A probabilistic logic of cyber deception S Jajodia, N Park, F Pierazzi, A Pugliese, E Serra, GI Simari, ... IEEE Transactions on Information Forensics and Security 12 (11), 2532-2544, 2017 | 68 | 2017 |
Pareto-optimal adversarial defense of enterprise systems E Serra, S Jajodia, A Pugliese, A Rullo, VS Subrahmanian ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-39, 2015 | 62 | 2015 |
V2w-bert: A framework for effective hierarchical multiclass classification of software vulnerabilities SS Das, E Serra, M Halappanavar, A Pothen, E Al-Shaer 2021 IEEE 8th International Conference on Data Science and Advanced …, 2021 | 61 | 2021 |
Extending the power of datalog recursion M Mazuran, E Serra, C Zaniolo The VLDB Journal 22 (4), 471-493, 2013 | 61 | 2013 |
Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums A Shrestha, E Serra, F Spezzano Network Modeling Analysis in Health Informatics and Bioinformatics 9, 1-11, 2020 | 42 | 2020 |
Ensemble models for data-driven prediction of malware infections C Kang, N Park, BA Prakash, E Serra, VS Subrahmanian Proceedings of the Ninth ACM International Conference on Web Search and Data …, 2016 | 42 | 2016 |
Behavior informatics: A new perspective L Cao, T Joachims, C Wang, E Gaussier, J Li, Y Ou, D Luo, R Zafarani, ... IEEE Intelligent Systems 29 (4), 62-80, 2014 | 34 | 2014 |
Pareto optimal security resource allocation for Internet of Things A Rullo, D Midi, E Serra, E Bertino ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-30, 2017 | 31 | 2017 |
APE: A data-driven, behavioral model-based anti-poaching engine N Park, E Serra, T Snitch, VS Subrahmanian IEEE Transactions on Computational Social Systems 2 (2), 15-37, 2015 | 31 | 2015 |
Detecting suspicious entities in offshore leaks networks M Joaristi, E Serra, F Spezzano Social Network Analysis and Mining 9, 1-15, 2019 | 29 | 2019 |
Detecting saturation attacks in sdn via machine learning S Khamaiseh, E Serra, Z Li, D Xu 2019 4th International Conference on Computing, Communications and Security …, 2019 | 29 | 2019 |
An effective approach to inverse frequent set mining A Guzzo, D Sacca, E Serra 2009 Ninth IEEE International Conference on Data Mining, 806-811, 2009 | 29 | 2009 |
Convolutional neural network ensemble fine-tuning for extended transfer learning O Korzh, M Joaristi, E Serra Big Data–BigData 2018: 7th International Congress, Held as Part of the …, 2018 | 28 | 2018 |
Share: A stackelberg honey-based adversarial reasoning engine S Jajodia, N Park, E Serra, VS Subrahmanian ACM Transactions on Internet Technology (TOIT) 18 (3), 1-41, 2018 | 26 | 2018 |
A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models E Serra, VS Subrahmanian IEEE Transactions on Computational Social Systems 1 (1), 66-88, 2014 | 26 | 2014 |
Deeptrust: An automatic framework to detect trustworthy users in opinion-based systems E Serra, A Shrestha, F Spezzano, A Squicciarini Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 23 | 2020 |
vswitchguard: Defending openflow switches against saturation attacks S Khamaiseh, E Serra, D Xu 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 22 | 2020 |
Inferring Bad Entities through the Panama Papers Network M Joaristi, E Serra, F Spezzano | 22 | 2018 |
Identifying att&ck tactics in android malware control flow graph through graph representation learning and interpretability J Fairbanks, A Orbe, C Patterson, J Layne, E Serra, M Scheepers 2021 IEEE International Conference on Big Data (Big Data), 5602-5608, 2021 | 21 | 2021 |
Sir-gn: A fast structural iterative representation learning approach for graph nodes M Joaristi, E Serra ACM Transactions on Knowledge Discovery from Data (TKDD) 15 (6), 1-39, 2021 | 21 | 2021 |