Asaf Shabtai

Orcid: 0000-0003-0630-4059

According to our database1, Asaf Shabtai authored at least 263 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improving interpretability via regularization of neural activation sensitivity.
Mach. Learn., September, 2024

X-Detect: explainable adversarial patch detection for object detectors in retail.
Mach. Learn., September, 2024

Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation.
ACM Comput. Surv., April, 2024

Cost effective transfer of reinforcement learning policies.
Expert Syst. Appl., March, 2024

BENN: Bias Estimation Using a Deep Neural Network.
IEEE Trans. Neural Networks Learn. Syst., January, 2024

DOMBA: Double Model Balancing for Access-Controlled Language Models via Minimum-Bounded Aggregation.
CoRR, 2024

Detection of Compromised Functions in a Serverless Cloud Environment.
CoRR, 2024

GeNet: A Multimodal LLM-Based Co-Pilot for Network Topology and Configuration.
CoRR, 2024

LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI.
CoRR, 2024

RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning.
CoRR, 2024

GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation.
CoRR, 2024

Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring.
CoRR, 2024

CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants.
CoRR, 2024

Prompted Contextual Vectors for Spear-Phishing Detection.
CoRR, 2024

DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers.
CoRR, 2024

GPT in Sheep's Clothing: The Risk of Customized GPTs.
CoRR, 2024

OSSIntegrity: Collaborative open-source code integrity verification.
Comput. Secur., 2024

Secure Crowdsource-Based Open-Source Code Verification (SC)^2V.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Information Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

STFL: Utilizing a Semi-Supervised, Transfer-Learning, Federated-Learning Approach to Detect Phishing URL Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2024

Query-Based External Information Leakage Attacks on Face Recognition Models.
Proceedings of the International Joint Conference on Neural Networks, 2024

Universal Adversarial Attack Against Speaker Recognition Models.
Proceedings of the IEEE International Conference on Acoustics, 2024

Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems.
Proceedings of the Computer Vision - ECCV 2024, 2024

MONTRAGE: Monitoring Training for Attribution of Generative Diffusion Models.
Proceedings of the Computer Vision - ECCV 2024, 2024

DataDetective: Dataset Watermarking for Leaker Identification in ML Training.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

SMART: Serverless Module Analysis and Recognition Technique for Managed Applications.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
CADeSH: Collaborative Anomaly Detection for Smart Homes.
IEEE Internet Things J., May, 2023

Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics.
IEEE Trans. Mob. Comput., April, 2023

D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks.
Comput. Secur., March, 2023

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals.
IEEE Trans. Inf. Forensics Secur., 2023

Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions.
Sensors, 2023

Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems.
ACM Comput. Surv., 2023

QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers.
CoRR, 2023

Evaluating the Security of Satellite Systems.
CoRR, 2023

FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning.
CoRR, 2023

Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks.
CoRR, 2023

IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response.
CoRR, 2023

SoK: Security Below the OS - A Security Analysis of UEFI.
CoRR, 2023

MIRAGE: Multi-Binary Image Risk Assessment with Attack Graph Employment.
CoRR, 2023

Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention.
CoRR, 2023

ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network.
CoRR, 2023

A Survey of MulVAL Extensions and Their Attack Scenarios Coverage.
IEEE Access, 2023

Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Risk Oriented Resource Allocation in Robotic Swarm.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey.
Proceedings of the International Joint Conference on Neural Networks, 2023

ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment.
Proceedings of the Computer Security - ESORICS 2023, 2023

CDGeB: Cloud Data Geolocation Benchmark.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

2022
MulVAL Interaction Rules Mapped to MITRE ATT&CK.
Dataset, July, 2022

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack.
IEEE Trans. Inf. Forensics Secur., 2022

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA.
IEEE Trans. Dependable Secur. Comput., 2022

Analyzing Sequences of Airspace States to Detect Anomalous Traffic Conditions.
IEEE Trans. Aerosp. Electron. Syst., 2022

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks.
Sensors, 2022

Contextual security awareness: A context-based approach for assessing the security awareness of users.
Knowl. Based Syst., 2022

Not all datasets are born equal: On heterogeneous tabular data and adversarial examples.
Knowl. Based Syst., 2022

Cost-effective ensemble models selection using deep reinforcement learning.
Inf. Fusion, 2022

How and when to stop the co-training process.
Expert Syst. Appl., 2022

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.
ACM Comput. Surv., 2022

YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection.
CoRR, 2022

Latent SHAP: Toward Practical Human-Interpretable Explanations.
CoRR, 2022

Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models.
CoRR, 2022

Attacking Object Detector Using A Universal Targeted Label-Switch Patch.
CoRR, 2022

A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection.
CoRR, 2022

Evaluating the Security of Aircraft Systems.
CoRR, 2022

Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation.
CoRR, 2022

AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus.
CoRR, 2022

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks.
CoRR, 2022

Evaluating the Security of Open Radio Access Networks.
CoRR, 2022

On the vulnerability of anti-malware solutions to DNS attacks.
Comput. Secur., 2022

Security of Open Radio Access Networks.
Comput. Secur., 2022

Stop bugging me! Evading modern-day wiretapping using adversarial perturbations.
Comput. Secur., 2022

Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems.
Comput. Secur., 2022

Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings.
IEEE Access, 2022

Fair and accurate age prediction using distribution aware data curation and augmentation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter.
Proceedings of the UMAP '22: 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4, 2022

3D Marketplace: Distributed Attestation of 3D Designs on Blockchain.
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022

Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

FEPC: Fairness Estimation Using Prototypes and Critics for Tabular Data.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks.
Proceedings of the Computer Security - ESORICS 2022, 2022

Prioritizing Antivirus Alerts on Internal Enterprise Machines.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2021
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers.
IEEE Trans. Dependable Secur. Comput., 2021

A Self-Healing Mechanism for Internet of Things Devices.
IEEE Secur. Priv., 2021

Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models.
CoRR, 2021

Dodging Attack Using Carefully Crafted Natural Makeup.
CoRR, 2021

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems.
CoRR, 2021

TRADE: TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain Technology.
CoRR, 2021

DeepStream: Autoencoder-based stream temporal clustering and anomaly detection.
Comput. Secur., 2021

Android malware detection via an app similarity graph.
Comput. Secur., 2021

CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Security and Privacy in the Age of Commercial Drones.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Poisoning attacks on cyber attack detectors for industrial control systems.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

DeepStream: autoencoder-based stream temporal clustering.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Blockchain-based bug bounty framework.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants.
Proceedings of the International Joint Conference on Neural Networks, 2021

Approximating Aggregated SQL Queries with LSTM Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes.
Proceedings of the International Joint Conference on Neural Networks, 2021

FOOD: Fast Out-Of-Distribution Detector.
Proceedings of the International Joint Conference on Neural Networks, 2021

MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic.
Proceedings of the Computer Security - ESORICS 2021, 2021

The Translucent Patch: A Physical and Universal Attack on Object Detectors.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Heuristic Approach for Countermeasure Selection Using Attack Graphs.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
Intrusion Detection System for the MIL-STD-1553 Communication Bus.
IEEE Trans. Aerosp. Electron. Syst., 2020

P4UIoT: Pay-Per-Piece Patch Update Delivery for IoT Using Gradual Release.
Sensors, 2020

The Security of IP-Based Video Surveillance Systems.
Sensors, 2020

Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal.
Sensors, 2020

Botnet IND: About Botnets of Botless IoT Devices.
IACR Cryptol. ePrint Arch., 2020

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers.
CoRR, 2020

Dynamic Adversarial Patch for Evading Object Detection Models.
CoRR, 2020

When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders.
CoRR, 2020

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples.
CoRR, 2020

Adversarial robustness via stochastic regularization of neural activation sensitivity.
CoRR, 2020

Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems.
CoRR, 2020

GLOD: Gaussian Likelihood Out of Distribution Detector.
CoRR, 2020

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions.
CoRR, 2020

Adversarial Learning in the Cyber Security Domain.
CoRR, 2020

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities.
CoRR, 2020

Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks.
CoRR, 2020

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization.
CoRR, 2020

Inner conflict: How smart device components can cause harm.
Comput. Secur., 2020

A novel approach for detecting vulnerable IoT devices connected behind a home NAT.
Comput. Secur., 2020

Passive- and not active-risk tendencies predict cyber security behavior.
Comput. Secur., 2020

MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses.
IEEE Access, 2020

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

DANTE: A Framework for Mining and Monitoring Darknet Traffic.
Proceedings of the Computer Security - ESORICS 2020, 2020

PUA Detection Based on Bundle Installer Characteristics.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Security Ranking of IoT Devices Using an AHP Model.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Helix: DGA Domain Embeddings for Tracking and Exploring Botnets.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Evaluating the Information Security Awareness of Smartphone Users.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Cost-Effective Malware Detection as a Service Over Serverless Cloud Using Deep Reinforcement Learning.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Security Testbed for Internet-of-Things Devices.
IEEE Trans. Reliab., 2019

Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs.
IEEE Trans. Inf. Forensics Secur., 2019

IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution.
Pervasive Mob. Comput., 2019

Constraint learning based gradient boosting trees.
Expert Syst. Appl., 2019

3D Marketplace: Distributed Attestation of 3D Designs on Blockchain.
CoRR, 2019

Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks.
CoRR, 2019

Heuristic Approach Towards Countermeasure Selection using Attack Graphs.
CoRR, 2019

Challenges for Security Assessment of Enterprises in the IoT Era.
CoRR, 2019

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR, 2019

VizADS-B: Analyzing Sequences of ADS-B Images Using Explainable Convolutional LSTM Encoder-Decoder to Detect Cyber Attacks.
CoRR, 2019

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup.
CoRR, 2019

ASPIRE: Automated Security Policy Implementation Using Reinforcement Learning.
CoRR, 2019

SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps.
CoRR, 2019

MaskDGA: A Black-box Evasion Technique Against DGA Classifiers and Adversarial Defenses.
CoRR, 2019

Defense Methods Against Adversarial Examples for Recurrent Neural Networks.
CoRR, 2019

Detection of malicious and low throughput data exfiltration over the DNS protocol.
Comput. Secur., 2019

Network bottlenecks in OLSR based ad-hoc networks.
Ad Hoc Networks, 2019

Improving Grid-Based Location Prediction Algorithms by Speed and Direction Based Boosting.
IEEE Access, 2019

Deployment optimization of IoT devices through attack graph analysis.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

A Weighted Risk Score Model for IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Design Procedure of Knowledge Base for Practical Attack Graph Generation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Security Analysis of Radar Systems.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
detection_of_IoT_botnet_attacks_N_BaIoT.
Dataset, March, 2018

Socialbots.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Vertical Ensemble Co-Training for Text Classification.
ACM Trans. Intell. Syst. Technol., 2018

N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders.
IEEE Pervasive Comput., 2018

Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis.
IEEE Intell. Syst., 2018

MDGAN: Boosting Anomaly Detection Using Multi-Discriminator Generative Adversarial Networks.
CoRR, 2018

Piping Botnet - Turning Green Technology into a Water Disaster.
CoRR, 2018

Generation of Automatic and Realistic Artificial Profiles.
CoRR, 2018

Anomaly detection; Industrial control systems; convolutional neural networks.
CoRR, 2018

Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018

Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages.
Comput. Secur., 2018

Taxonomy of mobile users' security awareness.
Comput. Secur., 2018

Leaking data from enterprise networks using a compromised smartwatch device.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

On the Security of MIL-STD-1553 Communication Bus.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
Proceedings of the Computer Security, 2018

Session details: AI for Detecting Attacks.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Session details: AI for Detecting Software Vulnerabilities.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

11th International Workshop on Artificial Intelligence and Security (AISec 2018).
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

ProfileGen: Generation of Automatic and Realistic Artificial Profiles.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks.
IEEE Trans. Mob. Comput., 2017

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Soc. Syst., 2017

Anomaly detection for smartphone data streams.
Pervasive Mob. Comput., 2017

Dynamic radius and confidence prediction in grid-based location prediction algorithms.
Pervasive Mob. Comput., 2017

Personal-discount sensitivity prediction for mobile coupon conversion optimization.
J. Assoc. Inf. Sci. Technol., 2017

Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem.
Neurocomputing, 2017

Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017

Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.
CoRR, 2017

Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017

Classification of Smartphone Users Using Internet Traffic.
CoRR, 2017

Shattered Trust: When Replacement Smartphone Components Attack.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017

A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Advanced Security Testbed Framework for Wearable IoT Devices.
ACM Trans. Internet Techn., 2016

Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes.
IEEE Trans. Mob. Comput., 2016

Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016

Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
Secur. Informatics, 2016

Security Testbed for the Internet of Things.
CoRR, 2016

Anomaly Detection Using the Knowledge-based Temporal Abstraction Method.
CoRR, 2016

The Security of WebRTC.
CoRR, 2016

Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis.
Cogn. Comput., 2016

Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Neighbor Contamination to Achieve Complete Bottleneck Control.
Proceedings of the 19th ACM International Conference on Modeling, 2016

POSTER: Towards Exposing Internet of Things: A Roadmap.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Evaluation of Security Solutions for Android Systems.
CoRR, 2015

Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Up-High to Down-Low: Applying Machine Learning to an Exploit Database.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Towards Security of Native DRM Execution in HTML5.
Proceedings of the 2015 IEEE International Symposium on Multimedia, 2015

Noise Reduction of Mobile Sensors Data in the Prediction of Demographic Attributes.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

Sensor-Based Approach for Predicting Departure Time of Smartphone Users.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

Hunting Organization-Targeted Socialbots.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Leak Sinks: The Threat of Targeted Social Eavesdropping.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Adapted Features and Instance Selection for Improving Co-training.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage.
IEEE Trans. Knowl. Data Eng., 2014

TM-Score: A Misuseability Weight Measure for Textual Content.
IEEE Trans. Inf. Forensics Secur., 2014

ConfDTree: A Statistical Method for Improving Decision Trees.
J. Comput. Sci. Technol., 2014

Anti-Reconnaissance Tools: Detecting Targeted Socialbots.
IEEE Internet Comput., 2014

Dynamic Latent Expertise Mining in Social Networks.
IEEE Internet Comput., 2014

Mobile malware detection through analysis of deviations in application network behavior.
Comput. Secur., 2014

ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

POSTER: Misuseablity Analysis for IT Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Optimizing Data Misuse Detection.
ACM Trans. Knowl. Discov. Data, 2013

Analyzing group E-mail exchange to detect data leakage.
J. Assoc. Inf. Sci. Technol., 2013

Content-based data leakage detection using extended fingerprinting
CoRR, 2013

Detecting malware through temporal function-based features.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

IP2User - Identifying the Username of an IP Address in Network-Related Events.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
A Survey of Data Leakage Detection and Prevention Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012

M-Score: A Misuseability Weight Measure.
IEEE Trans. Dependable Secur. Comput., 2012

Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Secur. Informatics, 2012

A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions.
J. Intell. Inf. Syst., 2012

"Andromaly": a behavioral malware detection framework for android devices.
J. Intell. Inf. Syst., 2012

ConfDTree: Improving Decision Trees Using Confidence Intervals.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

2011
F-Sign: Automatic, Function-Based Signature Generation for Malware.
IEEE Trans. Syst. Man Cybern. Part C, 2011

Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content.
Secur. Commun. Networks, 2011

Eliciting domain expert misuseability conceptions.
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011

Analyzing group communication for preventing data leakage via email.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Dynamic Sensitivity-Based Access Control.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

HoneyGen: An automated honeytokens generator.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.
J. Comput. Virol., 2010

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method.
J. Syst. Softw., 2010

Google Android: A Comprehensive Security Assessment.
IEEE Secur. Priv., 2010

Securing Android-Powered Mobile Devices Using SELinux.
IEEE Secur. Priv., 2010

Analyzing Group Communication for Preventing Accidental Data Leakage via Email.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

Applying Behavioral Detection on Android-Based Devices.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010

Google Android: An Updated Security Review.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Malware Detection on Mobile Devices.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Automated Static Code Analysis for Classifying Android Applications Using Machine Learning.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

M-score: estimating the potential damage of data leakage incident by assigning misuseability weight.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

Detecting data misuse by applying context-based data linkage.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

2009
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Secur. Tech. Rep., 2009

Improving malware detection by applying multi-inducer ensemble.
Comput. Stat. Data Anal., 2009

Google Android: A State-of-the-Art Review of Security Mechanisms
CoRR, 2009

Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

2007
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007

Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain.
Proceedings of the 4th International Conference on Knowledge Capture (K-CAP 2007), 2007

2006
An intelligent, interactive tool for exploration and visualization of time-oriented security data.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006


  Loading...