Yamme: a yara-byte-signatures metamorphic mutation engine A Coscia, V Dentamaro, S Galantucci, A Maci, G Pirlo IEEE Transactions on Information Forensics and Security, 2023 | 18 | 2023 |
Automatic decision tree-based nidps ruleset generation for dos/ddos attacks A Coscia, V Dentamaro, S Galantucci, A Maci, G Pirlo Journal of Information Security and Applications 82, 103736, 2024 | 17 | 2024 |
Unbalanced web phishing classification through deep reinforcement learning A Maci, A Santorsola, A Coscia, A Iannacone Computers 12 (6), 118, 2023 | 17 | 2023 |
An innovative two-stage algorithm to optimize Firewall rule ordering A Coscia, V Dentamaro, S Galantucci, A Maci, G Pirlo Computers & Security 134, 103423, 2023 | 12 | 2023 |
Deep reinforcement learning-based malicious url detection with feature selection A Maci, N Tamma, A Coscia 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), 1-7, 2024 | 5 | 2024 |
PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention A Coscia, V Dentamaro, S Galantucci, A Maci, G Pirlo IEEE Access, 2024 | 2 | 2024 |
Deep Q-Networks for Imbalanced Multi-Class Malware Classification. A Maci, G Urbano, A Coscia ICISSP, 342-349, 2024 | 2 | 2024 |
A Novel Genetic Algorithm Approach for Firewall Policy Optimization. A Coscia, V Dentamaro, S Galantucci, D Impedovo, A Maci ITASEC, 236-248, 2022 | 2 | 2022 |
Sinner: A reward-sensitive algorithm for imbalanced malware classification using neural networks with experience replay A Coscia, A Iannacone, A Maci, A Stamerra Information 15 (8), 425, 2024 | 1 | 2024 |
A reinforcement-learning-based agent to discover safety-critical states in smart grid environments A Santorsola, A Maci, P Delvecchio, A Coscia 2023 3rd International Conference on Electrical, Computer, Communications …, 2023 | 1 | 2023 |
FROG: A Firewall Rule Order Generator for faster packet filtering A Coscia, A Maci, N Tamma Computer Networks 257, 110962, 2025 | | 2025 |