Artikkelit, joihin on yleisen käytön mandaatti - Roberto PerdisciLisätietoja
Ei saatavilla missään: 1
Returning to Port: Efficient Detection of Home Router Devices
T Papastergiou, R Perdisci, M Antonakakis
2022 IEEE Conference on Communications and Network Security (CNS), 172-180, 2022
Mandaatit: US Department of Defense
Saatavilla jossain: 20
Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis
R Perdisci, T Papastergiou, O Alrawi, M Antonakakis
2020 IEEE european symposium on security and privacy (EuroS&P), 474-489, 2020
Mandaatit: US Department of Defense
Practical attacks against graph-based clustering
Y Chen, Y Nadji, A Kountouras, F Monrose, R Perdisci, M Antonakakis, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Mandaatit: US National Science Foundation, US Department of Defense
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
B Li, P Vadrevu, KH Lee, R Perdisci, J Liu, B Rahbarinia, K Li, ...
NDSS 122, 132, 2018
Mandaatit: US National Science Foundation, US Department of Defense
Efficient and accurate behavior-based tracking of malware-control domains in large ISP networks
B Rahbarinia, R Perdisci, M Antonakakis
ACM Transactions on Privacy and Security (TOPS) 19 (2), 1-31, 2016
Mandaatit: US National Science Foundation
When push comes to ads: Measuring the rise of (malicious) push advertising
K Subramani, X Yuan, O Setayeshfar, P Vadrevu, KH Lee, R Perdisci
Proceedings of the ACM Internet Measurement Conference, 724-737, 2020
Mandaatit: US National Science Foundation
Real-time detection of malware downloads via large-scale URL-> file-> machine graph mining
B Rahbarinia, M Balduzzi, R Perdisci
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Mandaatit: US National Science Foundation
Towards Measuring the Effectiveness of Telephony Blacklists.
S Pandit, R Perdisci, M Ahamad, P Gupta
NDSS, 2018
Mandaatit: US National Science Foundation
Exploring the long tail of (malicious) software downloads
B Rahbarinia, M Balduzzi, R Perdisci
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Mandaatit: US National Science Foundation
Towards measuring the role of phone numbers in twitter-advertised spam
P Gupta, R Perdisci, M Ahamad
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Mandaatit: US National Science Foundation
Mnemosyne: An effective and efficient postmortem watering hole attack investigation system
J Allen, Z Yang, M Landen, R Bhat, H Grover, A Chang, Y Ji, R Perdisci, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Mandaatit: US National Science Foundation, US Department of Defense
Maxs: Scaling malware execution with sequential multi-hypothesis testing
P Vadrevu, R Perdisci
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Mandaatit: US National Science Foundation
PhishInPatterns: measuring elicited user interactions at scale on phishing websites
K Subramani, W Melicher, O Starov, P Vadrevu, R Perdisci
Proceedings of the 22nd ACM Internet Measurement Conference, 589-604, 2022
Mandaatit: US National Science Foundation
Augmenting telephone spam blacklists by mining large cdr datasets
J Liu, B Rahbarinia, R Perdisci, H Du, L Su
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Mandaatit: US National Science Foundation
Combating robocalls with phone virtual assistant mediated interaction
S Pandit, K Sarker, R Perdisci, M Ahamad, D Yang
32nd USENIX Security Symposium (USENIX Security 23), 463-479, 2023
Mandaatit: US National Science Foundation
C2sr: Cybercrime scene reconstruction for post-mortem forensic analysis
Y Kwon, W Wang, J Jung, KH Lee, R Perdisci
Network and Distributed Systems Security (NDSS) Symposium 2021, 2021
Mandaatit: US National Science Foundation
{TRIDENT}: Towards Detecting and Mitigating Web-based Social Engineering Attacks
Z Yang, J Allen, M Landen, R Perdisci, W Lee
32nd USENIX Security Symposium (USENIX Security 23), 6701-6718, 2023
Mandaatit: US National Science Foundation, US Department of Defense
Sok: Workerounds-categorizing service worker attacks and mitigations
K Subramani, J Jueckstock, A Kapravelos, R Perdisci
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 555-571, 2022
Mandaatit: US National Science Foundation, US Department of Defense
Detecting and measuring in-the-wild DRDoS attacks at IXPs
K Subramani, R Perdisci, M Konte
Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021
Mandaatit: US National Science Foundation
Towards a practical differentially private collaborative phone blacklisting system
D Ucci, R Perdisci, J Lee, M Ahamad
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
Mandaatit: US National Science Foundation
Tietokoneohjelma arvioi ja määrittää julkaisu- ja rahoitustiedot automaattisesti