Seleziona una pagina

Pubblicazioni

Autori: Simone Andriani, Stefano Galantucci, Andrea Iannacone, Antonio Maci, Giuseppe Pirlo

Rivista: Computers & Security

CNN-AutoMIC: Combining convolutional neural network and autoencoder to learn non-linear features for knn-based malware image classification

Autori: Pierpaolo Artioli, Vincenzo Dentamaro, Stefano Galantucci, Alessio Magrì, Gianluca Pellegrini, Gianfranco Semeraro

Rivista: Networks Volume 266

SIEVE: Generating a cybersecurity log dataset collection for SIEM event classification

Autori: Piero Delvecchio, Stefano Galantucci, Andrea Iannacone & Giuseppe Pirlo

Rivista: International Journal of Information SecurityVolume 24, article number 98, 2025

CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform

Autori: Antonio Coscia, Roberto Lorusso, Antonio Maci, Giuseppe Urbano

Rivista: Computers & Security

APIARY: an API-based Automatic Rule generator for Yara to enhance malware detection

Autori: Roberto Lorusso, Antonio Maci e Antonio Coscia

Rivista: Proceedings of the 17th International Conference on Agents and Artificial Intelligence – Volume 1: ICAART

GOLLUM: Guiding cOnfiguration of firewaLL Through aUgmented Large Language Models

Autori: Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo, Lucia Sarcinella, Alessandro Stamerra

Rivista: 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)

MAGICIAN: Malware classification Approach through Generation Image using a Conditional and wassersteIn generative Adversarial Network variants

Autori: FROG: a Firewall Rule Order Generator for faster packet filtering

Rivista: Springer – Communications in Computer and Information Science

FROG: a Firewall Rule Order Generator for faster packet filtering

Autori: Tony Delvecchio e Giancarlo De Bernardis, Sander Zeijlemaker e Michael Siegel

Rivista: Springer – Communications in Computer and Information Science

BV TECH + MIT: Employing Board Cyber-Risk Management Collaborative Game Under Condition Of Uncertainty

Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo

Rivista: IEEE Access

PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention

Autori: Antonio Coscia, Andrea Iannacone, Antonio Maci, Alessandro Stamerra

Rivista: Volume 15, Issue 8

SINNER: A Reward-Sensitive Algorithm for Imbalanced Malware Classification Using Neural Networks with Experience Replay

Autori: Pierpaolo Artioli, Antonio Maci, Alessio Magrì

Rivista: Big Data, 09 May 2024 Sec. Cybersecurity and Privacy Volume 7 – 2024

A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics

Autori: Pierpaolo Artioli, Alessio Magrì & Pietro Spalluto

Account Hijacking Detection with KATANA, a K-means Approach for Targeted user behavior ANAlysis

Autori: Antonio Maci; Giuseppe Urbano, Antonio Coscia

Rivista: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1

Deep Q-Networks for Imbalanced Multi-Class Malware Classification

Autori: Tony Delvecchio, Sander Zeijlemaker, Giancarlo De Bernardis, Michael Siegel

Rivista: Proceedings of the 10th International Conference on Information Systems Security and Privacy ICISSP – Volume 1

Revolutionizing Board Cyber-Risk Management Using Collaborative Gaming

Autori: Antonio Maci, Nicola Tamma, Antonio Coscia

Rivista: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)

Deep Reinforcement Learning-based Malicious URL Detection with Feature Selection

Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo

Rivista: Journal of Information Security and Applications

Automatic decision tree based NIDPS ruleset generation for DoS/DDoS attacks

Autori: Alessandro Santorsola, Antonio Maci, Piero Delvecchio, Antonio Coscia

Rivista: 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)

A Reinforcement-Learning-based Agent to discover Safety-Critical States in Smart Grid Environments

Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo

Rivista: Computers & Security

An innovative two-stage algorithm to optimize Firewall rule ordering

Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo

Rivista: IEEE Transactions on Information Forensics and Security

YAMME: a YAra-byte-signatures Metamorphic Mutation Engine

Autori: Antonio Maci, Alessandro Santorsola, Antonio Coscia, Andrea Iannacone

Rivista: Computers, Volume 12, Issue 6

Unbalanced Web Phishing Classification through Deep Reinforcement Learning

Autori: Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo, Antonio Maci

Rivista: CEUR-WS.org/Paper 17

A novel genetic algorithm approach for firewall policy optimization

Autori: Angelo Cannarile, Francesco Carrera, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo

Rivista: CEUR-WS.org/Paper 9

A study on malware detection and classification using the analysis of API calls sequences through shallow learning and recurrent neural networks

Autori: Alessandro Santorsola, Aldo Migliau, Sabino Caporusso

Rivista: CEUR-WS.org/Paper 1

Reinforcement Learning Agents for Simulating Normal and Malicious Actions in Cyber Range Scenarios

Autori: Sander Zeijlemaker, Michael Siegel, Daniel Goldsmith, Shaharyar Khan

Rivista: World Economic Forum

How to align cyber risk management with business needs

Autori: Angelo Cannarile,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo

Rivista: Appl. Sci., Volume 12, Issue 3

Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study

Autori:Francesco Carrera,Vincenzo Dentamaro,Stefano Galantucci, Andrea Iannacone,Donato Impedovo, Giuseppe Pirlo

Rivista:Appl. Sci., Volume 12, Issue 3

Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection

Autori: Shaharyar Khan, Alberto Volpatto, Geet Kalra, Jonathan Esteban, Tommaso Pescanoce, Sabino Caporusso, Michael Siegel

Rivista: CEUR-WS.org/Paper 21

Cyber Range for Industrial Control Systems (CR‐ICS) for Simulating Attack Scenarios

Seguici sui Social

GROTTAGLIE:
Corso Europa, 3
74023 Grottaglie (TA)
Tel.: +39.04.64406755
Fax: +39.02.89093321

 

RUTIGLIANO:
S.P. 84 Adelfia-Rutigliano, C.da Caggiano
70018 Rutigliano (BA)
Tel.: +39.02.8596171
Fax: +39.02.89093321

Progetto finanziato dal Fondo Europeo di Sviluppo Regionale Puglia POR Puglia 2014 – 2020 – Asse I – Obiettivo specifico 1a – Azione 1.1 (R&S), e con il supporto dell’Università di Bari e del Massachusetts Institute of Technology (MIT).

Privacy e Cookie Policy