Marco Cova, Ph.D.
Affiliations: | 2010 | Computer Science | University of California, Santa Barbara, Santa Barbara, CA, United States |
Google:
"Marco Cova"Parents
Sign in to add mentorGiovanni Vigna | grad student | 2010 | UC Santa Barbara | |
(Taming the Malicious Web: Avoiding and Detecting Web-based Attacks.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Invernizzi L, Comparetti PM, Benvenuti S, et al. (2012) EvilSeed: A guided approach to finding malicious web pages Proceedings - Ieee Symposium On Security and Privacy. 428-442 |
Leita C, Cova M. (2011) HARMUR: Storing and analyzing historic data on malicious domains Proceedings of the 1st Workshop On Building Analysis Datasets and Gathering Experience Returns For Security, Badgers 2011. 46-53 |
Canali D, Cova M, Vigna G, et al. (2011) Prophiler: A fast filter for the large-scale detection of malicious web pages Proceedings of the 20th International Conference On World Wide Web, Www 2011. 197-206 |
Stone-Gross B, Cova M, Gilbert B, et al. (2011) Analysis of a botnet takeover Ieee Security and Privacy. 9: 64-72 |
Stone-Gross B, Cova M, Kruegel C, et al. (2011) Peering through the iframe Proceedings - Ieee Infocom. 411-415 |
Kapravelos A, Cova M, Kruegel C, et al. (2011) Escape from monkey island: Evading high-interaction honeyclients Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 124-143 |
Cova M, Kruegel C, Vigna G. (2010) Detection and analysis of drive-by-download attacks and malicious JavaScript code Proceedings of the 19th International Conference On World Wide Web, Www '10. 281-290 |
Balzarotti D, Banks G, Cova M, et al. (2010) An experience in testing the security of real-world electronic voting systems Ieee Transactions On Software Engineering. 36: 453-473 |
Cova M, Leita C, Thonnard O, et al. (2010) Gone rogue: An analysis of rogue security software campaigns Ec2nd 2009 - European Conference On Computer Network Defense. 1-3 |
Cova M, Leita C, Thonnard O, et al. (2010) An analysis of rogue AV campaigns Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 442-463 |