Edoardo Serra
Edoardo Serra
Dirección de correo verificada de
Citado por
Citado por
A probabilistic logic of cyber deception
S Jajodia, N Park, F Pierazzi, A Pugliese, E Serra, GI Simari, ...
IEEE Transactions on Information Forensics and Security 12 (11), 2532-2544, 2017
Pareto-optimal adversarial defense of enterprise systems
E Serra, S Jajodia, A Pugliese, A Rullo, VS Subrahmanian
ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-39, 2015
Extending the power of datalog recursion
M Mazuran, E Serra, C Zaniolo
The VLDB Journal 22 (4), 471-493, 2013
V2w-bert: A framework for effective hierarchical multiclass classification of software vulnerabilities
SS Das, E Serra, M Halappanavar, A Pothen, E Al-Shaer
2021 IEEE 8th International Conference on Data Science and Advanced …, 2021
Ensemble models for data-driven prediction of malware infections
C Kang, N Park, BA Prakash, E Serra, VS Subrahmanian
Proceedings of the Ninth ACM International Conference on Web Search and Data …, 2016
Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums
A Shrestha, E Serra, F Spezzano
Network Modeling Analysis in Health Informatics and Bioinformatics 9, 1-11, 2020
Behavior informatics: A new perspective
L Cao, T Joachims, C Wang, E Gaussier, J Li, Y Ou, D Luo, R Zafarani, ...
IEEE Intelligent Systems 29 (4), 62-80, 2014
APE: A data-driven, behavioral model-based anti-poaching engine
N Park, E Serra, T Snitch, VS Subrahmanian
IEEE Transactions on Computational Social Systems 2 (2), 15-37, 2015
Detecting saturation attacks in sdn via machine learning
S Khamaiseh, E Serra, Z Li, D Xu
2019 4th International Conference on Computing, Communications and Security …, 2019
Pareto optimal security resource allocation for Internet of Things
A Rullo, D Midi, E Serra, E Bertino
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-30, 2017
An effective approach to inverse frequent set mining
A Guzzo, D Sacca, E Serra
2009 Ninth IEEE International Conference on Data Mining, 806-811, 2009
Detecting suspicious entities in offshore leaks networks
M Joaristi, E Serra, F Spezzano
Social Network Analysis and Mining 9, 1-15, 2019
Convolutional neural network ensemble fine-tuning for extended transfer learning
O Korzh, M Joaristi, E Serra
Big Data–BigData 2018: 7th International Congress, Held as Part of the …, 2018
Share: A stackelberg honey-based adversarial reasoning engine
S Jajodia, N Park, E Serra, VS Subrahmanian
ACM Transactions on Internet Technology (TOIT) 18 (3), 1-41, 2018
A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models
E Serra, VS Subrahmanian
IEEE Transactions on Computational Social Systems 1 (1), 66-88, 2014
Deeptrust: An automatic framework to detect trustworthy users in opinion-based systems
E Serra, A Shrestha, F Spezzano, A Squicciarini
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
Inferring Bad Entities through the Panama Papers Network
M Joaristi, E Serra, F Spezzano
vswitchguard: Defending openflow switches against saturation attacks
S Khamaiseh, E Serra, D Xu
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs
A Guzzo, L Moccia, D Sacca, E Serra
ACM Transactions on Knowledge Discovery from Data (TKDD) 7 (4), 1-39, 2013
Identifying att&ck tactics in android malware control flow graph through graph representation learning and interpretability
J Fairbanks, A Orbe, C Patterson, J Layne, E Serra, M Scheepers
2021 IEEE International Conference on Big Data (Big Data), 5602-5608, 2021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20