Francesco Mercaldo

Orcid: 0000-0002-9425-1657

According to our database1, Francesco Mercaldo authored at least 240 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Explainable Ransomware Detection with Deep Learning Techniques.
J. Comput. Virol. Hacking Tech., June, 2024

Picker Blinder: a framework for automatic injection of malicious inter-app communication.
J. Comput. Virol. Hacking Tech., June, 2024

Alzheimer's Disease Evaluation Through Visual Explainability by Means of Convolutional Neural Networks.
Int. J. Neural Syst., February, 2024

Cybersecurity-Related Tweet Classification by Explainable Deep Learning.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Spiral Drawing Test and Explainable Convolutional Neural Networks for Parkinson's Disease Detection.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

Detecting Retinal Fundus Image Synthesis by Means of Generative Adversarial Network.
Proceedings of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies, 2024

2023
Explainable Convolutional Neural Networks for Brain Cancer Detection and Localisation.
Sensors, September, 2023

Diabetic retinopathy detection and diagnosis by means of robust and explainable convolutional neural networks.
Neural Comput. Appl., August, 2023

Interpretable laryngeal tumor grading of histopathological images via depth domain adaptive network with integration gradient CAM and priori experience-guided attention.
Comput. Biol. Medicine, March, 2023

A ViT-AMC Network With Adaptive Model Fusion and Multiobjective Optimization for Interpretable Laryngeal Tumor Grading From Histopathological Images.
IEEE Trans. Medical Imaging, 2023

A Novel Classification Technique based on Formal Methods.
ACM Trans. Knowl. Discov. Data, 2023

Water Meter Reading for Smart Grid Monitoring.
Sensors, 2023

A deep-learning approach to game bot identification via behavioural features analysis in complex massively-cooperative environments.
Int. J. Data Min. Model. Manag., 2023

TriAD: A Deep Ensemble Network for Alzheimer Classification and Localization.
IEEE Access, 2023

TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification.
Proceedings of the ACM Web Conference 2023, 2023

A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

A Machine Learning approach to classify ventilatory efficiency.
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023

Explainable Deep Learning for Brain Cancer Detection and Localisation.
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023

Object Detection and Localisation in Thermal Images by means of UAV/Drone.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Damage Detection and Localisation using UAV/ Drone with Object Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Explainable Deep Learning for Face Mask Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Exploring Quantum Machine Learning for Explainable Malware Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Benchmarking YOLO Models for Automatic Reading in Smart Metering Systems: A Performance Comparison Analysis.
Proceedings of the International Conference on Machine Learning and Applications, 2023

An Explainable Convolutional Neural Network for Dynamic Android Malware Detection.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

A Fuzzy Deep Learning Network for Dynamic Mobile Malware Detection.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

Image-Based Malware Detection Through a Deep Neuro-Fuzzy Model.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

Evaluating Fuzzy Machine Learning for Smart Grid Instability Detection.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023

A Driver Detection Method by Means of Explainable Deep Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Computational cost of CT Radiomics workflow: a case study on COVID-19.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Data Poisoning Attacks over Diabetic Retinopathy Images Classification.
Proceedings of the IEEE International Conference on Big Data, 2023

A Proposal for Trustworthy Artificial Intelligence.
Proceedings of the IEEE International Conference on Big Data, 2023

Explainable Deep Learning for Smart Grid Stability Detection.
Proceedings of the IEEE International Conference on Big Data, 2023

Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
2Faces: a new model of malware based on dynamic compiling and reflection.
J. Comput. Virol. Hacking Tech., 2022

Formal Equivalence Checking for Mobile Malware Detection and Family Classification.
IEEE Trans. Software Eng., 2022

Driver Identification Through Formal Methods.
IEEE Trans. Intell. Transp. Syst., 2022

FABNet: Fusion Attention Block and Transfer Learning for Laryngeal Cancer Tumor Grading in P63 IHC Histopathology Images.
IEEE J. Biomed. Health Informatics, 2022

Machine Learning on Soccer Player Positions.
Int. J. Decis. Support Syst. Technol., 2022

Smart sensors in vehicular communication networks: Principles, algorithms, systems and applications.
Int. J. Commun. Syst., 2022

Fighting Cybercrime by Introducing Trustworthiness and Interpretability in Deep Learning Malware Detection.
ERCIM News, 2022

Explainability of radiomics through formal methods.
Comput. Methods Programs Biomed., 2022

A novel methodology for head and neck carcinoma treatment stage detection by means of model checking.
Artif. Intell. Medicine, 2022

Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Timed Automata Networks for SCADA Attacks Real-Time Mitigation.
Proceedings of the Intelligent Decision Technologies, 2022

A Method for Intrusion Detection in Smart Grid.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Drone Audio recognition based on Machine Learning Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

High Grade Brain Cancer Segmentation by means of Deep Learning.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

A Model Checking-based Approach to Malicious Family Detection in iOS Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

On the Resilience of Shallow Machine Learning Classification in Image-based Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Explainable Retinopathy Diagnosis and Localisation by means of Class Activation Mapping.
Proceedings of the International Joint Conference on Neural Networks, 2022

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

COVID-19 Detection from Cough Recording by means of Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

On the Influence of Image Settings in Deep Learning-based Malware Detection.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Designing Robust Deep Learning Classifiers for Image-based Malware Analysis.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Explainable Deep Learning Methodologies for Biomedical Images Classification.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Automatic Gleason Score Diagnosis with Fuzzy Classification and Radiomic Features.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022

Emotion Recognition from Facial Expression using Explainable Deep Learning.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Vulnerable Smart Contract Detection by Means of Model Checking.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

Blood Cells Counting and Localisation through Deep Learning Object Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

Smart Grid monitoring through Deep Learning for Image-based Automatic Dial Meter Reading.
Proceedings of the IEEE International Conference on Big Data, 2022

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal.
Proceedings of the IEEE International Conference on Big Data, 2022

Machine Learning for Uterine Cervix Screening.
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022

Deep Learning for Heartbeat Phonocardiogram Signals Explainable Classification.
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022

Explainable Deep Learning for Alzheimer Disease Classification and Localisation.
AII, 2022

Introducing Quantum Computing in Mobile Malware Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Audio signal processing for Android malware detection and family identification.
J. Comput. Virol. Hacking Tech., 2021

A framework for supporting ransomware detection and prevention based on hybrid analysis.
J. Comput. Virol. Hacking Tech., 2021

CAN-Bus Attack Detection With Deep Learning.
IEEE Trans. Intell. Transp. Syst., 2021

Dynamic Mobile Malware Detection through System Call-based Image representation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Transfer learning for mobile real-time face mask detection and localization.
J. Am. Medical Informatics Assoc., 2021

Towards an interpretable deep learning model for mobile malware detection and family identification.
Comput. Secur., 2021

Mobile Family Detection through Audio Signals Classification.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Automated Intention Mining with Comparatively Fine-tuning BERT.
Proceedings of the NLPIR 2021: 5th International Conference on Natural Language Processing and Information Retrieval, Sanya, China, December 17, 2021

Detecting Call Indirection Obfuscation through Equivalence Checking in Android environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Exploiting Supervised Machine Learning for Driver Detection in a Real-World Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

A Method for Automatic Penetration Testing and Mitigation: A <i>Red Hat</i> Approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Perturbation of Image-based Malware Detection with Smali level morphing techniques.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Proposal to Ensure Social Distancing with Deep Learning-based Object Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021

A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Thermal Ablation Treatment Detection by means of Machine Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Colluding Covert Channel for Malicious Information Exfiltration in Android Environment.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A Machine-Learning-Based Framework for Supporting Malware Detection and Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

A Neural-Network-Based Framework for Supporting Driver Classification and Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

A Framework for Supporting Ransomware Detection and Prevention Based on Hybrid Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

Hide and Seek Game: A Machine Learning Approach for Detecting Malicious Samples in Analysis Environment.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

Robust Malware Classification via Deep Graph Networks on Call Graph Topologies.
Proceedings of the 29th European Symposium on Artificial Neural Networks, 2021

Towards Resilient Artificial Intelligence: Survey and Research Issues.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

A Methodology based on Formal Methods for Thermal Ablation Area Detection.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Deep learning for image-based mobile malware detection.
J. Comput. Virol. Hacking Tech., 2020

Model checking and machine learning techniques for <i>HummingBad</i> mobile malware detection and mitigation.
Simul. Model. Pract. Theory, 2020

Radiomics for Gleason Score Detection through Deep Learning.
Sensors, 2020

DECAB-LSTM: Deep Contextualized Attentional Bidirectional LSTM for cancer hallmark classification.
Knowl. Based Syst., 2020

D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Visualizing the outcome of dynamic analysis of Android malware with VizMal.
J. Inf. Secur. Appl., 2020

Anomaly detection in substation networks.
J. Inf. Secur. Appl., 2020

Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences.
Inf., 2020

BPM perspectives to support ICSs: Exploiting the integration of formal verifications into investment service provision processes.
Ind. Manag. Data Syst., 2020

Cognitive computing for big data systems over internet of things for enterprise information systems.
Enterp. Inf. Syst., 2020

Timed Automata for Mobile Ransomware Detection.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020

Model checking for malicious family detection and phylogenetic analysis in mobile environment.
Comput. Secur., 2020

Explainable Deep Learning for Pulmonary Disease and Coronavirus COVID-19 Detection from X-rays.
Comput. Methods Programs Biomed., 2020

An ensemble learning approach for brain cancer detection exploiting radiomic features.
Comput. Methods Programs Biomed., 2020

Human behavior characterization for driving style recognition in vehicle system.
Comput. Electr. Eng., 2020

Machine Learning for Driver Detection through CAN bus.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A Deep-Learning-Based Framework for Supporting Analysis and Detection of Attacks on CAN Buses.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Machine learning for coronavirus covid-19 detection from chest x-rays.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Deep learning for heart disease detection through cardiac sounds.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

Evaluating Deep Learning Classification Reliability in Android Malware Family Detection.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques.
Proceedings of the 5th International Conference on Internet of Things, 2020

Hourly Global Solar Radiation Reconstruction Applying Machine Learning.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Malicious Collusion Detection in Mobile Environment by means of Model Checking.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Lung Cancer Detection and Characterisation through Genomic and Radiomic Biomarkers.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Identify Potential Attacks from Simulated Log Analysis.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Bank Credit Risk Management based on Data Mining Techniques.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Android Run-time Permission Exploitation User Awareness by Means of Formal Methods.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Accidental Sensitive Data Leaks Prevention via Formal Verification.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation.
Proceedings of the Advanced Information Networking and Applications, 2020

Colluding Android Apps Detection via Model Checking.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

VisualDroid: automatic triage and detection of Android repackaged applications.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
LEILA: Formal Tool for Identifying Mobile Malicious Behaviour.
IEEE Trans. Software Eng., 2019

Cognitive data science methods and models for engineering applications.
Soft Comput., 2019

A "pay-how-you-drive" car insurance approach through cluster analysis.
Soft Comput., 2019

Android malware detection based on system call sequences and LSTM.
Multim. Tools Appl., 2019

Model Checking Based Approach for Compliance Checking.
Inf. Technol. Control., 2019

Dynamic malware detection and phylogeny analysis using process mining.
Int. J. Inf. Sec., 2019

Classification of ransomware families with machine learning based on N-gram of opcodes.
Future Gener. Comput. Syst., 2019

On the effectiveness of system API-related information for Android ransomware detection.
Comput. Secur., 2019

Prostate Gleason Score Detection and Cancer Treatment Through Real-Time Formal Verification.
IEEE Access, 2019

Real-Time SCADA Attack Detection by Means of Formal Methods.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Wearable Devices for Human Activity Recognition and User Detection.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Energy Consumption Metrics for Mobile Device Dynamic Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Model Checking for Data Anomaly Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

<i>Dunuen</i>: A User-Friendly Formal Verification Tool.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Formal Modeling for Magnetic Resonance Images Tamper Mitigation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Radiomic Features for Medical Images Tamper Detection by Equivalence Checking.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

A Blockchain Based Proposal for Protecting Healthcare Systems through Formal Methods.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Exploiting Model Checking for Mobile Botnet Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Formal Methods for Android Banking Malware Analysis and Detection.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Social Network Polluting Contents Detection through Deep Learning Techniques.
Proceedings of the International Joint Conference on Neural Networks, 2019

Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics.
Proceedings of the International Joint Conference on Neural Networks, 2019

Neural Networks for Lung Cancer Detection through Radiomic Features.
Proceedings of the International Joint Conference on Neural Networks, 2019

Keystroke Analysis for User Identification using Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2019

Machine Learning to Identify Gender via Hair Elements.
Proceedings of the International Joint Conference on Neural Networks, 2019

A machine-learning framework for supporting intelligent web-phishing detection and analysis.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Model Checking to Detect the Hummingbad Malware.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Spyware Detection using Temporal Logic.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

An Innovative Framework for Supporting Social Network Polluting-content Detection and Analysis.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Can Machine Learning Predict Soccer Match Results?
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

Investigating Mobile Applications Quality in Official and Third-party Marketplaces.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019

A Data Life Cycle Modeling Proposal by Means of Formal Methods.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A Model Checking based Proposal for Mobile Colluding Attack Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A Methodology for Real-Time Data Verification exploiting Deep Learning and Model Checking.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
An exploratory study on the evolution of Android malware quality.
J. Softw. Evol. Process., 2018

Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments.
J. Reliab. Intell. Environ., 2018

Evaluating model checking for cyber threats code obfuscation identification.
J. Parallel Distributed Comput., 2018

Cross-Organisational Process Mining in Cloud Environments.
J. Inf. Knowl. Manag., 2018

Talos: no more ransomware victims with formal methods.
Int. J. Inf. Sec., 2018

R-PackDroid: Practical On-Device Detection of Android Ransomware.
CoRR, 2018

Safety Critical Systems Formal Verification Using Execution Traces.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Improving Vehicle Safety Through a Fog Collaborative Infrastructure.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Context-Awareness Mobile Devices for Traffic Incident Prevention.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Driver Identification: a Time Series Classification Approach.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Applying Machine Learning Techniques to Detect and Analyze Web Phishing Attacks.
Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services, 2018

Detecting and Analyzing Anomalies Across Historical Data Changes: A Data-Driven Approach.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Cluster Analysis for Driver Aggressiveness Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Who's Driving My Car? A Machine Learning based Approach to Driver Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Identifying Insecure Features in Android Applications using Model Checking.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Phylogenetic Analysis for Ransomware Detection and Classification into Families.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Not so Crisp, Malware! Fuzzy Classification of Android Malware Classes.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

An Ensemble Fuzzy Logic Approach to Game Bot Detection through Behavioural Features.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

POSTER: A Framework for Phylogenetic Analysis in Mobile Environment.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Measuring Mobile Applications Quality and Security in Higher Education.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Improving Machine Learning Tools with Embeddings: Applications to Big Data Security.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Formal Methodology for Notational Analysis and Real-Time Decision Support in Sport Environment.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Detection of Obfuscation Techniques in Android Applications.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A time series classification approach to game bot detection.
Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics, 2017

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Android apps and user feedback: a dataset for software evolution and quality improvement.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017

Mobile Silent and Continuous Authentication using Apps Sequence.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

R-PackDroid: API package-based characterization and detection of mobile ransomware.
Proceedings of the Symposium on Applied Computing, 2017

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Diabetes Mellitus Affected Patients Classification and Diagnosis through Machine Learning Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Evaluating Convolutional Neural Network for Effective Mobile Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

A Machine Learning Approach for Game Bot Detection Through Behavioural Features.
Proceedings of the Software Technologies - 12th International Joint Conference, 2017

Game Bot Detection in Online Role Player Game through Behavioural Features.
Proceedings of the 12th International Conference on Software Technologies, 2017

Model Checking for Mobile Android Malware Evolution.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

Identifying Mobile Repackaged Applications through Formal Methods.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Car hacking identification through fuzzy logic algorithms.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

A fuzzy-based process mining approach for dynamic malware detection.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

How Discover a Malware using Model Checking.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Tor traffic analysis and detection via machine learning techniques.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Let's Gossip: Exploring Malware Zero-Day Time Windows by Social Network Analysis.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
An HMM and structural entropy based detector for Android malware: An empirical study.
Comput. Secur., 2016

Hey Malware, I Can Find You!
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Silent and Continuous Authentication in Mobile Environment.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A constraint-driven approach for dynamic malware detection.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Exploring Mobile User Experience Through Code Quality Metrics.
Proceedings of the Product-Focused Software Process Improvement, 2016

Mobile malware detection in the real world.
Proceedings of the 38th International Conference on Software Engineering, 2016

Download malware? no, thanks: how formal methods can block update attacks.
Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering, 2016

Identification of Android Malware Families with Model Checking.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A Methodology for Silent and Continuous Authentication in Mobile Environment.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

Process Mining Meets Malware Evolution: A Study of the Behavior of Malicious Code.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

Ransomware Steals Your Phone. Formal Methods Rescue It.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016

Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Ransomware Inside Out.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Exploring the Usage of Topic Modeling for Android Malware Static Analysis.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Detecting Android malware using sequences of system calls.
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

Mobile Malware Detection using Op-code Frequency Histograms.
Proceedings of the SECRYPT 2015, 2015

Evaluating Mobile Malware by Extracting User Experience-Based Features.
Proceedings of the Product-Focused Software Process Improvement, 2015

Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Composition-Malware: Building Android Malware at Run Time.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Metamorphic Malware Detection Using Code Metrics.
Inf. Secur. J. A Glob. Perspect., 2014

Malicious JavaScript Detection by Features Extraction.
e Informatica Softw. Eng. J., 2014

Detection of Malicious Web Pages Using System Calls Sequences.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Identification of Anomalies in Processes of Database Alteration.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

A Classifier of Malicious Android Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013


  Loading...