Publications

Authors: Simone Andriani, Stefano Galantucci, Andrea Iannacone, Antonio Maci, Giuseppe Pirlo

Magazine: Computers Security

CNN-AutoMIC: Combining convolutional neural network and autoencoder to learn non-linear features for knn-based malware image classification

Authors: Pierpaolo Artioli, Vincenzo Dentamaro, Stefano Galantucci, Alessio Magrì, Gianluca Pellegrini, Gianfranco Semeraro

Magazine: Networks Volume 266

SIEVE: Generating a cybersecurity log dataset collection for SIEM event classification

Authors: Piero Delvecchio, Stefano Galantucci, Andrea Iannacone & Giuseppe Pirlo

Magazine: International Journal of Information SecurityVolume 24, article number 98, 2025

CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform

Authors: Antonio Coscia, Roberto Lorusso, Antonio Maci, Giuseppe Urbano

Magazine: Computers Security

APIARY: an API-based Automatic Rule generator for Yara to enhance malware detection

Authors: Roberto Lorusso, Antonio Maci and Antonio Coscia

Magazine: Proceedings of the 17th International Conference on Agents and Artificial Intelligence – Volume 1: ICAART

GOLLUM: Guiding cOnfiguration of firewaLL Through aUgmented Large Language Models

Authors: Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo, Lucia Sarcinella, Alessandro Stamerra

Magazine: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)

MAGICIAN: Malware classification Approach through Generation Image using a Conditional and wassersteIn generative Adversarial Network variants

Authors: FROG: a Firewall Rule Order Generator for faster packet filtering

Magazine: Springer – Communications in Computer and Information Science

FROG: a Firewall Rule Order Generator for faster packet filtering

Authors: Tony Delvecchio and Giancarlo De Bernardis, Sander Zeijlemaker and Michael Siegel

Magazine: Springer – Communications in Computer and Information Science

BV TECH + MIT: Employing Board Cyber-Risk Management Collaborative Game Under Condition Of Uncertainty

Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo

Magazine: IEEE Access

PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention.

Authors: Antonio Coscia, Andrea Iannacone, Antonio Maci, Alessandro Stamerra

Magazine: Volume 15, Issue 8

SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay

Authors: Pierpaolo Artioli, Antonio Maci, Alessio Magrì

Magazine: Big Data, 09 May 2024 Sec. Cybersecurity and Privacy Volume 7 – 2024

A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics

Authors: Pierpaolo Artioli, Alessio Magrì & Pietro Spalluto

Account Hijacking Detection with KATANA, a K-means Approach for Targeted user behavior ANAlysis

Authors: Antonio Maci; Giuseppe Urbano, Antonio Coscia

Magazine: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1

Deep Q-Networks for Imbalanced Multi-Class Malware Classification.

Authors: Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel

Magazine: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1

Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming.

Authors: Antonio Maci, Nicola Tamma, Antonio Coscia

Magazine: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)

Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection

Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo

Journal: Journal of Information Security and Applications

Automatic decision tree based NIDPS ruleset generation for DoS/DDoS attacks

Authors: Alessandro Santorsola, Antonio Maci, Piero Delvecchio, Antonio Coscia

Magazine: 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)

A Reinforcement-Learning-based Agent to Discover Safety-Critical States in Smart Grid Environments.

Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo

Magazine: Computers Security

An innovative two-stage algorithm to optimize Firewall rule ordering

Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo

Journal: IEEE Transactions on Information Forensics and Security

YAMME: a YAra-byte-signatures Metamorphic Mutation Engine.

Authors: Antonio Maci, Alessandro Santorsola, Antonio Coscia, Andrea Iannacone

Magazine: Computers, Volume 12, Issue 6

Unbalanced Web Phishing Classification through Deep Reinforcement Learning.

Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo, Antonio Maci

Magazine: CEUR-WS.org/Paper 17

A novel genetic algorithm approach for firewall policy optimization

Authors: Angelo Cannarile, Francesco Carrera, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo

Magazine: CEUR-WS.org/Paper 9

A study on malware detection and classification using the analysis of API calls sequences through shallow learning and recurrent neural networks

Authors: Alessandro Santorsola, Aldo Migliau, Sabino Caporusso

Magazine: CEUR-WS.org/Paper 1

Reinforcement Learning Agents for Simulating Normal and Malicious Actions in Cyber Range Scenarios

Authors: Sander Zeijlemaker, Michael Siegel, Daniel Goldsmith, Shaharyar Khan

Magazine: World Economic Forum

How to align cyber risk management with business needs

Authors: Angelo Cannarile,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo

Magazine: Appl. Sci., Volume 12, Issue 3

Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study

Authors:Francesco Carrera,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo

Magazine: Appl. Sci., Volume 12, Issue 3

Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection

Authors: Shaharyar Khan, Alberto Volpatto, Geet Kalra, Jonathan Esteban, Tommaso Pescanoce, Sabino Caporusso, Michael Siegel

Magazine: CEUR-WS.org/Paper 21

Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios.

Follow us on social media

GROTTAGLIE:
Corso Europa, 3
74023 Grottaglie (TA)
Tel.: +39.02.8596171
Fax: +39.02.89093321

 

RUTIGLIANO:
S.P. 84 Adelfia-Rutigliano, C.da Caggiano
70018 Rutigliano (BA)
Tel.: +39.02.8596171
Fax: +39.02.89093321

Project funded by the European Regional Development Fund Puglia POR Puglia 2014 - 2020 - Axis I - Specific Objective 1a - Action 1.1 (R&D), and with the support of the University of Bari and the Massachusetts Institute of Technology (MIT).

Privacy and Cookie Policy