Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 33
Titolo Data di pubblicazione Autori Rivista Serie Titolo libro
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery 2020 Mauro ContiGabriele Tolomei + IEEE SECURITY & PRIVACY - -
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities 2019 Mauro ContiGabriele Tolomei + - - Proceedings of the 4th IEEE European Symposium on Security and Privacy
You Must Have Clicked on this Ad by Mistake! Data-Driven Identification of Accidental Clicks on Mobile Ads with Applications to Advertiser Cost Discounting and Click-Through Rate Prediction 2019 Gabriele Tolomei + INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS - -
Advertising in the IoT Era: Vision and Challenges 2018 Mauro ContiGabriele Tolomei + IEEE COMMUNICATIONS MAGAZINE - -
Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly 2018 Mauro ContiAnkit GangwalGochhayat, Sarada PrasadGabriele Tolomei - - 2018 IEEE Conference on Communications and Network Security (CNS)
Spot the difference: Your bucket is leaking - A methodology to expose A/B testing effortlessly 2018 Conti M.Gangwal A.Gochhayat S. P.Tolomei G. - - 2018 IEEE Conference on Communications and Network Security, CNS 2018
Interpretable predictions of tree-based ensembles via actionable feature tweaking 2017 TOLOMEI, GABRIELE + - - Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
Learning to Rank User Queries to Detect Search Tasks 2016 Salvatore OrlandoGabriele Tolomei + - - Proceedings of the 2016 ACM International Conference on the Theory of Information Retrieval (ICTIR '16)
Promoting Positive Post-Click Experience for In-Stream Yahoo Gemini Users 2015 Gabriele Tolomei + - - Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '15)
A supervised learning approach to protect client authentication on the web 2015 ORLANDO, SALVATORETOLOMEI, GABRIELE ACM TRANSACTIONS ON THE WEB - -
Quite a mess in my cookie jar! Leveraging machine learning to protect web authentication 2014 ORLANDO, SALVATORETOLOMEI, GABRIELE - - Proceedings of the 23rd international conference on World wide web - WWW '14
Mining Lifecycle Event Logs for Enhancing Service-based Applications 2013 TOLOMEI, GABRIELE - - Adaptive Web Services for Modular and Reusable Software Development: Tactics and Solution
Trending Topics on Twitter Improve the Prediction of Google Hot Queries 2013 GIUMMOLE', FEDERICAORLANDO, SALVATORETOLOMEI, GABRIELE - - 2013 ASE/IEEE Int.l Conference on Social Computing
Modeling and Predicting the Task-by-task Behavior of Search Engine Users 2013 ORLANDO, SALVATORETOLOMEI, GABRIELE - - Proceedings of the 10th Conference on Open Research Areas in Information Retrieval
A Study on Microblog and Search Engine User Behaviors: How Twitter Trending Topics Help Predict Google Hot Queries 2013 GIUMMOLE', FEDERICAORLANDO, SALVATORETOLOMEI, GABRIELE HUMAN - -
SEED: A Framework for Extracting Social Events from Press News 2013 ORLANDO, SALVATORETOLOMEI, GABRIELE - - Proceedings of the 22nd International Conference on World Wide Web Companion - WWW '13 Companion
Discovering tasks from search engine query logs 2013 ORLANDO, SALVATORETOLOMEI, GABRIELE ACM TRANSACTIONS ON INFORMATION SYSTEMS - -
Twitter anticipates bursts of requests for Wikipedia articles 2013 ORLANDO, SALVATORETOLOMEI, GABRIELE - - Proceedings of the 2103 workshop on Data-driven user behavioral modelling and mining from social media - DUBMOD '13
Using Clustering to Improve the Structure of Natural Language Requirements Documents 2013 Ferrari, AlessioTolomei Gabriele + LECTURE NOTES IN COMPUTER SCIENCE - Requirements Engineering: Foundation for Software Quality
A Clustering-based Approach for Discovering Flaws in Requirements Specifications 2012 TOLOMEI, GABRIELE - - Proceedings of the 27th ACM Symposium on Applied Computing - Requirment Engineering Track (SAC 2012)
Mostrati risultati da 1 a 20 di 33
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile