Davide Ariu
Davide Ariu
CEO & Co-Founder of Pluribus One, Research Assistant @ University of Cagliari
Verified email at - Homepage
Cited by
Cited by
McPAD: A multiple classifier system for accurate payload-based anomaly detection
R Perdisci, D Ariu, P Fogla, G Giacinto, W Lee
Computer networks 53 (6), 864-881, 2009
Stealth attacks: An extended insight into the obfuscation effects on android malware
D Maiorca, D Ariu, I Corona, M Aresu, G Giacinto
Computers & Security 51, 16-31, 2015
Poisoning behavioral malware clustering
B Biggio, K Rieck, D Ariu, C Wressnegger, I Corona, G Giacinto, F Roli
Proceedings of the 2014 workshop on artificial intelligent and security†…, 2014
HMMPayl: An intrusion detection system based on Hidden Markov Models
D Ariu, R Tronci, G Giacinto
computers & security 30 (4), 221-241, 2011
Is data clustering in adversarial settings secure?
B Biggio, I Pillai, S Rota BulÚ, D Ariu, M Pelillo, F Roli
Proceedings of the 2013 ACM workshop on Artificial intelligence and security†…, 2013
Scalable fine-grained behavioral clustering of http-based malware
R Perdisci, D Ariu, G Giacinto
Computer Networks 57 (2), 487-500, 2013
Lux0r: Detection of malicious pdf-embedded javascript code through discriminant analysis of api references
I Corona, D Maiorca, D Ariu, G Giacinto
Proceedings of the 2014 workshop on artificial intelligent and security†…, 2014
Deltaphish: Detecting phishing webpages in compromised websites
I Corona, B Biggio, M Contini, L Piras, R Corda, M Mereu, G Mureddu, ...
Computer Security–ESORICS 2017: 22nd European Symposium on Research in†…, 2017
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files
D Maiorca, D Ariu, I Corona, G Giacinto
Proceedings of the 1st International Conference on Information Systems†…, 2015
Hmm-web: A framework for the detection of attacks against web applications
I Corona, D Ariu, G Giacinto
2009 IEEE International Conference on Communications, 1-6, 2009
Clustering android malware families by http traffic
M Aresu, D Ariu, M Ahmadi, D Maiorca, G Giacinto
10th International Conference on Malicious and Unwanted Software (MALWARE), 2015
2020 cybercrime economic costs: No measure no solution
J Armin, B Thompson, D Ariu, G Giacinto, F Roli, P Kijewski
2015 10th International Conference on Availability, Reliability and Security†…, 2015
Sensing attacks in computers networks with Hidden Markov Models
D Ariu, G Giacinto, R Perdisci
Machine Learning and Data Mining in Pattern Recognition: 5th International†…, 2007
Social engineering 2.0: A foundational work
D Ariu, E Frumento, G Fumera
Proceedings of the computing frontiers conference, 319-325, 2017
Machine learning in computer forensics (and the lessons learned from machine learning in computer security)
D Ariu, G Giacinto, F Roli
Proceedings of the 4th ACM workshop on Security and artificial intelligence†…, 2011
Detecting misuse of google cloud messaging in android badware
M Ahmadi, B Biggio, S Arzt, D Ariu, G Giacinto
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and†…, 2016
Deepsquatting: Learning-based typosquatting detection at deeper domain levels
P Piredda, D Ariu, B Biggio, I Corona, L Piras, G Giacinto, F Roli
AI* IA 2017 Advances in Artificial Intelligence: XVIth International†…, 2017
HMMPayl: an application of HMM to the analysis of the HTTP Payload
D Ariu, G Giacinto
Proceedings of the First Workshop on Applications of Pattern Analysis, 81-87, 2010
The role of social engineering in evolution of attacks
E Frumento, R Puricelli, F Freschi, D Ariu, N Weiss, C Dambra, I Cotoi, ...
Eoropean Commission, 2016
Security of the Digital Natives
D Ariu, F Bosco, V Ferraris, P Perri, G Spolti, P Stirparo, G Vaciago, ..., 2014
The system can't perform the operation now. Try again later.
Articles 1–20