| V2w-bert: A framework for effective hierarchical multiclass classification of software vulnerabilities SS Das, E Serra, M Halappanavar, A Pothen, E Al-Shaer 2021 IEEE 8th International Conference on Data Science and Advanced …, 2021 | 88 | 2021 |
| A probabilistic logic of cyber deception S Jajodia, N Park, F Pierazzi, A Pugliese, E Serra, GI Simari, ... IEEE Transactions on Information Forensics and Security 12 (11), 2532-2544, 2017 | 74 | 2017 |
| Pareto-optimal adversarial defense of enterprise systems E Serra, S Jajodia, A Pugliese, A Rullo, VS Subrahmanian ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-39, 2015 | 63 | 2015 |
| Extending the power of datalog recursion M Mazuran, E Serra, C Zaniolo The VLDB Journal 22 (4), 471-493, 2013 | 62 | 2013 |
| Multi-modal social and psycho-linguistic embedding via recurrent neural networks to identify depressed users in online forums A Shrestha, E Serra, F Spezzano Network Modeling Analysis in Health Informatics and Bioinformatics 9 (1), 22, 2020 | 50 | 2020 |
| Ensemble models for data-driven prediction of malware infections C Kang, N Park, BA Prakash, E Serra, VS Subrahmanian Proceedings of the Ninth ACM International Conference on Web Search and Data …, 2016 | 45 | 2016 |
| Detecting saturation attacks in sdn via machine learning S Khamaiseh, E Serra, Z Li, D Xu 2019 4th international conference on computing, communications and security …, 2019 | 38 | 2019 |
| Detecting suspicious entities in offshore leaks networks M Joaristi, E Serra, F Spezzano Social Network Analysis and Mining 9 (1), 62, 2019 | 37 | 2019 |
| Behavior informatics: A new perspective L Cao, T Joachims, C Wang, E Gaussier, J Li, Y Ou, D Luo, R Zafarani, ... IEEE Intelligent Systems 29 (4), 62-80, 2014 | 37 | 2014 |
| Identifying ATT&CK tactics in Android malware control flow graph through graph representation learning and interpretability J Fairbanks, A Orbe, C Patterson, J Layne, E Serra, M Scheepers 2021 IEEE International Conference on Big Data (Big Data), 5602-5608, 2021 | 36 | 2021 |
| APE: A data-driven, behavioral model-based anti-poaching engine N Park, E Serra, T Snitch, VS Subrahmanian IEEE Transactions on Computational Social Systems 2 (2), 15-37, 2015 | 36 | 2015 |
| Convolutional neural network ensemble fine-tuning for extended transfer learning O Korzh, M Joaristi, E Serra International Conference on Big Data, 110-123, 2018 | 35 | 2018 |
| Pareto optimal security resource allocation for Internet of Things A Rullo, D Midi, E Serra, E Bertino ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-30, 2017 | 33 | 2017 |
| Share: A stackelberg honey-based adversarial reasoning engine S Jajodia, N Park, E Serra, VS Subrahmanian ACM Transactions on Internet Technology (TOIT) 18 (3), 1-41, 2018 | 31 | 2018 |
| cuTS: scaling subgraph isomorphism on distributed multi-GPU systems using trie based data structure L Xiang, A Khan, E Serra, M Halappanavar, A Sukumaran-Rajam Proceedings of the International Conference for High Performance Computing …, 2021 | 30 | 2021 |
| Redundancy as a measure of fault-tolerance for the Internet of Things: A review A Rullo, E Serra, J Lobo Policy-Based Autonomic Data Governance, 202-226, 2019 | 29 | 2019 |
| A multi-perspective approach for the analysis of complex business processes behavior A Guzzo, M Joaristi, A Rullo, E Serra Expert Systems with Applications 177, 114934, 2021 | 28 | 2021 |
| Deeptrust: An automatic framework to detect trustworthy users in opinion-based systems E Serra, A Shrestha, F Spezzano, A Squicciarini Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 28 | 2020 |
| An effective approach to inverse frequent set mining A Guzzo, D Sacca, E Serra 2009 Ninth IEEE International Conference on Data Mining, 806-811, 2009 | 28 | 2009 |
| Anomaly detection in cybersecurity events through graph neural network and transformer based model: A case study with beth dataset B Lakha, SL Mount, E Serra, A Cuzzocrea 2022 IEEE International Conference on Big Data (Big Data), 5756-5764, 2022 | 27 | 2022 |