Follow
Fabrizio Cicala
Fabrizio Cicala
Verified email at purdue.edu
Title
Cited by
Cited by
Year
Analysis of encryption key generation in modern crypto ransomware
F Cicala, E Bertino
IEEE Transactions on Dependable and Secure Computing 19 (2), 1239-1253, 2020
142020
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy
W Wang, F Cicala, SR Hussain, E Bertino, N Li
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
122020
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones
I Karim, F Cicala, SR Hussain, O Chowdhury, E Bertino
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
112019
Pure: A framework for analyzing proximity-based contact tracing protocols
F Cicala, W Wang, T Wang, N Li, E Bertino, F Liang, Y Yang
ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021
92021
Can i reach you? do i need to? new semantics in security policy specification and testing
C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
82021
NEUTRON: a graph-based pipeline for zero-trust network architectures
C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
52022
ATFuzzer: dynamic analysis framework of AT interface for Android smartphones
I Karim, F Cicala, SR Hussain, O Chowdhury, E Bertino
Digital Threats: Research and Practice 1 (4), 1-29, 2020
32020
Machine Learning Techniques for Cybersecurity
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Springer Nature, 2023
22023
Challenges in the Use of ML for Security
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 131-143, 2023
2023
Hardware Security Analysis
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 71-77, 2023
2023
Security Policy Learning
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 23-45, 2023
2023
Software Security Analysis
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 47-69, 2023
2023
Background on Machine Learning Techniques
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 9-21, 2023
2023
Attack Management
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 105-114, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–14