Analysis of encryption key generation in modern crypto ransomware F Cicala, E Bertino IEEE Transactions on Dependable and Secure Computing 19 (2), 1239-1253, 2020 | 14 | 2020 |
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy W Wang, F Cicala, SR Hussain, E Bertino, N Li Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 12 | 2020 |
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones I Karim, F Cicala, SR Hussain, O Chowdhury, E Bertino Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 11 | 2019 |
Pure: A framework for analyzing proximity-based contact tracing protocols F Cicala, W Wang, T Wang, N Li, E Bertino, F Liang, Y Yang ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021 | 9 | 2021 |
Can i reach you? do i need to? new semantics in security policy specification and testing C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021 | 8 | 2021 |
NEUTRON: a graph-based pipeline for zero-trust network architectures C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 5 | 2022 |
ATFuzzer: dynamic analysis framework of AT interface for Android smartphones I Karim, F Cicala, SR Hussain, O Chowdhury, E Bertino Digital Threats: Research and Practice 1 (4), 1-29, 2020 | 3 | 2020 |
Machine Learning Techniques for Cybersecurity E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Springer Nature, 2023 | 2 | 2023 |
Challenges in the Use of ML for Security E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 131-143, 2023 | | 2023 |
Hardware Security Analysis E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 71-77, 2023 | | 2023 |
Security Policy Learning E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 23-45, 2023 | | 2023 |
Software Security Analysis E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 47-69, 2023 | | 2023 |
Background on Machine Learning Techniques E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 9-21, 2023 | | 2023 |
Attack Management E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 105-114, 2023 | | 2023 |