André Grégio
André Grégio
Assistant Professor at UFPR
Adresse e-mail validée de inf.ufpr.br - Page d'accueil
Titre
Citée par
Citée par
Année
Identifying Android malware using dynamically obtained features
VM Afonso, MF de Amorim, ARA Grégio, GB Junquera, PL de Geus
Journal of Computer Virology and Hacking Techniques 11 (1), 9-17, 2015
1192015
Controlchain: Blockchain as a central enabler for access control authorizations in the iot
OJA Pinno, ARA Gregio, LCE De Bona
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
1122017
Toward a taxonomy of malware behaviors
ARA Grégio, VM Afonso, DSF Filho, PL Geus, M Jino
The Computer Journal 58 (10), 2758-2777, 2015
362015
Faster unbalanced private set intersection
ACD Resende, DF Aranha
FC 2018, 2018
29*2018
Ontology for malware behavior: A core model proposal
A Grégio, R Bonacin, O Nabuco, VM Afonso, PL De Geus, M Jino
2014 IEEE 23rd International WETICE Conference, 453-458, 2014
242014
Behavioral analysis of malicious code through network traffic and system call monitoring
ARA Grégio, DS Fernandes Filho, VM Afonso, RDC Santos, M Jino, ...
Evolutionary and Bio-Inspired Computation: Theory and Applications V 8059 …, 2011
212011
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
LC Navarro, AKW Navarro, A Gregio, A Rocha, R Dahab
Computers & Security 78, 429-453, 2018
192018
Evaluation of data mining techniques for suspicious network activity classification using honeypots data
A Grégio, R Santos, A Montes
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2007
192007
The other guys: automated analysis of marginalized malware
MF Botacin, PL de Geus, ARA Grégio
Journal of Computer Virology and Hacking Techniques 14 (1), 87-98, 2018
182018
An ontology of suspicious software behavior
A Grégio, R Bonacin, AC de Marchi, OF Nabuco, PL de Geus
Applied Ontology 11 (1), 29-49, 2016
152016
Tracking memory writes for malware classification and code reuse identification
ARA Grégio, PL De Geus, C Kruegel, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2012
152012
The Need for Speed: An Analysis of Brazilian Malware Classifiers
F Ceschin, F Pinage, M Castilho, D Menotti, LS Oliveira, A Gregio
IEEE Security & Privacy 16 (6), 31-41, 2018
142018
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging
M Botacin, PLD Geus, A Grégio
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
142018
ControlChain: A new stage on the IoT access control authorization
OJA Pinno, ARA Grégio, LCE De Bona
Concurrency and Computation: Practice and Experience 32 (12), e5238, 2020
122020
Visualization techniques for malware behavior analysis
ARA Grégio, RDC Santos
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2011
122011
An empirical analysis of malicious internet banking software behavior
ARA Grégio, DS Fernandes, VM Afonso, PL de Geus, VF Martins, M Jino
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1830-1835, 2013
112013
Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors
F Ceschin, M Botacin, HM Gomes, LS Oliveira, A Grégio
Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium, 1-9, 2019
102019
15 Análise Comportamental de Código Malicioso Através da Monitoraçao de Chamadas de Sistema e Tráfego de Rede
DS Fernandes Filho, PL de Geus
Anais do VI Workshop de Teses, Dissertações e Trabalhos de Iniciação …, 2010
102010
We need to talk about antiviruses: challenges & pitfalls of AV evaluations
M Botacin, F Ceschin, P de Geus, A Grégio
Computers & Security 95, 101859, 2020
92020
Malware distributed collection and pre-classification system using honeypot technology
ARA Grégio, IL Oliveira, RDC Santos, AM Cansian, PL de Geus
Data Mining, Intrusion Detection, Information Security and Assurance, and …, 2009
92009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20