Pubblicazioni
Autori: Simone Andriani, Stefano Galantucci, Andrea Iannacone, Antonio Maci, Giuseppe Pirlo
Rivista: Computers & Security
CNN-AutoMIC: Combining convolutional neural network and autoencoder to learn non-linear features for knn-based malware image classification
Autori: Pierpaolo Artioli, Vincenzo Dentamaro, Stefano Galantucci, Alessio Magrì, Gianluca Pellegrini, Gianfranco Semeraro
Rivista: Networks Volume 266
SIEVE: Generating a cybersecurity log dataset collection for SIEM event classification
Autori: Piero Delvecchio, Stefano Galantucci, Andrea Iannacone & Giuseppe Pirlo
Rivista: International Journal of Information SecurityVolume 24, article number 98, 2025
CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform
Autori: Antonio Coscia, Roberto Lorusso, Antonio Maci, Giuseppe Urbano
Rivista: Computers & Security
APIARY: an API-based Automatic Rule generator for Yara to enhance malware detection
Autori: Roberto Lorusso, Antonio Maci e Antonio Coscia
Rivista: Proceedings of the 17th International Conference on Agents and Artificial Intelligence – Volume 1: ICAART
GOLLUM: Guiding cOnfiguration of firewaLL Through aUgmented Large Language Models
Autori: Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo, Lucia Sarcinella, Alessandro Stamerra
Rivista: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)
MAGICIAN: Malware classification Approach through Generation Image using a Conditional and wassersteIn generative Adversarial Network variants
Autori: FROG: a Firewall Rule Order Generator for faster packet filtering
Rivista: Springer – Communications in Computer and Information Science
FROG: a Firewall Rule Order Generator for faster packet filtering
Autori: Tony Delvecchio e Giancarlo De Bernardis, Sander Zeijlemaker e Michael Siegel
Rivista: Springer – Communications in Computer and Information Science
BV TECH + MIT: Employing Board Cyber-Risk Management Collaborative Game Under Condition Of Uncertainty
Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Rivista: IEEE Access
PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention
Autori: Antonio Coscia, Andrea Iannacone, Antonio Maci, Alessandro Stamerra
Rivista: Volume 15, Issue 8
SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay
Autori: Pierpaolo Artioli, Antonio Maci, Alessio Magrì
Rivista: Big Data, 09 May 2024 Sec. Cybersecurity and Privacy Volume 7 – 2024
A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics
Autori: Pierpaolo Artioli, Alessio Magrì & Pietro Spalluto
Account Hijacking Detection with KATANA, a K-means Approach for Targeted user behavior ANAlysis
Autori: Antonio Maci; Giuseppe Urbano, Antonio Coscia
Rivista: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1
Deep Q-Networks for Imbalanced Multi-Class Malware Classification
Autori: Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel
Rivista: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1
Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming
Autori: Antonio Maci, Nicola Tamma, Antonio Coscia
Rivista: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)
Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection
Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Rivista: Journal of Information Security and Applications
Automatic decision tree based NIDPS ruleset generation for DoS/DDoS attacks
Autori: Alessandro Santorsola, Antonio Maci, Piero Delvecchio, Antonio Coscia
Rivista: 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)
A Reinforcement-Learning-based Agent to discover Safety-Critical States in Smart Grid Environments
Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Rivista: Computers & Security
An innovative two-stage algorithm to optimize Firewall rule ordering
Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo
Rivista: IEEE Transactions on Information Forensics and Security
YAMME: a YAra-byte-signatures Metamorphic Mutation Engine
Autori: Antonio Maci, Alessandro Santorsola, Antonio Coscia, Andrea Iannacone
Rivista: Computers, Volume 12, Issue 6
Unbalanced Web Phishing Classification through Deep Reinforcement Learning
Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo, Antonio Maci
Rivista: CEUR-WS.org/Paper 17
A novel genetic algorithm approach for firewall policy optimization
Autori: Angelo Cannarile, Francesco Carrera, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo
Rivista: CEUR-WS.org/Paper 9
A study on malware detection and classification using the analysis of API calls sequences through shallow learning and recurrent neural networks
Autori: Alessandro Santorsola, Aldo Migliau, Sabino Caporusso
Rivista: CEUR-WS.org/Paper 1
Reinforcement Learning Agents for Simulating Normal and Malicious Actions in Cyber Range Scenarios
Autori: Sander Zeijlemaker, Michael Siegel, Daniel Goldsmith, Shaharyar Khan
Rivista: World Economic Forum
How to align cyber risk management with business needs
Autori: Angelo Cannarile,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo
Rivista: Appl. Sci., Volume 12, Issue 3
Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study
Autori:Francesco Carrera,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo
Rivista:Appl. Sci., Volume 12, Issue 3
Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
Autori: Shaharyar Khan, Alberto Volpatto, Geet Kalra, Jonathan Esteban, Tommaso Pescanoce, Sabino Caporusso, Michael Siegel
Rivista: CEUR-WS.org/Paper 21
Cyber Range for Industrial Control Systems (CR‐ICS) for Simulating Attack Scenarios





Progetto finanziato dal Fondo Europeo di Sviluppo Regionale Puglia POR Puglia 2014 – 2020 – Asse I – Obiettivo specifico 1a – Azione 1.1 (R&S), e con il supporto dell’Università di Bari e del Massachusetts Institute of Technology (MIT).