479 results on '"Troìa, A"'
Search Results
2. Feature Analysis of Encrypted Malicious Traffic
- Author
-
Shekhawat, Anish Singh, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
In recent years there has been a dramatic increase in the number of malware attacks that use encrypted HTTP traffic for self-propagation or communication. Antivirus software and firewalls typically will not have access to encryption keys, and therefore direct detection of malicious encrypted data is unlikely to succeed. However, previous work has shown that traffic analysis can provide indications of malicious intent, even in cases where the underlying data remains encrypted. In this paper, we apply three machine learning techniques to the problem of distinguishing malicious encrypted HTTP traffic from benign encrypted traffic and obtain results comparable to previous work. We then consider the problem of feature analysis in some detail. Previous work has often relied on human expertise to determine the most useful and informative features in this problem domain. We demonstrate that such feature-related information can be obtained directly from machine learning models themselves. We argue that such a machine learning based approach to feature analysis is preferable, as it is more reliable, and we can, for example, uncover relatively unintuitive interactions between features.
- Published
- 2023
3. Advancement on Security Applications of Private Intersection Sum Protocol
- Author
-
Raghuvir, Yuvaraj Athur, Govindarajan, Senthil, Vijayakumar, Sanjeevi, Yadlapalli, Pradeep, and Di Troia, Fabio
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Networking and Internet Architecture - Abstract
Secure computation protocols combine inputs from involved parties to generate an output while keeping their inputs private. Private Set Intersection (PSI) is a secure computation protocol that allows two parties, who each hold a set of items, to learn the intersection of their sets without revealing anything else about the items. Private Intersection Sum (PIS) extends PSI when the two parties want to learn the cardinality of the intersection, as well as the sum of the associated integer values for each identifier in the intersection, but nothing more. Finally, Private Join and Compute (PJC) is a scalable extension of PIS protocol to help organizations work together with confidential data sets. The extensions proposed in this paper include: (a) extending PJC protocol to additional data columns and applying columnar aggregation based on supported homomorphic operations, (b) exploring Ring Learning with Errors (RLWE) homomorphic encryption schemes to apply arithmetic operations such as sum and sum of squares, (c) ensuring stronger security using mutual authentication of communicating parties using certificates, and (d) developing a Website to operationalize such a service offering. We applied our results to develop a Proof-of-Concept solution called JingBing, a voter list validation service that allows different states to register, acquire secure communication modules, install it, and then conduct authenticated peer-to-peer communication. We conclude our paper with directions for future research to make such a solution scalable for practical real-life scenarios., Comment: 15 pages, 2 figures, conference proceeding
- Published
- 2023
4. Hidden Markov Models with Random Restarts vs Boosting for Malware Detection
- Author
-
Raghavan, Aditya, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Effective and efficient malware detection is at the forefront of research into building secure digital systems. As with many other fields, malware detection research has seen a dramatic increase in the application of machine learning algorithms. One machine learning technique that has been used widely in the field of pattern matching in general-and malware detection in particular-is hidden Markov models (HMMs). HMM training is based on a hill climb, and hence we can often improve a model by training multiple times with different initial values. In this research, we compare boosted HMMs (using AdaBoost) to HMMs trained with multiple random restarts, in the context of malware detection. These techniques are applied to a variety of challenging malware datasets. We find that random restarts perform surprisingly well in comparison to boosting. Only in the most difficult "cold start" cases (where training data is severely limited) does boosting appear to offer sufficient improvement to justify its higher computational cost in the scoring phase.
- Published
- 2023
5. Creating Valid Adversarial Examples of Malware
- Author
-
Kozák, Matouš, Jureček, Martin, Stamp, Mark, and Di Troia, Fabio
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence - Abstract
Machine learning is becoming increasingly popular as a go-to approach for many tasks due to its world-class results. As a result, antivirus developers are incorporating machine learning models into their products. While these models improve malware detection capabilities, they also carry the disadvantage of being susceptible to adversarial attacks. Although this vulnerability has been demonstrated for many models in white-box settings, a black-box attack is more applicable in practice for the domain of malware detection. We present a generator of adversarial malware examples using reinforcement learning algorithms. The reinforcement learning agents utilize a set of functionality-preserving modifications, thus creating valid adversarial examples. Using the proximal policy optimization (PPO) algorithm, we achieved an evasion rate of 53.84% against the gradient-boosted decision tree (GBDT) model. The PPO agent previously trained against the GBDT classifier scored an evasion rate of 11.41% against the neural network-based classifier MalConv and an average evasion rate of 2.31% against top antivirus programs. Furthermore, we discovered that random application of our functionality-preserving portable executable modifications successfully evades leading antivirus engines, with an average evasion rate of 11.65%. These findings indicate that machine learning-based models used in malware detection systems are vulnerable to adversarial attacks and that better safeguards need to be taken to protect these systems., Comment: 19 pages, 4 figures
- Published
- 2023
- Full Text
- View/download PDF
6. Methylprednisolone alone or combined with cyclosporine or mycophenolate mofetil for the treatment of immune‐mediated hemolytic anemia in dogs, a prospective study
- Author
-
Chiara Agnoli, Michele Tumbarello, Kateryna Vasylyeva, Carola S. Selva Coddè, Erika Monari, Marta Gruarin, Roberta Troìa, and Francesco Dondi
- Subjects
dog ,glucocorticoids ,hematological response ,IMHA ,immunosuppression ,therapy ,Veterinary medicine ,SF600-1100 - Abstract
Abstract Background Benefit of adding a second‐line immunosuppressive drug to glucocorticoids for the treatment of non‐associative immune‐mediated hemolytic anemia (naIMHA) in dogs has not been defined prospectively. Hypothesis/Objectives Evaluate the effectiveness of different immunosuppressive protocols in naIMHA dogs. Animals Forty‐three client‐owned dogs. Methods Open label, randomized, clinical trial. Dogs were treated with methylprednisolone (M‐group), methylprednisolone plus cyclosporine (MC‐group) or methylprednisolone plus mycophenolate mofetil (MM‐group). Dogs were defined as responders by disappearance of signs of immune‐mediated destruction and hematocrit stabilization. Frequency of responders was compared between M‐group and combined protocols (MC and MM‐group evaluated together), and among the 3 different therapeutic groups at 14 (T14), 30 (T30), 60 (T60) days after admission. Frequency of complications, length of hospitalization and relapse were also compared. Death rate was evaluated at discharge, T60 and 365 (T365) days. Results Proportion of responders was not significantly different between M‐group and combined protocols (MC and MM‐groups), nor among the 3 therapeutic groups at T14, T30, and T60 (P > .17). Frequency of relapse, complications, and length of hospitalization were not significantly different between M‐group and dogs treated with combined protocols, nor among the 3 treatment groups (P > .22). Death was significantly more common only for MM‐group compared with MC‐group at T60 (+42.8%; 95% CI: 11.5–67.4; P = .009), and at T365 (+50%; 95% CI: 17.5–73.2; P = .003). Conclusions and Clinical Importance Combined immunosuppressive therapy did not improve hematological response in naIMHA.
- Published
- 2024
- Full Text
- View/download PDF
7. Classification and Online Clustering of Zero-Day Malware
- Author
-
Jurečková, Olha, Jureček, Martin, Stamp, Mark, Di Troia, Fabio, and Lórencz, Róbert
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
A large amount of new malware is constantly being generated, which must not only be distinguished from benign samples, but also classified into malware families. For this purpose, investigating how existing malware families are developed and examining emerging families need to be explored. This paper focuses on the online processing of incoming malicious samples to assign them to existing families or, in the case of samples from new families, to cluster them. We experimented with seven prevalent malware families from the EMBER dataset, four in the training set and three additional new families in the test set. Based on the classification score of the multilayer perceptron, we determined which samples would be classified and which would be clustered into new malware families. We classified 97.21% of streaming data with a balanced accuracy of 95.33%. Then, we clustered the remaining data using a self-organizing map, achieving a purity from 47.61% for four clusters to 77.68% for ten clusters. These results indicate that our approach has the potential to be applied to the classification and clustering of zero-day malware into malware families.
- Published
- 2023
8. Experimental Demonstration of ML-Based DWDM System Margin Estimation
- Author
-
Müller, Jasper, Slyne, Frank, Kaeval, Kaida, Troia, Sebastian, Fehenberger, Tobias, Elbers, Jörg-Peter, Kilper, Daniel C., Ruffini, Marco, and Mas-Machuca, Carmen
- Subjects
Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
SNR margins between partially and fully loaded DWDM systems are estimated without detailed knowledge of the network. The ML model, trained on simulation data, achieves accurate predictions on experimental data with an RMSE of 0.16 dB., Comment: This work has been partially funded by the German Federal Ministry of Education and Research in the CELTIC-NEXT project AI-NET-PROTECT (#16KIS1279K) and in the programme of "Souver\"an. Digital. Vernetzt." joint project 6G-life (#16KISK002). Work was also funded by Science Foundation Ireland projects OpenIreland (18/RI/5721) and 13/RC/2077 p2
- Published
- 2023
9. Employing Channel Probing to Derive End-of-Life Service Margins for Optical Spectrum Services. To appear in OPTICA Journal of Optical Communications and Networking
- Author
-
Kaeval, K., Slyne, F., Troia, S., Kenny, E., Große, K., Griesser, H., Kilper, D. C., Ruffini, M., Pedreno-Manresa, J-J, Patri, S. K., and Jervan, G.
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Optical Spectrum as a Service (OSaaS) spanning over multiple transparent optical network domains, can significantly reduce the investment and operational costs of the end-to-end service. Based on the black-link approach, these services are empowered by reconfigurable transceivers and the emerging disaggregation trend in optical transport networks. This work investigates the accuracy aspects of the channel probing method used in Generalized Signal to Noise Ratio (GSNR)-based OSaaS characterization in terrestrial brownfield systems. OSaaS service margins to accommodate impacts from enabling neighboring channels and end-of-life channel loads are experimentally derived in a systematic lab study carried out in the Open Ireland testbed. The applicability of the lab-derived margins is then verified in the HEAnet production network using a 400 GHz wide OSaaS. Finally, the probing accuracy is tested by depleting the GSNR margin through power adjustments utilizing the same 400 GHz OSaaS in the HEAnet live network. A minimum of 0.92 dB and 1.46 dB of service margin allocation is recommended to accommodate the impacts of enabling neighboring channels and end-of-life channel loads. Further 0.6 dB of GSNR margin should be allocated to compensate for probing inaccuracies.
- Published
- 2023
10. Tolypella hispanica
- Author
-
Troia, Angelo, Becker, Ralf, Rodrigo, Maria A., Schubert, Hendrik, editor, Blindow, Irmgard, editor, Nat, Emile, editor, Korsch, Heiko, editor, Gregor, Thomas, editor, Denys, Luc, editor, Stewart, Nick, editor, van de Weyer, Klaus, editor, Romanov, Roman, editor, and Casanova, Michelle T., editor
- Published
- 2024
- Full Text
- View/download PDF
11. Tolypella glomerata
- Author
-
Troia, Angelo, van de Weyer, Klaus, Schubert, Hendrik, editor, Blindow, Irmgard, editor, Nat, Emile, editor, Korsch, Heiko, editor, Gregor, Thomas, editor, Denys, Luc, editor, Stewart, Nick, editor, van de Weyer, Klaus, editor, Romanov, Roman, editor, and Casanova, Michelle T., editor
- Published
- 2024
- Full Text
- View/download PDF
12. Multifamily Malware Models
- Author
-
Basole, Samanvitha, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
When training a machine learning model, there is likely to be a tradeoff between accuracy and the diversity of the dataset. Previous research has shown that if we train a model to detect one specific malware family, we generally obtain stronger results as compared to a case where we train a single model on multiple diverse families. However, during the detection phase, it would be more efficient to have a single model that can reliably detect multiple families, rather than having to score each sample against multiple models. In this research, we conduct experiments based on byte $n$-gram features to quantify the relationship between the generality of the training dataset and the accuracy of the corresponding machine learning models, all within the context of the malware detection problem. We find that neighborhood-based algorithms generalize surprisingly well, far outperforming the other machine learning techniques considered.
- Published
- 2022
13. Generative Adversarial Networks and Image-Based Malware Classification
- Author
-
Nguyen, Huy, Di Troia, Fabio, Ishigaki, Genya, and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using various approaches. We then focus on Generative Adversarial Networks (GAN) for multiclass classification and compare our GAN results to other popular machine learning techniques, including Support Vector Machine (SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the AC-GAN discriminator is generally competitive with other machine learning techniques. We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection. While AC-GAN generated images are visually impressive, we find that they are easily distinguished from real malware images using any of several learning techniques. This result indicates that our GAN generated images would be of little value in adversarial attacks.
- Published
- 2022
14. Hidden Markov Models with Momentum
- Author
-
Miller, Andrew, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Machine Learning - Abstract
Momentum is a popular technique for improving convergence rates during gradient descent. In this research, we experiment with adding momentum to the Baum-Welch expectation-maximization algorithm for training Hidden Markov Models. We compare discrete Hidden Markov Models trained with and without momentum on English text and malware opcode data. The effectiveness of momentum is determined by measuring the changes in model score and classification accuracy due to momentum. Our extensive experiments indicate that adding momentum to Baum-Welch can reduce the number of iterations required for initial convergence during HMM training, particularly in cases where the model is slow to converge. However, momentum does not seem to improve the final model performance at a high number of iterations.
- Published
- 2022
15. Mapping habitat suitability of invasive crayfish in aridland riverscapes: Virile crayfish (Faxonius virilis) in the Lower Colorado River Basin, USA
- Author
-
Troia, Matthew J., Javiya, Anthony V., Doss, Regan N., Melzow, Steven A., and Smith, Jennifer A.
- Published
- 2024
- Full Text
- View/download PDF
16. Convolutional Neural Networks for Image Spam Detection
- Author
-
Sharmin, Tazmina, Di Troia, Fabio, Potika, Katerina, and Stamp, Mark
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Spam can be defined as unsolicited bulk email. In an effort to evade text-based filters, spammers sometimes embed spam text in an image, which is referred to as image spam. In this research, we consider the problem of image spam detection, based on image analysis. We apply convolutional neural networks (CNN) to this problem, we compare the results obtained using CNNs to other machine learning techniques, and we compare our results to previous related work. We consider both real-world image spam and challenging image spam-like datasets. Our results improve on previous work by employing CNNs based on a novel feature set consisting of a combination of the raw image and Canny edges.
- Published
- 2022
17. A Comparison of Static, Dynamic, and Hybrid Analysis for Malware Detection
- Author
-
Damodaran, Anusha, Di Troia, Fabio, Corrado, Visaggio Aaron, Austin, Thomas H., and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
In this research, we compare malware detection techniques based on static, dynamic, and hybrid analysis. Specifically, we train Hidden Markov Models (HMMs ) on both static and dynamic feature sets and compare the resulting detection rates over a substantial number of malware families. We also consider hybrid cases, where dynamic analysis is used in the training phase, with static techniques used in the detection phase, and vice versa. In our experiments, a fully dynamic approach generally yields the best detection rates. We discuss the implications of this research for malware detection based on hybrid techniques.
- Published
- 2022
- Full Text
- View/download PDF
18. Hysteroscopy in the new media: quality and reliability analysis of hysteroscopy procedures on YouTube™
- Author
-
Libretti, Alessandro, Vitale, Salvatore Giovanni, Saponara, Stefania, Corsini, Christian, Aquino, Carmen Imma, Savasta, Federica, Tizzoni, Eleonora, Troìa, Libera, Surico, Daniela, Angioni, Stefano, and Remorgida, Valentino
- Published
- 2023
- Full Text
- View/download PDF
19. 'To Be or Not to Be' a Conscientious Objector to Voluntary Abortion: An Italian Web-Survey of Healthcare Workers
- Author
-
Carmen Imma Aquino, Libera Troìa, Maurizio Guida, and Daniela Surico
- Subjects
abortion ,interruption of pregnancy ,family planning ,Medicine (General) ,R5-920 - Abstract
Background and Objectives: Conscientious objection to voluntary abortion remains a hot debate topic. This could affect the accessibility to pregnancy termination. Our aim is to evaluate the possible aspects related to an operators’ choice about objection for voluntary abortion, such as the following: the abolition of the time limit, the instruction of a multi-collegiate commission, the introduction of pharmacological rather than surgical procedures, the fetal/maternal illness and the case of sexual violence. Materials and Methods: This is an observational, descriptive study that involves a cohort of Italian healthcare workers who answered a web-survey. Results: Of the total 352 respondents, only 20.8% affirmed to be objectors versus 79.2% of non-objectors. For the objectors, 72.2% declared that they would not change status in case of pharmacological abortion; 79.7% would not suspend their choice for interruption in the second trimester; 63.3% would suspend the objection with a multi-collegiate commission, and 69.0% would discontinue their objection in the case of sexual violence. 72.0% of the total participants declared that the abolition of the time limit could have a resecuring impact on women’s choice. Conclusions: Most operators declared that the abolition of the time limit could have beneficial effects. Among the objectors, the status would change especially with the introduction of a multi-collegiate commission, and in case of serious maternal/fetal illness and/or sexual violence.
- Published
- 2024
- Full Text
- View/download PDF
20. Analysis of the nonlinear dynamics of a chirping-frequency Alfv\'en mode in a Tokamak equilibrium
- Author
-
Wang, Xin, Briguglio, Sergio, Di Troia, Claudio, Falessi, Matteo, Fogaccia, Giuliana, Fusco, Valeria, Vlad, Gregorio, and Zonca, Fulvio
- Subjects
Physics - Plasma Physics - Abstract
Chirping Alfv\'{e}n modes are considered as potentially harmful in burning Tokamak plasmas. In this paper, the nonlinear evolution of a single-toroidal-number chirping mode is analysed by numerical particle simulation. This analysis can be simplified if the different resonant phase-space structures can be investigated as isolated ones. This can be done adopting a coordinate system that includes two constants of motion. In our simulations, we adopt as constants of motion, the magnetic momentum and the initial particle coordinates. For each resonant structure, a density-flattening region is formed around the respective resonance radius, with radial width that increases as the mode amplitude grows. It is delimited by two large negative density gradients, drifting inward and outward. With constant mode frequency, this density flattening would be responsible for the exhausting of the drive when large negative density gradients leave the resonance region. The frequency chirping, however, causes the resonance radius and the resonance region to drift inward. This drift delays the moment in which the inner density gradient reaches the inner boundary of the resonance region. On the other side, the island reconstitutes around the new resonance radius; as a consequence, the large negative density gradient further moves inward. This process continues as long as it allows to keep the large gradient within the resonance region. When this is no longer possible, the resonant structure ceases to be effective in driving the mode. To further grow, the mode has to tap a different resonant structure, possibly making use of additional frequency variations., Comment: 49 pages, 33 figures
- Published
- 2021
- Full Text
- View/download PDF
21. Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication
- Author
-
Huang, Elliu, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Gesture-based authentication has emerged as a non-intrusive, effective means of authenticating users on mobile devices. Typically, such authentication techniques have relied on classical machine learning techniques, but recently, deep learning techniques have been applied this problem. Although prior research has shown that deep learning models are vulnerable to adversarial attacks, relatively little research has been done in the adversarial domain for behavioral biometrics. In this research, we collect tri-axial accelerometer gesture data (TAGD) from 46 users and perform classification experiments with both classical machine learning and deep learning models. Specifically, we train and test support vector machines (SVM) and convolutional neural networks (CNN). We then consider a realistic adversarial attack, where we assume the attacker has access to real users' TAGD data, but not the authentication model. We use a deep convolutional generative adversarial network (DC-GAN) to create adversarial samples, and we show that our deep learning model is surprisingly robust to such an attack scenario.
- Published
- 2021
22. In vivo micro-computed tomography evaluation of radiopaque, polymeric device degradation in normal and inflammatory environments
- Author
-
Pawelec, Kendell M., Hix, Jeremy M.L., Troia, Arianna, MacRenaris, Keith W., Kiupel, Matti, and Shapiro, Erik M.
- Published
- 2024
- Full Text
- View/download PDF
23. Black-box optimization for anticipated baseband-function placement in 5G networks
- Author
-
Zorello, Ligia Maria Moreira, Bliek, Laurens, Troia, Sebastian, Maier, Guido, and Verwer, Sicco
- Published
- 2024
- Full Text
- View/download PDF
24. Association between echocardiographic indexes and urinary Neutrophil Gelatinase-Associated Lipocalin (uNGAL) in dogs with myxomatous mitral valve disease
- Author
-
Crosara, Serena, Fidanzio, Francesca, Oricco, Stefano, Dondi, Francesco, Mazzoldi, Chiara, Monari, Erika, Romito, Giovanni, Sabetti, Maria Chiara, Troìa, Roberta, and Quintavalla, Cecilia
- Published
- 2024
- Full Text
- View/download PDF
25. Clickbait Detection in YouTube Videos
- Author
-
Gothankar, Ruchira, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Machine Learning ,Computer Science - Computer Vision and Pattern Recognition - Abstract
YouTube videos often include captivating descriptions and intriguing thumbnails designed to increase the number of views, and thereby increase the revenue for the person who posted the video. This creates an incentive for people to post clickbait videos, in which the content might deviate significantly from the title, description, or thumbnail. In effect, users are tricked into clicking on clickbait videos. In this research, we consider the challenging problem of detecting clickbait YouTube videos. We experiment with multiple state-of-the-art machine learning techniques using a variety of textual features.
- Published
- 2021
26. Sentiment Analysis for Troll Detection on Weibo
- Author
-
Jiang, Zidong, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Computers and Society ,Computer Science - Machine Learning - Abstract
The impact of social media on the modern world is difficult to overstate. Virtually all companies and public figures have social media accounts on popular platforms such as Twitter and Facebook. In China, the micro-blogging service provider, Sina Weibo, is the most popular such service. To influence public opinion, Weibo trolls -- the so called Water Army -- can be hired to post deceptive comments. In this paper, we focus on troll detection via sentiment analysis and other user activity data on the Sina Weibo platform. We implement techniques for Chinese sentence segmentation, word embedding, and sentiment score calculation. In recent years, troll detection and sentiment analysis have been studied, but we are not aware of previous research that considers troll detection based on sentiment analysis. We employ the resulting techniques to develop and test a sentiment analysis approach for troll detection, based on a variety of machine learning strategies. Experimental results are generated and analyzed. A Chrome extension is presented that implements our proposed technique, which enables real-time troll detection when a user browses Sina Weibo.
- Published
- 2021
27. Malware Classification Using Long Short-Term Memory Models
- Author
-
Dang, Dennis, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Signature and anomaly based techniques are the quintessential approaches to malware detection. However, these techniques have become increasingly ineffective as malware has become more sophisticated and complex. Researchers have therefore turned to deep learning to construct better performing model. In this paper, we create four different long-short term memory (LSTM) based models and train each to classify malware samples from 20 families. Our features consist of opcodes extracted from malware executables. We employ techniques used in natural language processing (NLP), including word embedding and bidirection LSTMs (biLSTM), and we also use convolutional neural networks (CNN). We find that a model consisting of word embedding, biLSTMs, and CNN layers performs best in our malware classification experiments.
- Published
- 2021
28. Malware Classification with Word Embedding Features
- Author
-
Kale, Aparna Sunil, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
Malware classification is an important and challenging problem in information security. Modern malware classification techniques rely on machine learning models that can be trained on features such as opcode sequences, API calls, and byte $n$-grams, among many others. In this research, we consider opcode features. We implement hybrid machine learning techniques, where we engineer feature vectors by training hidden Markov models -- a technique that we refer to as HMM2Vec -- and Word2Vec embeddings on these opcode sequences. The resulting HMM2Vec and Word2Vec embedding vectors are then used as features for classification algorithms. Specifically, we consider support vector machine (SVM), $k$-nearest neighbor ($k$-NN), random forest (RF), and convolutional neural network (CNN) classifiers. We conduct substantial experiments over a variety of malware families. Our experiments extend well beyond any previous work in this field.
- Published
- 2021
29. Aberrant Number of Vessels in the Umbilical Cord: What Do We Know?
- Author
-
Valentino Remorgida, Anthony Nicosia, Livio Leo, Libera Troìa, and Alessandro Libretti
- Subjects
umbilical cord ,supernumerary vessels ,single umbilical artery ,chromosomal abnormalities ,fetal malformations ,Science - Abstract
The umbilical cord, comprising three vital blood vessels, serves as the lifeline between mother and fetus. Prenatal care emphasizes detailed ultrasound examinations of the umbilical cord and postnatal inspections of the placenta and cord to preemptively address potential complications. Studies have consistently shown a significant link between a single umbilical artery and unfavorable perinatal consequences, such as mortality and congenital abnormalities. Conversely, the impact of additional vessels remains uncertain. This review is dedicated to enhancing our understanding and refining diagnostic and therapeutic approaches in prenatal healthcare. The objective is to identify knowledge gaps and propose evidence-based solutions to improve care for pregnant women and their unborn babies. The presence of a single umbilical artery in prenatal diagnosis may signify potential risks for fetal anomalies and adverse pregnancy outcomes such as hemodynamic instability, ischemia, and an increased likelihood of intrauterine growth restriction. Additionally, even the presence of supernumerary vessels may be associated with fetal malformations. Serial fetal evaluations are recommended for detecting anomalies and monitoring fetal growth throughout pregnancy. Despite the generally benign nature of isolated SUA and supernumerary vessels, close monitoring and comprehensive prenatal care are essential to ensuring optimal outcomes for both mother and baby.
- Published
- 2024
- Full Text
- View/download PDF
30. Exploring the Father’s Role in Determining Neonatal Birth Weight: A Narrative Review
- Author
-
Alessandro Libretti, Federica Savasta, Anthony Nicosia, Christian Corsini, Alberto De Pedrini, Livio Leo, Antonio Simone Laganà, Libera Troìa, Miriam Dellino, Raffaele Tinelli, Felice Sorrentino, and Valentino Remorgida
- Subjects
anthropometry ,birthweight ,paternal influence on birthweight ,Medicine (General) ,R5-920 - Abstract
Birth weight, which exhibits variability across different populations, is influenced by a mix of genetic, environmental, and dietary factors originating from both the mother and father. Maternal characteristics, including age, socioeconomic status, prior pregnancies, weight, height, and weight increase throughout pregnancy, have a substantial influence on fetal growth and the health of the infant. On the other hand, the influence of paternal characteristics on the weight of newborns is still not fully comprehended in a consistent manner. Birth weight is an important factor that can help predict various maternal complications, such as the probability of having a C-section, experiencing postpartum hemorrhage or infections. It can also indicate future health challenges like asthma, cognitive impairment, and chronic diseases such as hypertension and diabetes. Nineteen publications were found through a thorough search of the Medline, PubMed, and Scopus databases, which provide insights into how paternal variables contribute to variations in birth weight. Significantly, the age of the father was found to be associated with higher chances of preterm birth and having a smaller size for gestational age in premature infants, while full-term children were more likely to have a larger size for gestational age. In addition, there is a constant correlation between the height of the father and the birth weight of the child. Taller dads are more likely to have babies with a higher birth weight and a lower likelihood of being small for gestational age (SGA). Although there were some discrepancies in the data about the weight and BMI of fathers, it was found that the height of fathers played a significant role in determining the size of the fetus and the weight of the newborn. While there may be differences in the conducted studies, these findings provide valuable insights into the complex connection between parental characteristics and fetal development. This data can be utilized to enhance clinical treatment strategies and enhance our comprehension of outcomes for neonates. Further homogeneous investigations are required to conclusively validate and build upon these findings.
- Published
- 2024
- Full Text
- View/download PDF
31. New-onset organ dysfunction as a screening tool for the identification of sepsis and outcome prediction in dogs with systemic inflammation
- Author
-
Elena Ciuffoli, Roberta Troìa, Cecilia Bulgarelli, Alessandra Pontiero, Francesca Buzzurra, and Massimo Giunti
- Subjects
canine ,base excess ,stupor ,coma ,acute kidney injury ,hemostatic dysfunction ,Veterinary medicine ,SF600-1100 - Abstract
IntroductionSepsis in people is defined as a life-threatening organ dysfunction (OD) caused by a dysregulated host response to infection. In veterinary medicine, sepsis is still defined by the presence of systemic inflammation plus the evidence of infection. Based on recent veterinary studies, multiorgan dysfunction syndrome (MODS) has been associated with a worse outcome in sepsis. Thus, the screening for OD is warranted to identify the most critically ill patients. The aim of this study was to investigate the diagnostic value of new-onset OD for the prediction of sepsis and outcome in a population of critically ill dogs with systemic inflammation.Materials and methodsDogs admitted to the Emergency Room and/or the Intensive Care Unit with systemic inflammation, defined by a serum C-reactive protein concentration > 1.6 mg/dL, were retrospectively included. Enrolled dogs were categorized according to the presence of sepsis or non-infectious systemic inflammation. The presence of newly diagnosed OD was assessed based on criteria adapted from human literature and previously reported canine criteria.Results275 dogs were included: 128 had sepsis and 147 had non-infectious systemic inflammation. The frequency of new-onset OD was not different between these groups. Only the presence of fluid-refractory hypotension was significantly associated with a diagnosis of sepsis (OR 10.51, 3.08–35.94; p
- Published
- 2024
- Full Text
- View/download PDF
32. Relations Among Teachers’ Efficacy Beliefs, Knowledge, Preparation, Abilities, and Practices: Expanding Our Understanding of Teacher Characteristics That Impact Writing Instruction
- Author
-
Troia, Gary A., Joshi, R. Malatesha, Series Editor, Alves, Rui, Editorial Board Member, Ehri, Linnea, Editorial Board Member, Goswami, Usha, Editorial Board Member, McBride, Catherine, Editorial Board Member, Treiman, Rebecca, Editorial Board Member, Liu, Xinghua, editor, Hebert, Michael, editor, and Alves, Rui A., editor
- Published
- 2023
- Full Text
- View/download PDF
33. BERT for Malware Classification
- Author
-
Alvares, Joel, Troia, Fabio Di, Jajodia, Sushil, Series Editor, Stamp, Mark, editor, Aaron Visaggio, Corrado, editor, Mercaldo, Francesco, editor, and Di Troia, Fabio, editor
- Published
- 2022
- Full Text
- View/download PDF
34. Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication
- Author
-
Huang, Elliu, Troia, Fabio Di, Stamp, Mark, Jajodia, Sushil, Series Editor, Stamp, Mark, editor, Aaron Visaggio, Corrado, editor, Mercaldo, Francesco, editor, and Di Troia, Fabio, editor
- Published
- 2022
- Full Text
- View/download PDF
35. Clickbait Detection for YouTube Videos
- Author
-
Gothankar, Ruchira, Troia, Fabio Di, Stamp, Mark, Jajodia, Sushil, Series Editor, Stamp, Mark, editor, Aaron Visaggio, Corrado, editor, Mercaldo, Francesco, editor, and Di Troia, Fabio, editor
- Published
- 2022
- Full Text
- View/download PDF
36. Detecting Botnets Through Deep Learning and Network Flow Analysis
- Author
-
Lee, Ji An, Troia, Fabio Di, Jajodia, Sushil, Series Editor, Stamp, Mark, editor, Aaron Visaggio, Corrado, editor, Mercaldo, Francesco, editor, and Di Troia, Fabio, editor
- Published
- 2022
- Full Text
- View/download PDF
37. Fake Malware Generation Using HMM and GAN
- Author
-
Trehan, Harshit, Di Troia, Fabio, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Chang, Sang-Yoon, editor, Bathen, Luis, editor, Di Troia, Fabio, editor, Austin, Thomas H., editor, and Nelson, Alex J., editor
- Published
- 2022
- Full Text
- View/download PDF
38. Menopausal Hormone Therapy, an Ever-Present Topic: A Pilot Survey about Women’s Experience and Medical Doctors’ Approach
- Author
-
Carmen Imma Aquino, Viviana Stampini, Elena Osella, Libera Troìa, Clarissa Rocca, Maurizio Guida, Fabrizio Faggiano, Valentino Remorgida, and Daniela Surico
- Subjects
menopause ,hormone replacement treatment ,endocrine and vasomotor disturbances ,Medicine (General) ,R5-920 - Abstract
Background and Objective: Menopause can be associated with many clinical manifestations: vasomotor symptoms, urogenital problems, and additional psychological disturbances, such as anxiety, mood changes, and sleep alterations. The prolonged lack of hormones also increases the risk of long-term consequences. Hormone Replacement Treatment (HRT) in menopause consists of the administration of estrogen, alone or associated to progesterone, to relieve these uncomfortable disturbances and to prevent the onset of other pathologic conditions. The aim of this study is to examine the prevalence of HRT use in a sample of menopausal women and their experience with menopause and HRT. This study also investigates the knowledge of general practitioners (GPs) and gynecologists about HRT and its prescription. Materials and Methods: We conducted a cross-sectional population survey on 126 women of 50–59 years in an industrial city in the North of Italy, Vercelli (Novara), in Eastern Piedmont. We also presented a questionnaire on the topic to 54 medical doctors (GPs and gynecologists) of the same area. Results: The prevalence of HRT use in our sample was 11.9%. In total, a good percentage of the users affirmed to be satisfied with HRT. Additionally, a minority of women reported being ideally against the use of replacement hormones, were advised against using HRT by doctors, and did not use it because of the fear of side effects. We found a positive association between patient education, health care attitude, and HRT usage. A significant number of women knew about HRT from the media, and most of them were not informed by a health professional. Despite this, the interviewed doctors considered their knowledge about HRT as ‘good’ and would recommend HRT: only 5.6% would not prescribe it. Conclusions: Our results highlight the need for information about HRT among patients and health professionals, along with the need for more effective communication, evaluation, and suggestion of treatment.
- Published
- 2024
- Full Text
- View/download PDF
39. Performance characterization and profiling of chained CPU-bound Virtual Network Functions
- Author
-
Troia, Sebastian, Savi, Marco, Nava, Giulia, Zorello, Ligia Maria Moreira, Schneider, Thomas, and Maier, Guido
- Published
- 2023
- Full Text
- View/download PDF
40. Piezo/sono-catalytic activity of ZnO micro/nanoparticles for ROS generation as function of ultrasound frequencies and dissolved gases
- Author
-
Troia, A., Galati, S., Vighetto, V., and Cauda, V.
- Published
- 2023
- Full Text
- View/download PDF
41. A twin pregnancy with partial hydatidiform mole and a coexisting normal fetus delivered at term: A case report and literature review
- Author
-
Alessandro Libretti, Daniela Longo, Stefano Faiola, Alberto De Pedrini, Libera Troìa, and Valentino Remorgida
- Subjects
Hydatiform mole ,Partial mole ,Living fetus ,Case report ,Surgery ,RD1-811 ,Gynecology and obstetrics ,RG1-991 - Abstract
Hydatiform mole occurs in 1/1000 singleton and 1/20000–100,000 twin pregnancies. Although the pregnancy often ends in a miscarriage or presents with many obstetric complications such as preeclampsia, vaginal bleeding, hyperthyroidism, prematurity, or fetal malformations, in some cases of twin pregnancy, one of the fetuses can develop normally. Coexistence of a viable fetus in a twin molar pregnancy is more commonly described for cases of complete hydatiform moles than partial hydatiform moles. A partial hydatiform mole coexisting with a normal fetus was suspected in a 40-year-old woman, G2P1, at twelve weeks of gestation of a twin dichorionic diamniotic pregnancy. Serial antenatal ultrasound scans and serial evaluations of human chorionic gonadotropin were performed, and a healthy baby was delivered at term without any obstetric or neonatal complications.A twin pregnancy with partial hydatidiform mole and a coexisting normal fetus is a rare obstetric condition that can result, under proper management, in the delivery of a healthy baby without any sequelae for the mother or child.
- Published
- 2023
- Full Text
- View/download PDF
42. A Comparative Analysis of Android Malware
- Author
-
Chavan, Neeraj, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
In this paper, we present a comparative analysis of benign and malicious Android applications, based on static features. In particular, we focus our attention on the permissions requested by an application. We consider both binary classification of malware versus benign, as well as the multiclass problem, where we classify malware samples into their respective families. Our experiments are based on substantial malware datasets and we employ a wide variety of machine learning techniques, including decision trees and random forests, support vector machines, logistic model trees, AdaBoost, and artificial neural networks. We find that permissions are a strong feature and that by careful feature engineering, we can significantly reduce the number of features needed for highly accurate detection and classification., Comment: 3rd International Workshop on Formal Methods for Security Engineering (ForSE 2019), in conjunction with the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019), Prague, Czech Republic, February 23-25, 2019
- Published
- 2019
43. Transfer Learning for Image-Based Malware Classification
- Author
-
Bhodia, Niket, Prajapati, Pratikkumar, Di Troia, Fabio, and Stamp, Mark
- Subjects
Computer Science - Machine Learning ,Computer Science - Cryptography and Security ,Statistics - Machine Learning - Abstract
In this paper, we consider the problem of malware detection and classification based on image analysis. We convert executable files to images and apply image recognition using deep learning (DL) models. To train these models, we employ transfer learning based on existing DL models that have been pre-trained on massive image datasets. We carry out various experiments with this technique and compare its performance to that of an extremely simple machine learning technique, namely, k-nearest neighbors (\kNN). For our k-NN experiments, we use features extracted directly from executables, rather than image analysis. While our image-based DL technique performs well in the experiments, surprisingly, it is outperformed by k-NN. We show that DL models are better able to generalize the data, in the sense that they outperform k-NN in simulated zero-day experiments., Comment: 3rd International Workshop on Formal Methods for Security Engineering (ForSE 2019), in conjunction with the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019), Prague, Czech Republic, February 23-25, 2019
- Published
- 2019
44. Malware Detection Using Dynamic Birthmarks
- Author
-
Vemparala, Swapna, Di Troia, Fabio, Visaggio, Corrado A., Austin, Thomas H., and Stamp, Mark
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
In this paper, we explore the effectiveness of dynamic analysis techniques for identifying malware, using Hidden Markov Models (HMMs) and Profile Hidden Markov Models (PHMMs), both trained on sequences of API calls. We contrast our results to static analysis using HMMs trained on sequences of opcodes, and show that dynamic analysis achieves significantly stronger results in many cases. Furthermore, in contrasting our two dynamic analysis techniques, we find that using PHMMs consistently outperforms our analysis based on HMMs., Comment: Extended version of conference paper
- Published
- 2019
45. A Latent Markov Approach for Clustering Contracting Authorities over Time Using Public Procurement Red Flags
- Author
-
Del Sarto, Simone, Coppola, Paolo, Troìa, Matteo, Salvati, Nicola, editor, Perna, Cira, editor, Marchetti, Stefano, editor, and Chambers, Raymond, editor
- Published
- 2022
- Full Text
- View/download PDF
46. Word Embeddings for Fake Malware Generation
- Author
-
Tran, Quang Duy, Di Troia, Fabio, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Bathen, Luis, editor, Saldamli, Gokay, editor, Sun, Xiaoyan, editor, Austin, Thomas H., editor, and Nelson, Alex J., editor
- Published
- 2022
- Full Text
- View/download PDF
47. Twitter Bots’ Detection with Benford’s Law and Machine Learning
- Author
-
Bhosale, Sanmesh, Di Troia, Fabio, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Bathen, Luis, editor, Saldamli, Gokay, editor, Sun, Xiaoyan, editor, Austin, Thomas H., editor, and Nelson, Alex J., editor
- Published
- 2022
- Full Text
- View/download PDF
48. A Blockchain-Based Tamper-Resistant Logging Framework
- Author
-
Austin, Thomas H., Di Troia, Fabio, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Bathen, Luis, editor, Saldamli, Gokay, editor, Sun, Xiaoyan, editor, Austin, Thomas H., editor, and Nelson, Alex J., editor
- Published
- 2022
- Full Text
- View/download PDF
49. Robustness of Image-Based Malware Analysis
- Author
-
Tran, Katrina, Di Troia, Fabio, Stamp, Mark, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Bathen, Luis, editor, Saldamli, Gokay, editor, Sun, Xiaoyan, editor, Austin, Thomas H., editor, and Nelson, Alex J., editor
- Published
- 2022
- Full Text
- View/download PDF
50. Advancement on Security Applications of Private Intersection Sum Protocol
- Author
-
Raghuvir, Y. Athur, Govindarajan, S., Vijayakumar, S., Yadlapalli, P., Di Troia, F., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.