roberto.perdisci.com
Publications - Roberto Perdisci
http://roberto.perdisci.com/publications
Conference Proceedings and Refereed Journal Publications. Manos Antonakakis. "Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks." ACM Transactions on Privacy and Security. Volume 19, Issue 2,. Article No. 4,. Manos Antonakakis, Mustaque Ahamad. Towards Measuring and Mitigating Social Engineering Software Download Attacks. USENIX Security Symposium, 2016. Acceptance rate 15.6% = 72/463) [ pdf. Babak Rahbarinia, Marco Balduzzi. Acceptance rate for full papers:.
perdisci.com
Publications - Roberto Perdisci
http://www.perdisci.com/publications
Conference Proceedings and Refereed Journal Publications. Manos Antonakakis. "Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks." ACM Transactions on Privacy and Security. Volume 19, Issue 2,. Article No. 4,. Manos Antonakakis, Mustaque Ahamad. Towards Measuring and Mitigating Social Engineering Software Download Attacks. USENIX Security Symposium, 2016. Acceptance rate 15.6% = 72/463) [ pdf. Babak Rahbarinia, Marco Balduzzi. Acceptance rate for full papers:.
roberto.perdisci.com
Code and Data - Roberto Perdisci
http://roberto.perdisci.com/code-and-data
Lightweight Platform-Agnostic Forensic Engine for Web Browsers. Behavior-based Malware Download Detection. Forensic Reconstruction of User-Browser Interactions. Peer-to-Peer Network Traffic Data. Contact us for access to P2P Botnet traces). Classification of Packed Executables. Java implementation of BIRCH clustering algorithm.
perdisci.com
Code and Data - Roberto Perdisci
http://www.perdisci.com/code-and-data
Lightweight Platform-Agnostic Forensic Engine for Web Browsers. Behavior-based Malware Download Detection. Forensic Reconstruction of User-Browser Interactions. Peer-to-Peer Network Traffic Data. Contact us for access to P2P Botnet traces). Classification of Packed Executables. Java implementation of BIRCH clustering algorithm.