Publications
Authors: Simone Andriani, Stefano Galantucci, Andrea Iannacone, Antonio Maci, Giuseppe Pirlo
Magazine: Computers Security
CNN-AutoMIC: Combining convolutional neural network and autoencoder to learn non-linear features for knn-based malware image classification
Authors: Pierpaolo Artioli, Vincenzo Dentamaro, Stefano Galantucci, Alessio Magrì, Gianluca Pellegrini, Gianfranco Semeraro
Magazine: Networks Volume 266
SIEVE: Generating a cybersecurity log dataset collection for SIEM event classification
Authors: Piero Delvecchio, Stefano Galantucci, Andrea Iannacone & Giuseppe Pirlo
Magazine: International Journal of Information SecurityVolume 24, article number 98, 2025
CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform
Authors: Antonio Coscia, Roberto Lorusso, Antonio Maci, Giuseppe Urbano
Magazine: Computers Security
APIARY: an API-based Automatic Rule generator for Yara to enhance malware detection
Authors: Roberto Lorusso, Antonio Maci and Antonio Coscia
Magazine: Proceedings of the 17th International Conference on Agents and Artificial Intelligence – Volume 1: ICAART
GOLLUM: Guiding cOnfiguration of firewaLL Through aUgmented Large Language Models
Authors: Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo, Lucia Sarcinella, Alessandro Stamerra
Magazine: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)
MAGICIAN: Malware classification Approach through Generation Image using a Conditional and wassersteIn generative Adversarial Network variants
Authors: FROG: a Firewall Rule Order Generator for faster packet filtering
Magazine: Springer – Communications in Computer and Information Science
FROG: a Firewall Rule Order Generator for faster packet filtering
Authors: Tony Delvecchio and Giancarlo De Bernardis, Sander Zeijlemaker and Michael Siegel
Magazine: Springer – Communications in Computer and Information Science
BV TECH + MIT: Employing Board Cyber-Risk Management Collaborative Game Under Condition Of Uncertainty
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Magazine: IEEE Access
PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention.
Authors: Antonio Coscia, Andrea Iannacone, Antonio Maci, Alessandro Stamerra
Magazine: Volume 15, Issue 8
SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay
Authors: Pierpaolo Artioli, Antonio Maci, Alessio Magrì
Magazine: Big Data, 09 May 2024 Sec. Cybersecurity and Privacy Volume 7 – 2024
A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics
Authors: Pierpaolo Artioli, Alessio Magrì & Pietro Spalluto
Account Hijacking Detection with KATANA, a K-means Approach for Targeted user behavior ANAlysis
Authors: Antonio Maci; Giuseppe Urbano, Antonio Coscia
Magazine: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1
Deep Q-Networks for Imbalanced Multi-Class Malware Classification.
Authors: Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel
Magazine: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1
Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming.
Authors: Antonio Maci, Nicola Tamma, Antonio Coscia
Magazine: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)
Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Journal: Journal of Information Security and Applications
Automatic decision tree based NIDPS ruleset generation for DoS/DDoS attacks
Authors: Alessandro Santorsola, Antonio Maci, Piero Delvecchio, Antonio Coscia
Magazine: 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)
A Reinforcement-Learning-based Agent to Discover Safety-Critical States in Smart Grid Environments.
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Magazine: Computers Security
An innovative two-stage algorithm to optimize Firewall rule ordering
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Journal: IEEE Transactions on Information Forensics and Security
YAMME: a YAra-byte-signatures Metamorphic Mutation Engine.
Authors: Antonio Maci, Alessandro Santorsola, Antonio Coscia, Andrea Iannacone
Magazine: Computers, Volume 12, Issue 6
Unbalanced Web Phishing Classification through Deep Reinforcement Learning.
Authors: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo, Antonio Maci
Magazine: CEUR-WS.org/Paper 17
A novel genetic algorithm approach for firewall policy optimization
Authors: Angelo Cannarile, Francesco Carrera, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo
Magazine: CEUR-WS.org/Paper 9
A study on malware detection and classification using the analysis of API calls sequences through shallow learning and recurrent neural networks
Authors: Alessandro Santorsola, Aldo Migliau, Sabino Caporusso
Magazine: CEUR-WS.org/Paper 1
Reinforcement Learning Agents for Simulating Normal and Malicious Actions in Cyber Range Scenarios
Authors: Sander Zeijlemaker, Michael Siegel, Daniel Goldsmith, Shaharyar Khan
Magazine: World Economic Forum
How to align cyber risk management with business needs
Authors: Angelo Cannarile,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo
Magazine: Appl. Sci., Volume 12, Issue 3
Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study
Authors:Francesco Carrera,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo
Magazine: Appl. Sci., Volume 12, Issue 3
Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
Authors: Shaharyar Khan, Alberto Volpatto, Geet Kalra, Jonathan Esteban, Tommaso Pescanoce, Sabino Caporusso, Michael Siegel
Magazine: CEUR-WS.org/Paper 21
Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios.
GROTTAGLIE:
Corso Europa, 3
74023 Grottaglie (TA)
Tel.: +39.02.8596171
Fax: +39.02.89093321
RUTIGLIANO:
S.P. 84 Adelfia-Rutigliano, C.da Caggiano
70018 Rutigliano (BA)
Tel.: +39.02.8596171
Fax: +39.02.89093321





Project funded by the European Regional Development Fund Puglia POR Puglia 2014 - 2020 - Axis I - Specific Objective 1a - Action 1.1 (R&D), and with the support of the University of Bari and the Massachusetts Institute of Technology (MIT).