dblp.uni-trier.dewww.dagstuhl.dewww.uni-trier.de

Roberto Perdisci (Selection)

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo


24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLong Lu, Roberto Perdisci, Wenke Lee: SURF: detecting and measuring search poisoning. ACM Conference on Computer and Communications Security 2011: 467-476
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee: Understanding the prevalence and use of alternative plans in malware with network games. ACSAC 2011: 1-10
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang: Exposing invisible timing-based traffic watermarks with BACKLIT. ACSAC 2011: 197-206
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJunjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster: Boosting the scalability of botnet detection using adaptive traffic sampling. ASIACCS 2011: 124-134
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJunjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo: Detecting stealthy P2P botnets using statistical traffic fingerprints. DSN 2011: 121-132
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci: HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. NDSS 2011
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLManos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon: Detecting Malware Domains at the Upper DNS Hierarchy. USENIX Security Symposium 2011
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee: On the Secrecy of Spread-Spectrum Flow Watermarks. ESORICS 2010: 232-248
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Wenke Lee, Nick Feamster: Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. NSDI 2010: 391-404
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLManos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor: A Centralized Monitoring Infrastructure for Improving DNS Security. RAID 2010: 18-37
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLManos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster: Building a Dynamic Reputation System for DNS. USENIX Security Symposium 2010: 273-290
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Igino Corona, David Dagon, Wenke Lee: Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. ACSAC 2009: 311-320
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee: WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. DSN 2009: 3-12
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee: McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53(6): 864-881 (2009)
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Andrea Lanzi, Wenke Lee: McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Andrea Lanzi, Wenke Lee: Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters 29(14): 1941-1946 (2008)
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, Guofei Gu, Wenke Lee: Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31

Selection of 19 from 24 records - Roberto Perdisci has 23 coauthors

Last update 2012-09-10 CET by the DBLP TeamThis material is Open Data Content released under the ODC-BY 1.0 license — See also our legal information page