André Grégio
André Grégio
Assistant Professor at UFPR
Email confirmado em - Página inicial
Citado por
Citado por
Controlchain: Blockchain as a central enabler for access control authorizations in the iot
OJA Pinno, ARA Gregio, LCE De Bona
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
Identifying Android malware using dynamically obtained features
VM Afonso, MF de Amorim, ARA Grégio, GB Junquera, PL de Geus
Journal of Computer Virology and Hacking Techniques 11 (1), 9-17, 2015
Toward a taxonomy of malware behaviors
ARA Grégio, VM Afonso, DSF Filho, PL Geus, M Jino
The Computer Journal 58 (10), 2758-2777, 2015
Faster unbalanced private set intersection
ACD Resende, DF Aranha
FC 2018, 2018
Ontology for malware behavior: A core model proposal
A Grégio, R Bonacin, O Nabuco, VM Afonso, PL De Geus, M Jino
2014 IEEE 23rd International WETICE Conference, 453-458, 2014
Behavioral analysis of malicious code through network traffic and system call monitoring
ARA Grégio, DS Fernandes Filho, VM Afonso, RDC Santos, M Jino, ...
Evolutionary and Bio-Inspired Computation: Theory and Applications V 8059 …, 2011
The other guys: automated analysis of marginalized malware
MF Botacin, PL de Geus, ARA Grégio
Journal of Computer Virology and Hacking Techniques 14 (1), 87-98, 2018
Evaluation of data mining techniques for suspicious network activity classification using honeypots data
A Grégio, R Santos, A Montes
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2007
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
LC Navarro, AKW Navarro, A Grégio, A Rocha, R Dahab
Computers & Security 78, 429-453, 2018
ControlChain: A new stage on the IoT access control authorization
OJA Pinno, ARA Grégio, LCE De Bona
Concurrency and Computation: Practice and Experience 32 (12), e5238, 2020
The need for speed: An analysis of brazilian malware classifiers
F Ceschin, F Pinage, M Castilho, D Menotti, LS Oliveira, A Gregio
IEEE Security & Privacy 16 (6), 31-41, 2018
Tracking memory writes for malware classification and code reuse identification
ARA Grégio, PL De Geus, C Kruegel, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2012
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging
M Botacin, PLD Geus, A Grégio
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
An ontology of suspicious software behavior
A Grégio, R Bonacin, AC de Marchi, OF Nabuco, PL de Geus
Applied Ontology 11 (1), 29-49, 2016
Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors
F Ceschin, M Botacin, HM Gomes, LS Oliveira, A Grégio
Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium, 1-9, 2019
We need to talk about antiviruses: challenges & pitfalls of av evaluations
M Botacin, F Ceschin, P de Geus, A Grégio
Computers & Security 95, 101859, 2020
Visualization techniques for malware behavior analysis
ARA Grégio, RDC Santos
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2011
An empirical analysis of malicious internet banking software behavior
ARA Grégio, DS Fernandes, VM Afonso, PL de Geus, VF Martins, M Jino
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1830-1835, 2013
Learning fast and slow: Propedeutica for real-time malware detection
R Sun, X Yuan, P He, Q Zhu, A Chen, A Gregio, D Oliveira, X Li
arXiv preprint arXiv:1712.01145, 2017
Malware distributed collection and pre-classification system using honeypot technology
ARA Grégio, IL Oliveira, RDC Santos, AM Cansian, PL de Geus
Data Mining, Intrusion Detection, Information Security and Assurance, and …, 2009
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20