Francesco Bergadano

Orcid: 0000-0003-2567-336X

According to our database1, Francesco Bergadano authored at least 82 papers between 1986 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Special Issue "AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection".
Algorithms, July, 2023

AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

2022
Generative adversarial networks for subdomain enumeration.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2020
StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications.
J. Syst. Softw., 2020

A modular framework for mobile security analysis.
Inf. Secur. J. A Glob. Perspect., 2020

2019
Learning Real Estate Automated Valuation Models from Heterogeneous Data Sources.
CoRR, 2019

Defacement Detection with Passive Adversaries.
Algorithms, 2019

2017
TeICC: targeted execution of inter-component communications in Android.
Proceedings of the Symposium on Applied Computing, 2017

Defacement response via keyed learning.
Proceedings of the 8th International Conference on Information, 2017

2014
Supporting Collaboration between Customers and Developers: A Framework for Distributed, Agile Software Development.
Int. J. Distributed Syst. Technol., 2014

2013
Communication Setup in Anonymous Messaging (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Communication Setup in Anonymous Messaging.
Proceedings of the Security Protocols XXI, 2013

2011
Privacy-enhanced identity via browser extensions and linking services.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Anti-bot Strategies Based on Human Interactive Proofs.
Proceedings of the Handbook of Information and Communication Security, 2010

2009
A Novel Block-based Watermarking Scheme Using the SVD Transform.
Algorithms, 2009

2008
Learning Automata.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

2007
Secure Logging for Irrefutable Administration.
Int. J. Netw. Secur., 2007

2005
Dealing with packet loss in the Interactive Chained Stream Authentication protocol.
Comput. Secur., 2005

EnFilter: A Password Enforcement and Filter Tool Based on Pattern Recognition Techniques.
Proceedings of the Image Analysis and Processing, 2005

2004
Server-Based Access Verification.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

Lightweight security for Internet polls.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

2003
Identity verification through dynamic keystroke analysis.
Intell. Data Anal., 2003

2002
User authentication through keystroke dynamics.
ACM Trans. Inf. Syst. Secur., 2002

Individual Authentication in Multiparty Communications.
Comput. Secur., 2002

2000
Learning functions represented as multiplicity automata.
J. ACM, 2000

Chained Stream Authentication.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Individual Single Source Authentication on the MBone.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
Java-Based and Secure Learning Agents for Information Retrieval in Distributed Systems.
Inf. Sci., 1999

Issues in Multicast Security.
Proceedings of the Security Protocols, 1999

1998
High Dictionary Compression for Proactive Password Checking.
ACM Trans. Inf. Syst. Secur., 1998

A New Family of Authentication Protocols.
ACM SIGOPS Oper. Syst. Rev., 1998

Secure WWW Transactions Using Standard HTTP and Java Applets.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Third Party Certification of HTTP Service Access Statistics (Position Paper).
Proceedings of the Security Protocols, 1998

Third Party Certification of HTTP Service Access Statistics (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

1997
Security Agents for Information Retrieval in Distributed Systems.
Parallel Comput., 1997

Strong Authentication and Privacy with Standard Browsers.
J. Comput. Secur., 1997

On Learning Programs and Small Depth Circuits.
Proceedings of the Computational Learning Theory, Third European Conference, 1997

Proactive Password Checking with Decision Trees.
Proceedings of the CCS '97, 1997

1996
Testing by Means of Inductive Program Learning.
ACM Trans. Softw. Eng. Methodol., 1996

Learning Behaviors of Automata from Multiplicity and Equivalence Queries.
SIAM J. Comput., 1996

On Learning Branching Programs and Small Depth Circuits
Electron. Colloquium Comput. Complex., 1996

Learning Multivariate Polynomials from Substitution and Equivalence Queries
Electron. Colloquium Comput. Complex., 1996

Learning Sat-<i>k</i>-DNF Formulas from Membership Queries.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

On the Applications of Multiplicity Automata in Learning.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996

Inductive logic programming - from machine learning to software engineering.
MIT Press, ISBN: 978-0-262-02393-1, 1996

1995
Probably approximately correct learning in fuzzy classification systems.
IEEE Trans. Fuzzy Syst., 1995

Learning behaviors of automata from shortest counterexamples.
Proceedings of the Computational Learning Theory, Second European Conference, 1995

1994
Guest Editorial.
Mach. Learn., 1994

Learning relations and logic programs.
Knowl. Eng. Rev., 1994

1993
ENIGMA: A System That Learns Diagnostic Knowledge.
IEEE Trans. Knowl. Data Eng., 1993

Inductive Database Relations.
IEEE Trans. Knowl. Data Eng., 1993

Pattern Recognition and Valiant's Learning Framework.
IEEE Trans. Pattern Anal. Mach. Intell., 1993

Machine Learning and the foundations of inductive inference.
Minds Mach., 1993

The Difficulties of Learning Logic Programs with Cut.
J. Artif. Intell. Res., 1993

Test Case Generation by Means of Learning Techniques.
Proceedings of the First ACM SIGSOFT Symposium on Foundations of Software Engineering, 1993

Inductive Synthesis of Logic Programs and Inductive Logic Programming.
Proceedings of the Logic Program Synthesis and Transformation, 1993

An Interactive System to Learn Functional Logic Programs.
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993

Learning Membership Functions.
Proceedings of the Symbolic and Quantitative Approaches to Reasoning and Uncertainty, 1993

Funtional Inductive Logic Programming with Queries to the User.
Proceedings of the Machine Learning: ECML-93, 1993

Learning Relations: Basing Top-Down Methods on Inverse Resolution.
Proceedings of the Advances in Artificial Intelligence, 1993

Logic Programming by Examples.
Proceedings of the 8th Italian Conference on Logic Programming, 1993

1992
Learning Two-Tiered Descriptions of Flexible Concepts: The POSEIDON System.
Mach. Learn., 1992

Machine Learning and Knowledge Acquisition, Summary of Research Contributions Presented at IJCAI'91.
AI Commun., 1992

1991
The Problem of Induction and Machine Learning.
Proceedings of the 12th International Joint Conference on Artificial Intelligence. Sydney, 1991

Panel: Evaluating and Changing Representation in Concept Acquisition.
Proceedings of the Machine Learning, 1991

Integrated Learning in a Real Domain.
Proceedings of the Knowledge Discovery in Databases, 1991

Machine learning - an integrated framework and its applications.
Ellis Horwood series in artificial intelligence, Ellis Horwood, ISBN: 978-0-13-541749-2, 1991

1990
Mechanical Analysis.
Dataset, May, 1990

Integrated Learning in a real Domain.
Proceedings of the Machine Learning, 1990

Biasing Induction by Using a Domain Theory: An Experimental Evaluation.
Proceedings of the 9th European Conference on Artificial Intelligence, 1990

1989
Knowledge representation and use in pattern analysis.
Inf. Sci., 1989

Concept recognition: An approximate reasoning framework.
Int. J. Intell. Syst., 1989

Deduction in Top-Down Inductive Learning.
Proceedings of the Sixth International Workshop on Machine Learning (ML 1989), 1989

1988
Automated Concept Acquisition in Noisy Environments.
IEEE Trans. Pattern Anal. Mach. Intell., 1988

Representing and Acquiring Imprecise and Context-dependent Concepts in Knowledge-Based Systems.
Proceedings of the Methodologies for Intelligent Systems, 1988

Constructive Learning with Continuous-Valued Attributes.
Proceedings of the Uncertainty and Intelligent Systems, 1988

A Knowledge Intensive Approach to Concept Induction.
Proceedings of the Machine Learning, 1988

Measuring Quality of Concept Descriptions.
Proceedings of the Third European Working Session on Learning, 1988

Concept Acquisition in an Integrated EBL and SBL Environment.
Proceedings of the 8th European Conference on Artificial Intelligence, 1988

1987
A General Framework for Knowledge-Based Pattern Recognition.
Int. J. Pattern Recognit. Artif. Intell., 1987

Integrating EBL and SBL Approaches to Knowledge Base Refinement.
Proceedings of the Methodologies for Intelligent Systems, 1987

1986
A framework for knowledge representation and use in pattern analysis.
Proceedings of the ACM SIGART International Symposium on Methodologies for Intelligent Systems, 1986


  Loading...