The SCEAS System
Navigation Menu

Search the dblp DataBase


Roberto Perdisci: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Roberto Perdisci, Guofei Gu, Wenke Lee
    Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:488-498 [Conf]
  2. Giorgio Giacinto, Roberto Perdisci, Fabio Roli
    Network Intrusion Detection by Combining One-Class Classifiers. [Citation Graph (0, 0)][DBLP]
    ICIAP, 2005, pp:58-65 [Conf]
  3. Giorgio Giacinto, Roberto Perdisci, Fabio Roli
    Alarm Clustering for Intrusion Detection Systems in Computer Networks. [Citation Graph (0, 0)][DBLP]
    MLDM, 2005, pp:184-193 [Conf]
  4. Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif
    MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:17-31 [Conf]
  5. Davide Ariu, Giorgio Giacinto, Roberto Perdisci
    Sensing Attacks in Computers Networks with Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    MLDM, 2007, pp:449-463 [Conf]

  6. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. [Citation Graph (, )][DBLP]

  7. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. [Citation Graph (, )][DBLP]

  8. WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. [Citation Graph (, )][DBLP]

  9. On the Secrecy of Spread-Spectrum Flow Watermarks. [Citation Graph (, )][DBLP]

  10. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. [Citation Graph (, )][DBLP]

  11. A Centralized Monitoring Infrastructure for Improving DNS Security. [Citation Graph (, )][DBLP]

  12. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. [Citation Graph (, )][DBLP]

  13. McPAD: A multiple classifier system for accurate payload-based anomaly detection. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002