Follow
Fabio Pierazzi
Fabio Pierazzi
Lecturer (Assistant Professor) in Computer Science, King's College London
Verified email at kcl.ac.uk - Homepage
Title
Cited by
Cited by
Year
{TESSERACT}: Eliminating experimental bias in malware classification across space and time
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
28th USENIX Security Symposium (USENIX Security 19), 729-746, 2019
2162019
Analysis of high volumes of network traffic for advanced persistent threat detection
M Marchetti, F Pierazzi, M Colajanni, A Guido
Computer Networks 109, 127-141, 2016
1582016
Intriguing properties of adversarial ml attacks in the problem space
F Pierazzi, F Pendlebury, J Cortellazzi, L Cavallaro
2020 IEEE symposium on security and privacy (SP), 1332-1349, 2020
1142020
Ec2: Ensemble clustering and classification for predicting android malware families
T Chakraborty, F Pierazzi, VS Subrahmanian
IEEE Transactions on Dependable and Secure Computing 17 (2), 262-277, 2017
952017
A probabilistic logic of cyber deception
S Jajodia, N Park, F Pierazzi, A Pugliese, E Serra, GI Simari, ...
IEEE Transactions on Information Forensics and Security 12 (11), 2532-2544, 2017
552017
Dos and don’ts of machine learning in computer security
D Arp, E Quiring, F Pendlebury, A Warnecke, F Pierazzi, C Wressnegger, ...
Proc. of the USENIX Security Symposium, 2022
442022
Countering Advanced Persistent Threats through security intelligence and big data analytics
M Marchetti, F Pierazzi, A Guido, M Colajanni
2016 8th International Conference on Cyber Conflict (CyCon), 243-261, 2016
422016
Scalable architecture for multi-user encrypted SQL operations on cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
IEEE Transactions on Cloud computing 2 (4), 448-458, 2014
292014
Detection and threat prioritization of pivoting attacks in large networks
G Apruzzese, F Pierazzi, M Colajanni, M Marchetti
IEEE transactions on emerging topics in computing 8 (2), 404-415, 2017
262017
Security and confidentiality solutions for public cloud database services
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
The Seventh International Conference on Emerging Security Information …, 2013
262013
Exploratory security analytics for anomaly detection
F Pierazzi, S Casolari, M Colajanni, M Marchetti
computers & security 56, 28-49, 2016
232016
Performance and cost evaluation of an adaptive encryption architecture for cloud databases
L Ferretti, F Pierazzi, M Colajanni, M Marchetti
IEEE transactions on cloud computing 2 (2), 143-155, 2014
232014
Scalable architecture for online prioritisation of cyber threats
F Pierazzi, G Apruzzese, M Colajanni, A Guido, M Marchetti
2017 9th International Conference on Cyber Conflict (CyCon), 1-18, 2017
212017
A data-driven characterization of modern Android spyware
F Pierazzi, G Mezzour, Q Han, M Colajanni, VS Subrahmanian
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-38, 2020
202020
Transcending transcend: Revisiting malware classification with conformal evaluation
F Barbero, F Pendlebury, F Pierazzi, L Cavallaro
arXiv preprint arXiv:2010.03856, 2020
15*2020
Insomnia: Towards concept-drift robustness in network intrusion detection
G Andresini, F Pendlebury, F Pierazzi, C Loglisci, A Appice, L Cavallaro
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
102021
Universal adversarial perturbations for malware
R Labaca-Castro, L Muñoz-González, F Pendlebury, GD Rodosek, ...
arXiv preprint arXiv:2102.06747, 2021
102021
: Predictive Behavioral Analysis of Recent Android Banking Trojans
C Bai, Q Han, G Mezzour, F Pierazzi, VS Subrahmanian
IEEE Transactions on Dependable and Secure Computing 18 (3), 1378-1393, 2019
102019
POSTER: Enabling Fair ML Evaluations for Security
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
CCS. ACM, 2018
9*2018
Efficient detection of unauthorized data modification in cloud databases
L Ferretti, F Pierazzi, M Colajanni, M Marchetti, M Missiroli
2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20