Fabio Pierazzi
TitleCited byYear
Analysis of high volumes of network traffic for advanced persistent threat detection
M Marchetti, F Pierazzi, M Colajanni, A Guido
Computer Networks 109, 127-141, 2016
592016
Exploratory security analytics for anomaly detection
F Pierazzi, S Casolari, M Colajanni, M Marchetti
computers & security 56, 28-49, 2016
202016
Scalable architecture for multi-user encrypted SQL operations on cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
IEEE Transactions on Cloud computing 2 (4), 448-458, 2014
192014
Security and confidentiality solutions for public cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
Proc. Seventh Int’l Conf. Emerging Security Information, Systems and …, 2013
192013
Countering Advanced Persistent Threats through security intelligence and big data analytics
M Marchetti, F Pierazzi, A Guido, M Colajanni
2016 8th International Conference on Cyber Conflict (CyCon), 243-261, 2016
142016
A probabilistic logic of cyber deception
S Jajodia, N Park, F Pierazzi, A Pugliese, E Serra, GI Simari, ...
IEEE Transactions on Information Forensics and Security 12 (11), 2532-2544, 2017
132017
Performance and cost evaluation of an adaptive encryption architecture for cloud databases
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
IEEE transactions on cloud computing 2 (2), 143-155, 2014
132014
EC2: ensemble clustering and classification for predicting android malware families
T Chakraborty, F Pierazzi, VS Subrahmanian
IEEE Transactions on Dependable and Secure Computing, 2017
112017
{TESSERACT}: Eliminating Experimental Bias in Malware Classification across Space and Time
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
28th {USENIX} Security Symposium ({USENIX} Security 19), 729-746, 2019
82019
Scalable architecture for online prioritisation of cyber threats
F Pierazzi, G Apruzzese, M Colajanni, A Guido, M Marchetti
2017 9th International Conference on Cyber Conflict (CyCon), 1-18, 2017
52017
Detection and threat prioritization of pivoting attacks in large networks
G Apruzzese, F Pierazzi, M Colajanni, M Marchetti
IEEE Transactions on Emerging Topics in Computing, 2017
42017
POSTER: Enabling Fair ML Evaluations for Security
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
CCS. ACM, 2018
3*2018
Efficient detection of unauthorized data modification in cloud databases
L Ferretti, F Pierazzi, M Colajanni, M Marchetti, M Missiroli
2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014
22014
The network perspective of cloud security
F Pierazzi, A Balboni, A Guido, M Marchetti
2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA …, 2015
12015
Security and privacy of location-based services for in-vehicle device systems
M Missiroli, F Pierazzi, M Colajanni
2014 International Conference on High Performance Computing & Simulation …, 2014
12014
DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
Q Han, G Mezzour, F Pierazzi, VS Subrahmanian
IEEE Transactions on Dependable and Secure Computing, 2019
2019
Security analytics per prevenzione e rilevazione di attacchi informatici avanzati
F PIERAZZI
2017
EC2: Ensemble Clustering & Classification for predicting Android malware families
C Tanmoy, F Pierazzi, VS Subrahmanian
2017
POSTER: Enabling Fair ML Evaluations for Security {References for Poster Timeline}
F PENDLEBURY, F PIERAZZI, R JORDANEY, J KINDER
SIW 2018 Organizing Committee
J Bringer, L Ferretti, M Marchetti, CA Ardagna, JB Bernabe, M Colajanni, ...
The system can't perform the operation now. Try again later.
Articles 1–20