Roberto Perdisci
Roberto Perdisci
Professor of Computer Science, University of Georgia
Verified email at - Homepage
Cited by
Cited by
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware
M Antonakakis, R Perdisci, Y Nadji, N Vasiloglou, S Abu-Nimeh, W Lee, ...
21st USENIX Security Symposium (USENIX Security 12), 491-506, 2012
Building a dynamic reputation system for {DNS}
M Antonakakis, R Perdisci, D Dagon, W Lee, N Feamster
19th USENIX Security Symposium (USENIX Security 10), 2010
Behavioral clustering of http-based malware and signature generation using malicious network traces.
R Perdisci, W Lee, N Feamster
NSDI 10, 14, 2010
Method and system for detecting malicious and/or botnet-related domain names
R Perdisci, W Lee
US Patent 10,027,688, 2018
Detecting malware domains at the upper {DNS} hierarchy
M Antonakakis, R Perdisci, W Lee, N Vasiloglou II, D Dagon
20th USENIX Security Symposium (USENIX Security 11), 2011
Polymorphic Blending Attacks.
P Fogla, MI Sharif, R Perdisci, OM Kolesnikov, W Lee
USENIX security symposium, 241-256, 2006
McPAD: A multiple classifier system for accurate payload-based anomaly detection
R Perdisci, D Ariu, P Fogla, G Giacinto, W Lee
Computer networks 53 (6), 864-881, 2009
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
R Perdisci, G Gu, W Lee
Sixth International Conference on Data Mining (ICDM'06), 488-498, 2006
Method and system for detecting DGA-based malware
M Antonakakis, R Perdisci, W Lee, IN Vasiloglou
US Patent 9,922,190, 2018
Misleading worm signature generators using deliberate noise injection
R Perdisci, D Dagon, W Lee, P Fogla, M Sharif
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-31, 2006
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
G Giacinto, R Perdisci, M Del Rio, F Roli
Information Fusion 9 (1), 69-82, 2008
Detecting malicious flux service networks through passive analysis of recursive DNS traces
R Perdisci, I Corona, D Dagon, W Lee
2009 Annual Computer Security Applications Conference, 311-320, 2009
Classification of packed executables for accurate computer virus detection
R Perdisci, A Lanzi, W Lee
Pattern recognition letters 29 (14), 1941-1946, 2008
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
NDSS 11, 2011
Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables
R Perdisci, A Lanzi, W Lee
2008 Annual Computer Security Applications Conference (ACSAC), 301-310, 2008
{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths
T Nelms, R Perdisci, M Antonakakis, M Ahamad
24th USENIX Security Symposium (USENIX Security 15), 1025-1040, 2015
Detecting stealthy P2P botnets using statistical traffic fingerprints
J Zhang, R Perdisci, W Lee, U Sarfraz, X Luo
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
Alarm clustering for intrusion detection systems in computer networks
R Perdisci, G Giacinto, F Roli
Engineering applications of artificial intelligence 19 (4), 429-438, 2006
Early detection of malicious flux networks via large-scale passive DNS traffic analysis
R Perdisci, I Corona, G Giacinto
IEEE Transactions on Dependable and Secure Computing 9 (5), 714-726, 2012
The system can't perform the operation now. Try again later.
Articles 1–20