50, 102423, 2020 | 65 | 2020 |
Evolutionary inference of attribute-based access control policies E Medvet, A Bartoli, B Carminati, E Ferrari Evolutionary Multi-Criterion Optimization: 8th International Conference, EMO …, 2015 | 65 | 2015 |
Anomaly detection techniques for a web defacement monitoring service G Davanzo, E Medvet, A Bartoli Expert Systems with Applications 38 (10), 12521-12530, 2011 | 63 | 2011 |
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis. A Bacci, A Bartoli, F Martinelli, E Medvet, F Mercaldo, CA Visaggio ICISSP, 379-385, 2018 | 61 | 2018 |
A probabilistic approach to printed document understanding E Medvet, A Bartoli, G Davanzo International Journal on Document Analysis and Recognition (IJDAR) 14, 335-347, 2011 | 61 | 2011 |
Acquiring and analyzing app metrics for effective mobile malware detection G Canfora, E Medvet, F Mercaldo, CA Visaggio Proceedings of the 2016 ACM on International Workshop on Security And …, 2016 | 59 | 2016 |
Spotting the malicious moment: Characterizing malware behavior using dynamic features A Ferrante, E Medvet, F Mercaldo, J Milosevic, CA Visaggio 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 49 | 2016 |
Evil twins and WPA2 Enterprise: A coming security disaster? A Bartoli, E Medvet, F Onesti computers & security 74, 1-11, 2018 | 47 | 2018 |
Active learning of regular expressions for entity extraction A Bartoli, A De Lorenzo, E Medvet, F Tarlao IEEE transactions on cybernetics 48 (3), 1067-1080, 2017 | 46 | 2017 |
Biodiversity in evolved voxel-based soft robots E Medvet, A Bartoli, F Pigozzi, M Rochelli Proceedings of the Genetic and Evolutionary Computation Conference, 129-137, 2021 | 44 | 2021 |
Your paper has been accepted, rejected, or whatever: Automatic generation of scientific paper reviews A Bartoli, A De Lorenzo, E Medvet, F Tarlao Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016 | 42 | 2016 |
2D-VSR-Sim: A simulation tool for the optimization of 2-D voxel-based soft robots E Medvet, A Bartoli, A De Lorenzo, S Seriani SoftwareX 12, 100573, 2020 | 38 | 2020 |