SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
HMMPayl: an application of HMM to
                         the analysis of the HTTP payload
 University of                           Davide Ariu - Giorgio Giacinto                                                                                       Dept. of Electrical and
Cagliari - Italy                 [davide.ariu - giacinto]@diee.unica.it                                                                                       Electronic Engineering!

     $"%&'()*+,%-./.01('%2(3%4()56/.3%#.0637/,%                                                                            N"%FZZ=%=*,+(*8%&'*+,979%
  96$!/3*871('*+%1334)126!0)!!'/3697('%-./.01('!
  4$(-$%!)#!%5%0$&%!'1%$/!)#!1!/101'1%$!)*!                                               "!9/*1910*+%%
  97:'*/63.9!0610!/$%24-'$!;'(<'%1>12?%8!                                                 )(8.+!)*!06$!!
                                                                                          >,/.9]%%
  =3(>+.)?%'.@.3A9..'A>.2(3.!@0610!-%!6';'(<'A!                                           879/37>61('!!
  1>12?%!21#!#)0!'$!/$0$20$/BBB%                                                          F-06-#!06$!!
  4(6'/.3).*963.?%1#)&1(5!'1%$/!CDE!24$10$!1!                                             FZZ=%5*,+(*8%%
  %01=%=21(!&)/$(!)*!06$!($<-=&10$!31>$4#%8!"#5!                                          )*!06$!3.^6.9/9%%
  31>$4#!F6)%$!%01=%=21(!&)/$(!/$:-10$%!*4)&!0610!                                        4$2$-:$/!'5!1!!
  %0)4$/!-#!06$!%5%0$&!-%!(1'$($/!1%!1#!1>12?%8!                                          <.>%9.3@.3%&-<60!!
          B.3(A8*,9%*C*0;9%0*'%>.%8./.0/.8DDD!!                                           1(()F!0)!8./.0/%*C*0;9%*:*7'9/%/_.%<.>%9.3@.38!

                              E"%FGG=*,+?%*'%*'()*+,%>*9.8%!'/3697('%-./.01('%#,9/.)%
      !"!G-:$#!1#!+99H!315()1/88!                                                                                                                 !Q"!96$!315()1/L%!34)'1'-(-=$%!
                                           !!!"!"#!$#%$&'($!)*!+,,!-%!.%$/!0)!1%%)2-10$!1!!
                                           34)'1'-(-05!0)!$126!%$7.$#2$!-#!#8!9)!)'01-#!1#!                                                       )'01-#$/!10!06$!34$:-).%!%0$3!14$!!
          H$% IJ% KL% LH% JK%              ):$41((!34)'1'-(-05!*)4!06$!315()1/;!06$!1:$41<$!)*!                                                   2)&'-#$/!0)!)'01-#!1#!):$41((!!
                                           34)'1'-(-=$%!$&->$/!'5!$126!+,,!-%!21(2.(10$/8!                                                        34)'1'-(-05!)4!1!2(1%%!(1'$(!
     !!"!881!%(-/-#<!F-#/)F!)*!F-/06!!          FGG$%                        M"IE%
     '!4.#%!):$4!06$!315()1/!1#/!!                                           M"H$%                 M"II%                 !"#$%&#'
     $I04120%!1!%$0!)*!%$7.$#2$%!!                                                                                       ($)*%*+,+-.'
     #!@'JK!-#!06-%!$I1&3($A!                                                M"IL%
                                                                                                                         /001'                                                    =3(>*>7+7/,%
          H$% IJ% KL%                           FGGN%                                              M"IO%
                                                                                                                         !"#$%&#'
                                                                                                                                                       G4#%                           )4!
                                                                                                                         ($)*%*+,+-.'                                             4+*99%P*>.+!
          IJ% KL% LH%                                                                                                    /00D'
                                                FGGE%                                              M"IK%                 !"#$%&#'
          KL% LH% JK%                                                                                                    ($)*%*+,+-.'
                                                                                                                         /00H'


                                                          L"%RS5.37).'/*+%T.96+/9%
     P.:71)*/.%/3*`0%%-*/*9./9?%                                                     &C*0;%-*/*9./9%@:14-).%!?-#/%!)*!4$1(!1>12?%!2)(($20$/!*4)&!
     •! &T=&%@E5#06$=2A!
      -                                                                              :14-).%!%).42$%!)#!C#0$4#$0;!$8<8!FFF8&-(FN4&82)&A?%
     •! Za%-!RR%@M$1(;!2)(($20$/!10!"21/$&-2!C#%=0.=)#%A!
                                                                                    •! _.++0(8.a%4PRZa%.'.370%1#/%b##A#cP!%%
                                                                                      #




      &U45%('%/_.%.'.370%&C*0;%8*/*9./"%            "#!1334)126!'1%$/!)#!)6+15+.%0+*997d.39%                                                 96$!2)&3.01=)#1(!2)%0!!21#!'$!
     FGG=*,+%126-$:$%!1#!6-<6$4!=*31*+!&U4!          *++(<%!0)!1>1-#!>.C.3%4$%.(0%!-#!0$4&%!)*!                                         %-<#-O21#0(5!4$/.2$/!'5!&):-#<!06$!9+787':%
       F-06!4$%3$20!0)!34$:-).%(5!34)3)%$/!                   0+*997d0*1('%*0063*0,%                                                     <7'8(<!)*!)(3.%/_*'%('.%>,/.%2(3<*38!
              %)(.=)#%!@$8<8!G0=&-A!                                                                                                          F-06).0!1!4$($:1#0!()%%!)*!&U45%

                         Pattern Recognition and                                                                   23+4'$#4#%$53'6%4'4()74)$#8'*.'-3#'!9-)7):)94';#&+)7')<'
                                                                                                                                                                                   WAPA 2010
 P
      R   A   Group      Applications Group
                                                         RUTV=R&W%UW!VW%   TR=UXP!4%VY%!Z&P[% &UZVWVGVU#%TR!VW%
                                                                                                                   =%$8+7+%'-3$)9&3'%'&$%7-'>7%75#8'6+-3'-3#'?=%$8+7+%'@A'B=C'
                                                                                                                   DEEFGDE1H?'<9784'%78'($)"+8#8'%55)$8+7&'-)'-3#'IJ;J'FKDEEFJ'   Workshop on Applications
                                                                                                                                                                                    Of Pattern Analysis!
                         http://prag.diee.unica.it                                                VY%#&T-!W!&%

Contenu connexe

Tendances

Capitulo 3.4 Compras Mipro Erp
Capitulo 3.4 Compras Mipro ErpCapitulo 3.4 Compras Mipro Erp
Capitulo 3.4 Compras Mipro ErpDeath User
 
Ridehailing vs Traditional transportation: Demand difference in Vietnam
Ridehailing vs Traditional transportation: Demand difference in VietnamRidehailing vs Traditional transportation: Demand difference in Vietnam
Ridehailing vs Traditional transportation: Demand difference in VietnamQ&Me Vietnam Market Research
 
Google Talk: DOs and DON'Ts of Mobile Strategy
Google Talk: DOs and DON'Ts of Mobile StrategyGoogle Talk: DOs and DON'Ts of Mobile Strategy
Google Talk: DOs and DON'Ts of Mobile StrategyJason Grigsby
 
2014 blackstone presentation
 2014 blackstone presentation 2014 blackstone presentation
2014 blackstone presentationClaude Gaudin
 
Innotech - Get Me a Mobile Strategy or You’re Fired!
Innotech - Get Me a Mobile Strategy or You’re Fired!Innotech - Get Me a Mobile Strategy or You’re Fired!
Innotech - Get Me a Mobile Strategy or You’re Fired!Jason Grigsby
 
Get me a mobile strategy or you're fired web 2
Get me a mobile strategy or you're fired   web 2Get me a mobile strategy or you're fired   web 2
Get me a mobile strategy or you're fired web 2Jason Grigsby
 
Where 2.0 -- Get me a mobile strategy or you’re fired!
Where 2.0 -- Get me a mobile strategy or you’re fired!Where 2.0 -- Get me a mobile strategy or you’re fired!
Where 2.0 -- Get me a mobile strategy or you’re fired!Jason Grigsby
 
Mobile Number Portability - The Process Factory
Mobile Number Portability - The Process FactoryMobile Number Portability - The Process Factory
Mobile Number Portability - The Process FactoryBSP Media Group
 
Biografía Miguel Hernández Pwp
Biografía Miguel Hernández   PwpBiografía Miguel Hernández   Pwp
Biografía Miguel Hernández PwpAbrilm
 
Nearby Startup Pitch for SUU 2013 conference
Nearby Startup Pitch for SUU 2013 conferenceNearby Startup Pitch for SUU 2013 conference
Nearby Startup Pitch for SUU 2013 conferenceAdam Nemeth
 
Get Me a Mobile Strategy or You're Fired - Central Oregon Ad Fed
Get Me a Mobile Strategy or You're Fired  - Central Oregon Ad FedGet Me a Mobile Strategy or You're Fired  - Central Oregon Ad Fed
Get Me a Mobile Strategy or You're Fired - Central Oregon Ad FedJason Grigsby
 
Webinar: Online Fundraising
Webinar: Online FundraisingWebinar: Online Fundraising
Webinar: Online FundraisingifPeople
 
Mobile: The Market, The Web and Windows Phone’s Future
Mobile: The Market, The Web and Windows Phone’s Future Mobile: The Market, The Web and Windows Phone’s Future
Mobile: The Market, The Web and Windows Phone’s Future Jason Grigsby
 
ΓΛΩΣΣΑ C - ΜΑΘΗΜΑ 4 - ΤΕΛΕΣΤΕΣ και η ΔΟΜΗ ΕΛΕΓΧΟΥ (ΕΚΤΥΠΩΣΗ)
ΓΛΩΣΣΑ C - ΜΑΘΗΜΑ 4 - ΤΕΛΕΣΤΕΣ και η ΔΟΜΗ ΕΛΕΓΧΟΥ (ΕΚΤΥΠΩΣΗ)ΓΛΩΣΣΑ C - ΜΑΘΗΜΑ 4 - ΤΕΛΕΣΤΕΣ και η ΔΟΜΗ ΕΛΕΓΧΟΥ (ΕΚΤΥΠΩΣΗ)
ΓΛΩΣΣΑ C - ΜΑΘΗΜΑ 4 - ΤΕΛΕΣΤΕΣ και η ΔΟΜΗ ΕΛΕΓΧΟΥ (ΕΚΤΥΠΩΣΗ)Dimitris Psounis
 
Grizzly manpaper
Grizzly manpaperGrizzly manpaper
Grizzly manpapersmagdeburg
 

Tendances (20)

Capitulo 3.4 Compras Mipro Erp
Capitulo 3.4 Compras Mipro ErpCapitulo 3.4 Compras Mipro Erp
Capitulo 3.4 Compras Mipro Erp
 
Vietnamese concerns on the environment issues
Vietnamese concerns on the environment issuesVietnamese concerns on the environment issues
Vietnamese concerns on the environment issues
 
Ridehailing vs Traditional transportation: Demand difference in Vietnam
Ridehailing vs Traditional transportation: Demand difference in VietnamRidehailing vs Traditional transportation: Demand difference in Vietnam
Ridehailing vs Traditional transportation: Demand difference in Vietnam
 
Vietnam macro market trend (up to Aug 2021)
Vietnam macro market trend (up to Aug 2021)Vietnam macro market trend (up to Aug 2021)
Vietnam macro market trend (up to Aug 2021)
 
Vietnam social media popularity & characteristics
Vietnam social media popularity & characteristicsVietnam social media popularity & characteristics
Vietnam social media popularity & characteristics
 
Google Talk: DOs and DON'Ts of Mobile Strategy
Google Talk: DOs and DON'Ts of Mobile StrategyGoogle Talk: DOs and DON'Ts of Mobile Strategy
Google Talk: DOs and DON'Ts of Mobile Strategy
 
2014 blackstone presentation
 2014 blackstone presentation 2014 blackstone presentation
2014 blackstone presentation
 
Innotech - Get Me a Mobile Strategy or You’re Fired!
Innotech - Get Me a Mobile Strategy or You’re Fired!Innotech - Get Me a Mobile Strategy or You’re Fired!
Innotech - Get Me a Mobile Strategy or You’re Fired!
 
Get me a mobile strategy or you're fired web 2
Get me a mobile strategy or you're fired   web 2Get me a mobile strategy or you're fired   web 2
Get me a mobile strategy or you're fired web 2
 
Where 2.0 -- Get me a mobile strategy or you’re fired!
Where 2.0 -- Get me a mobile strategy or you’re fired!Where 2.0 -- Get me a mobile strategy or you’re fired!
Where 2.0 -- Get me a mobile strategy or you’re fired!
 
Mobile Number Portability - The Process Factory
Mobile Number Portability - The Process FactoryMobile Number Portability - The Process Factory
Mobile Number Portability - The Process Factory
 
YouTube popularity in Vietnam
YouTube popularity in VietnamYouTube popularity in Vietnam
YouTube popularity in Vietnam
 
Biografía Miguel Hernández Pwp
Biografía Miguel Hernández   PwpBiografía Miguel Hernández   Pwp
Biografía Miguel Hernández Pwp
 
Nearby Startup Pitch for SUU 2013 conference
Nearby Startup Pitch for SUU 2013 conferenceNearby Startup Pitch for SUU 2013 conference
Nearby Startup Pitch for SUU 2013 conference
 
Get Me a Mobile Strategy or You're Fired - Central Oregon Ad Fed
Get Me a Mobile Strategy or You're Fired  - Central Oregon Ad FedGet Me a Mobile Strategy or You're Fired  - Central Oregon Ad Fed
Get Me a Mobile Strategy or You're Fired - Central Oregon Ad Fed
 
Waimea Brand Catalogue2010
Waimea Brand Catalogue2010Waimea Brand Catalogue2010
Waimea Brand Catalogue2010
 
Webinar: Online Fundraising
Webinar: Online FundraisingWebinar: Online Fundraising
Webinar: Online Fundraising
 
Mobile: The Market, The Web and Windows Phone’s Future
Mobile: The Market, The Web and Windows Phone’s Future Mobile: The Market, The Web and Windows Phone’s Future
Mobile: The Market, The Web and Windows Phone’s Future
 
ΓΛΩΣΣΑ C - ΜΑΘΗΜΑ 4 - ΤΕΛΕΣΤΕΣ και η ΔΟΜΗ ΕΛΕΓΧΟΥ (ΕΚΤΥΠΩΣΗ)
ΓΛΩΣΣΑ C - ΜΑΘΗΜΑ 4 - ΤΕΛΕΣΤΕΣ και η ΔΟΜΗ ΕΛΕΓΧΟΥ (ΕΚΤΥΠΩΣΗ)ΓΛΩΣΣΑ C - ΜΑΘΗΜΑ 4 - ΤΕΛΕΣΤΕΣ και η ΔΟΜΗ ΕΛΕΓΧΟΥ (ΕΚΤΥΠΩΣΗ)
ΓΛΩΣΣΑ C - ΜΑΘΗΜΑ 4 - ΤΕΛΕΣΤΕΣ και η ΔΟΜΗ ΕΛΕΓΧΟΥ (ΕΚΤΥΠΩΣΗ)
 
Grizzly manpaper
Grizzly manpaperGrizzly manpaper
Grizzly manpaper
 

Similaire à Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster

Magazine layout 3
Magazine layout 3Magazine layout 3
Magazine layout 3Jaime Flynn
 
8 Steps to Maximize Your Financial Aid Package
8 Steps to Maximize Your Financial Aid Package8 Steps to Maximize Your Financial Aid Package
8 Steps to Maximize Your Financial Aid PackageBrian Davidson
 
MAP TERM PAPER - MOTOROLA 68040
MAP TERM PAPER - MOTOROLA 68040MAP TERM PAPER - MOTOROLA 68040
MAP TERM PAPER - MOTOROLA 68040Poojan Jhaveri
 
What Is Social Media
What Is Social MediaWhat Is Social Media
What Is Social MediaHAL
 
WestEd Evaluation of Hawaii Special Education Program
WestEd Evaluation of Hawaii Special Education ProgramWestEd Evaluation of Hawaii Special Education Program
WestEd Evaluation of Hawaii Special Education ProgramHonolulu Civil Beat
 
Managing SQL Performance
Managing SQL PerformanceManaging SQL Performance
Managing SQL PerformanceKaren Morton
 
Interview with Ryan Kalil and Dwayne Jarrett
Interview with Ryan Kalil and Dwayne Jarrett Interview with Ryan Kalil and Dwayne Jarrett
Interview with Ryan Kalil and Dwayne Jarrett Natalie Hills
 
Self Optimizing transactional data grids for elastic cloud environments
Self Optimizing transactional data grids for elastic cloud environmentsSelf Optimizing transactional data grids for elastic cloud environments
Self Optimizing transactional data grids for elastic cloud environmentsEuroCloud
 
Ssijialiye
SsijialiyeSsijialiye
Ssijialiyerenata7
 
ArcLight Cinemas
ArcLight CinemasArcLight Cinemas
ArcLight CinemasMike Jensen
 
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...Community Food Security Coalition
 
The Critical Need for Encrypted Email and File Transfer Solutions
The Critical Need for Encrypted Email and File Transfer SolutionsThe Critical Need for Encrypted Email and File Transfer Solutions
The Critical Need for Encrypted Email and File Transfer SolutionsOsterman Research, Inc.
 
Vietnam review of current and planned adaption action
Vietnam review of current and planned adaption actionVietnam review of current and planned adaption action
Vietnam review of current and planned adaption actionThành Nguyễn
 

Similaire à Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster (20)

Death By Ppt
Death By PptDeath By Ppt
Death By Ppt
 
Magazine layout 3
Magazine layout 3Magazine layout 3
Magazine layout 3
 
8 Steps to Maximize Your Financial Aid Package
8 Steps to Maximize Your Financial Aid Package8 Steps to Maximize Your Financial Aid Package
8 Steps to Maximize Your Financial Aid Package
 
MAP TERM PAPER - MOTOROLA 68040
MAP TERM PAPER - MOTOROLA 68040MAP TERM PAPER - MOTOROLA 68040
MAP TERM PAPER - MOTOROLA 68040
 
FPC Seven to Save 2009
FPC Seven to Save 2009FPC Seven to Save 2009
FPC Seven to Save 2009
 
What Is Social Media
What Is Social MediaWhat Is Social Media
What Is Social Media
 
An easy way to learn hip muscles
An easy way to learn hip musclesAn easy way to learn hip muscles
An easy way to learn hip muscles
 
WestEd Evaluation of Hawaii Special Education Program
WestEd Evaluation of Hawaii Special Education ProgramWestEd Evaluation of Hawaii Special Education Program
WestEd Evaluation of Hawaii Special Education Program
 
Ppt fiep x_iglesias_2012
Ppt fiep x_iglesias_2012Ppt fiep x_iglesias_2012
Ppt fiep x_iglesias_2012
 
Managing SQL Performance
Managing SQL PerformanceManaging SQL Performance
Managing SQL Performance
 
Interview with Ryan Kalil and Dwayne Jarrett
Interview with Ryan Kalil and Dwayne Jarrett Interview with Ryan Kalil and Dwayne Jarrett
Interview with Ryan Kalil and Dwayne Jarrett
 
Panthers
Panthers Panthers
Panthers
 
Panthers
Panthers Panthers
Panthers
 
Self Optimizing transactional data grids for elastic cloud environments
Self Optimizing transactional data grids for elastic cloud environmentsSelf Optimizing transactional data grids for elastic cloud environments
Self Optimizing transactional data grids for elastic cloud environments
 
Ssijialiye
SsijialiyeSsijialiye
Ssijialiye
 
ArcLight Cinemas
ArcLight CinemasArcLight Cinemas
ArcLight Cinemas
 
Treball espai familiar
Treball espai familiarTreball espai familiar
Treball espai familiar
 
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
 
The Critical Need for Encrypted Email and File Transfer Solutions
The Critical Need for Encrypted Email and File Transfer SolutionsThe Critical Need for Encrypted Email and File Transfer Solutions
The Critical Need for Encrypted Email and File Transfer Solutions
 
Vietnam review of current and planned adaption action
Vietnam review of current and planned adaption actionVietnam review of current and planned adaption action
Vietnam review of current and planned adaption action
 

Plus de Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Pluribus One
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019Pluribus One
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Pluribus One
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsPluribus One
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksPluribus One
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresPluribus One
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Pluribus One
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Pluribus One
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Pluribus One
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Pluribus One
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringPluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Pluribus One
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Pluribus One
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Pluribus One
 

Plus de Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster

  • 1. HMMPayl: an application of HMM to the analysis of the HTTP payload University of Davide Ariu - Giorgio Giacinto Dept. of Electrical and Cagliari - Italy [davide.ariu - giacinto]@diee.unica.it Electronic Engineering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`0%%-*/*9./9?% &C*0;%-*/*9./9%@:14-).%!?-#/%!)*!4$1(!1>12?%!2)(($20$/!*4)&! •! &T=&%@E5#06$=2A! - :14-).%!%).42$%!)#!C#0$4#$0;!$8<8!FFF8&-(FN4&82)&A?% •! Za%-!RR%@M$1(;!2)(($20$/!10!"21/$&-2!C#%=0.=)#%A! •! _.++0(8.a%4PRZa%.'.370%1#/%b##A#cP!%% # &U45%('%/_.%.'.370%&C*0;%8*/*9./"% "#!1334)126!'1%$/!)#!)6+15+.%0+*997d.39% 96$!2)&3.01=)#1(!2)%0!!21#!'$! FGG=*,+%126-$:$%!1#!6-<6$4!=*31*+!&U4! *++(<%!0)!1>1-#!>.C.3%4$%.(0%!-#!0$4&%!)*! %-<#-O21#0(5!4$/.2$/!'5!&):-#<!06$!9+787':% F-06!4$%3$20!0)!34$:-).%(5!34)3)%$/! 0+*997d0*1('%*0063*0,% <7'8(<!)*!)(3.%/_*'%('.%>,/.%2(3<*38! %)(.=)#%!@$8<8!G0=&-A! F-06).0!1!4$($:1#0!()%%!)*!&U45% Pattern Recognition and 23+4'$#4#%$53'6%4'4()74)$#8'*.'-3#'!9-)7):)94';#&+)7')<' WAPA 2010 P R A Group Applications Group RUTV=R&W%UW!VW% TR=UXP!4%VY%!Z&P[% &UZVWVGVU#%TR!VW% =%$8+7+%'-3$)9&3'%'&$%7-'>7%75#8'6+-3'-3#'?=%$8+7+%'@A'B=C' DEEFGDE1H?'<9784'%78'($)"+8#8'%55)$8+7&'-)'-3#'IJ;J'FKDEEFJ' Workshop on Applications Of Pattern Analysis! http://prag.diee.unica.it VY%#&T-!W!&%