Advancement on Security Applications of Private Intersection Sum Protocol

Y Athur Raghuvir , S Govindarajan , S Vijayakumar , P Yadlapalli
Smpte Journal 104 -116

2022
A New Dataset for Smartphone Gesture-based Authentication.

Mark Stamp , Fabio Di Troia , Elliu Huang , Preethi Sundaravaradhan
international conference on information systems security 771 -780

2021
Feature analysis of encrypted malicious traffic

Anish Singh Shekhawat , Fabio Di Troia , Mark Stamp
Expert Systems With Applications 125 130 -141

44
2019
Detecting Malware Evolution Using Support Vector Machines

Mayuri Wadkar , Fabio Di Troia , Mark Stamp
Expert Systems With Applications 143 113022

14
2020
Masquerade detection on mobile devices

Swathi Nambiar Kadala Manikoth , Fabio Di Troia , Mark Stamp
Guide to Vulnerability Analysis for Computer Networks and Systems 301 -315

1
2018
Function Call Graphs Versus Machine Learning for Malware Detection

Deebiga Rajeswaran , Fabio Di Troia , Thomas H. Austin , Mark Stamp
Guide to Vulnerability Analysis for Computer Networks and Systems 259 -279

3
2018
Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models

Katerina Potika , Mark Stamp , Dhiviya Dhanasekar , Fabio Di Troia
Guide to Vulnerability Analysis for Computer Networks and Systems — An Artificial Intelligence Approach 281 -299

2
2018
Black box analysis of android malware detectors

Guruswamy Nellaivadivelu , Fabio Di Troia , Mark Stamp
Array 6 100022

1
2020
Support Vector Machines for Image Spam Analysis

Aneri Chavda , Katerina Potika , Fabio Di Troia , Mark Stamp
international conference on e-business and telecommunication networks 2 431 -441

4
2018
On the effectiveness of generic malware models

Naman Bagga , Fabio Di Troia , Mark Stamp
international conference on e-business and telecommunication networks 2 442 -450

3
2018
Static Analysis of Malicious Java Applets

Nikitha Ganesh , Fabio Di Troia , Visaggio Aaron Corrado , Thomas H. Austin
international workshop on security 58 -63

8
2016
Malware Detection Using Dynamic Birthmarks

Swapna Vemparala , Fabio Di Troia , Visaggio Aaron Corrado , Thomas H. Austin
international workshop on security 41 -46

23
2016
Support vector machines and malware detection

Tanuvir Singh , Fabio Di Troia , Visaggio Aaron Corrado , Thomas H. Austin
Journal of Computer Virology and Hacking Techniques 12 ( 4) 203 -212

29
2016
A comparison of static, dynamic, and hybrid analysis for malware detection

Anusha Damodaran , Fabio Di Troia , Corrado Aaron Visaggio , Thomas H. Austin
Journal of Computer Virology and Hacking Techniques 13 ( 1) 1 -12

126
2017
Vigenère scores for malware detection

Suchita Deshmukh , Fabio Di Troia , Mark Stamp
Journal of Computer Virology and Hacking Techniques 14 ( 2) 157 -165

2018
Clustering versus SVM for malware detection

Usha Narra , Fabio Di Troia , Visaggio Aaron Corrado , Thomas H. Austin
Journal of Computer Virology and Hacking Techniques 12 ( 4) 213 -224

39
2016
An analysis of Android adware

Supraja Suresh , Fabio Di Troia , Katerina Potika , Mark Stamp
Journal of Computer Virology and Hacking Techniques 15 ( 3) 147 -160

3
2019
Multifamily malware models

Samanvitha Basole , Fabio Di Troia , Mark Stamp
Journal of Computer Virology and Hacking Techniques 16 ( 1) 79 -92

3
2020
Hidden Markov models with random restarts versus boosting for malware detection

Aditya Raghavan , Fabio Di Troia , Mark Stamp
Journal of Computer Virology and Hacking Techniques 15 ( 2) 97 -107

8
2019