Carminati, Michele
174  results:
Search for persons X
?
1

Tarallo: Evading Behavioral Malware Detectors in the Proble..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
3

CyFence: Securing Cyber-Physical Controllers via Trusted Ex..:

Longari, Stefano ; Pozone, Alessandro ; Leoni, Jessica...
IEEE Transactions on Emerging Topics in Computing.  12 (2024)  2 - p. 521-531 , 2024
 
?
 
?
6

Lookin' Out My Backdoor! Investigating Backdooring Attacks ..:

, In: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security,
D'Onghia, Mario ; Di Cesare, Federico ; Gallo, Luigi... - p. 209-220 , 2023
 
?
7

HAMLET: A Transformer Based Approach for Money Laundering D..:

, In: Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science,
 
?
10

CANdito: Improving Payload-Based Detection of Attacks on Co..:

, In: Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science,
 
?
11

Evaluating the Robustness of Automotive Intrusion Detection..:

, In: Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science,
 
?
12

Untangle: Aiding Global Function Pointer Hijacking for Post..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
 
?
14

The Good, the Bad, and the Binary: An LSTM-Based Method for..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
 
?
15

Fraud Detection under Siege: Practical Poisoning Attacks an..:

Paladini, Tommaso ; Monti, Francesco ; Polino, Mario..
ACM Transactions on Privacy and Security.  26 (2023)  4 - p. 1-35 , 2023
 
1-15