Giovanni Vigna
Giovanni Vigna
UC Santa Barbara and Lastline, Inc.
Dirección de correo verificada de cs.ucsb.edu - Página principal
Título
Citado por
Citado por
Año
Understanding code mobility
A Fuggetta, GP Picco, G Vigna
IEEE Transactions on software engineering 24 (5), 342-361, 1998
18031998
Anomaly detection of web-based attacks
C Kruegel, G Vigna
Proceedings of the 10th ACM conference on Computer and communications …, 2003
8392003
Detecting spammers on social networks
G Stringhini, C Kruegel, G Vigna
Proceedings of the 26th annual computer security applications conference, 1-9, 2010
8292010
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
7892009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
7292010
Comprehensive approach to intrusion detection alert correlation
F Valeur, G Vigna, C Kruegel, RA Kemmerer
IEEE Transactions on dependable and secure computing 1 (3), 146-169, 2004
6422004
PiOS: Detecting Privacy Leaks in iOS Applications.
M Egele, C Kruegel, E Kirda, G Vigna
NDSS, 177-183, 2011
6182011
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
P Vogt, F Nentwich, N Jovanovic, E Kirda, C Kruegel, G Vigna
NDSS 2007, 12, 2007
6052007
Intrusion detection: a brief history and overview
RA Kemmerer, G Vigna
Computer 35 (4), supl27-supl30, 2002
5702002
STATL: An attack language for state-based intrusion detection
ST Eckmann, G Vigna, RA Kemmerer
Journal of computer security 10 (1-2), 71-103, 2002
5462002
Polymorphic worm detection using structural information of executables
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 207-226, 2005
5132005
Designing distributed applications with mobile code paradigms
A Carzaniga, GP Picco, G Vigna
Proceedings of the 19th international conference on Software engineering, 22-32, 1997
4891997
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
4842016
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE Symposium on Security and Privacy (SP), 138-157, 2016
4642016
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
4542008
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
4462013
Noxes: a client-side solution for mitigating cross-site scripting attacks
E Kirda, C Kruegel, G Vigna, N Jovanovic
Proceedings of the 2006 ACM symposium on Applied computing, 330-337, 2006
4392006
NetSTAT: A network-based intrusion detection approach
G Vigna, RA Kemmerer
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
4111998
A learning-based approach to the detection of SQL attacks
F Valeur, D Mutz, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2005
4042005
Static disassembly of obfuscated binaries
C Kruegel, W Robertson, F Valeur, G Vigna
USENIX security Symposium 13, 18-18, 2004
4032004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20