Igino Corona

Orcid: 0000-0002-7661-1401

According to our database1, Igino Corona authored at least 27 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection.
IEEE Access, 2021

2019
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2019

2017
Detection of Malicious Scripting Code Through Discriminant and Adversary-Aware API Analysis.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

DeltaPhish: Detecting Phishing Webpages in Compromised Websites.
Proceedings of the Computer Security - ESORICS 2017, 2017

Deepsquatting: Learning-Based Typosquatting Detection at Deeper Domain Levels.
Proceedings of the AI*IA 2017 Advances in Artificial Intelligence, 2017

2016
AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack.
CoRR, 2016

Pharmaguard WebApp: An Application for the Detection of Illegal Online Pharmacies.
Proceedings of the 2nd International Workshop on Knowledge Discovery on the WEB, 2016

2015
Machine Learning in Security Applications.
Trans. Mach. Learn. Data Min., 2015

Stealth attacks: An extended insight into the obfuscation effects on Android malware.
Comput. Secur., 2015

One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time.
Proceedings of the Multiple Classifier Systems - 12th International Workshop, 2015

An Evasion Resilient Approach to the Detection of Malicious PDF Files.
Proceedings of the Information Systems Security and Privacy, 2015

A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files.
Proceedings of the ICISSP 2015, 2015

PharmaGuard: Automatic identification of illegal search-indexed online pharmacies.
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015

2014
Security Evaluation of Support Vector Machines in Adversarial Environments.
CoRR, 2014

Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

Poisoning behavioral malware clustering.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues.
Inf. Sci., 2013

Evasion Attacks against Machine Learning at Test Time.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis.
IEEE Trans. Dependable Secur. Comput., 2012

A Pattern Recognition System for Malicious PDF Files Detection.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012

SuStorID: A multiple classifier system for the protection of web services.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2011
Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks.
Proceedings of the Multiple Classifier Systems - 10th International Workshop, 2011

2010
Detection of Server-side Web Attacks.
Proceedings of the First Workshop on Applications of Pattern Analysis, 2010

2009
Information fusion for computer security: State of the art and open issues.
Inf. Fusion, 2009

HMM-Web: A Framework for the Detection of Attacks Against Web Applications.
Proceedings of IEEE International Conference on Communications, 2009

Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...