Asaf Shabtai
Orcid: 0000-0003-0630-4059
According to our database1,
Asaf Shabtai
authored at least 263 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Mach. Learn., September, 2024
Mach. Learn., September, 2024
ACM Comput. Surv., April, 2024
Expert Syst. Appl., March, 2024
IEEE Trans. Neural Networks Learn. Syst., January, 2024
DOMBA: Double Model Balancing for Access-Controlled Language Models via Minimum-Bounded Aggregation.
CoRR, 2024
CoRR, 2024
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI.
CoRR, 2024
CoRR, 2024
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation.
CoRR, 2024
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring.
CoRR, 2024
CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants.
CoRR, 2024
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers.
CoRR, 2024
Comput. Secur., 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
STFL: Utilizing a Semi-Supervised, Transfer-Learning, Federated-Learning Approach to Detect Phishing URL Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems.
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
SMART: Serverless Module Analysis and Recognition Technique for Managed Applications.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024
2023
IEEE Internet Things J., May, 2023
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics.
IEEE Trans. Mob. Comput., April, 2023
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks.
Comput. Secur., March, 2023
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals.
IEEE Trans. Inf. Forensics Secur., 2023
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions.
Sensors, 2023
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems.
ACM Comput. Surv., 2023
CoRR, 2023
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning.
CoRR, 2023
Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks.
CoRR, 2023
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response.
CoRR, 2023
Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention.
CoRR, 2023
ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network.
CoRR, 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey.
Proceedings of the International Joint Conference on Neural Networks, 2023
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Aerosp. Electron. Syst., 2022
Contextual security awareness: A context-based approach for assessing the security awareness of users.
Knowl. Based Syst., 2022
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples.
Knowl. Based Syst., 2022
Inf. Fusion, 2022
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.
ACM Comput. Surv., 2022
CoRR, 2022
CoRR, 2022
A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection.
CoRR, 2022
Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation.
CoRR, 2022
AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus.
CoRR, 2022
CoRR, 2022
Comput. Secur., 2022
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems.
Comput. Secur., 2022
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings.
IEEE Access, 2022
Fair and accurate age prediction using distribution aware data curation and augmentation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022
HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter.
Proceedings of the UMAP '22: 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4, 2022
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
2021
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers.
IEEE Trans. Dependable Secur. Comput., 2021
CoRR, 2021
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems.
CoRR, 2021
CoRR, 2021
Comput. Secur., 2021
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
IEEE Trans. Aerosp. Electron. Syst., 2020
Sensors, 2020
Sensors, 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
Adversarial robustness via stochastic regularization of neural activation sensitivity.
CoRR, 2020
Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems.
CoRR, 2020
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions.
CoRR, 2020
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities.
CoRR, 2020
Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks.
CoRR, 2020
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization.
CoRR, 2020
Comput. Secur., 2020
Comput. Secur., 2020
IEEE Access, 2020
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Cost-Effective Malware Detection as a Service Over Serverless Cloud Using Deep Reinforcement Learning.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution.
Pervasive Mob. Comput., 2019
Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks.
CoRR, 2019
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR, 2019
VizADS-B: Analyzing Sequences of ADS-B Images Using Explainable Convolutional LSTM Encoder-Decoder to Detect Cyber Attacks.
CoRR, 2019
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup.
CoRR, 2019
CoRR, 2019
SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps.
CoRR, 2019
MaskDGA: A Black-box Evasion Technique Against DGA Classifiers and Adversarial Defenses.
CoRR, 2019
CoRR, 2019
Comput. Secur., 2019
Improving Grid-Based Location Prediction Algorithms by Speed and Direction Based Boosting.
IEEE Access, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
ACM Trans. Intell. Syst. Technol., 2018
IEEE Pervasive Comput., 2018
Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis.
IEEE Intell. Syst., 2018
MDGAN: Boosting Anomaly Detection Using Multi-Discriminator Generative Adversarial Networks.
CoRR, 2018
CoRR, 2018
Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018
Comput. Secur., 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
IEEE Trans. Mob. Comput., 2017
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Soc. Syst., 2017
Dynamic radius and confidence prediction in grid-based location prediction algorithms.
Pervasive Mob. Comput., 2017
J. Assoc. Inf. Sci. Technol., 2017
Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem.
Neurocomputing, 2017
Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.
CoRR, 2017
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
2016
ACM Trans. Internet Techn., 2016
IEEE Trans. Mob. Comput., 2016
ACM Trans. Inf. Syst. Secur., 2016
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
Secur. Informatics, 2016
Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis.
Cogn. Comput., 2016
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016
Proceedings of the 19th ACM International Conference on Modeling, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
2015
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015
Proceedings of the 2015 IEEE International Symposium on Multimedia, 2015
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Inf. Forensics Secur., 2014
J. Comput. Sci. Technol., 2014
IEEE Internet Comput., 2014
Mobile malware detection through analysis of deviations in application network behavior.
Comput. Secur., 2014
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
J. Assoc. Inf. Sci. Technol., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the IEEE International Congress on Big Data, 2013
2012
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012
Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Secur. Informatics, 2012
A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions.
J. Intell. Inf. Syst., 2012
J. Intell. Inf. Syst., 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
2011
IEEE Trans. Syst. Man Cybern. Part C, 2011
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content.
Secur. Commun. Networks, 2011
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.
J. Comput. Virol., 2010
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method.
J. Syst. Softw., 2010
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
2009
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Secur. Tech. Rep., 2009
Comput. Stat. Data Anal., 2009
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
2007
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007
Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain.
Proceedings of the 4th International Conference on Knowledge Capture (K-CAP 2007), 2007
2006
An intelligent, interactive tool for exploration and visualization of time-oriented security data.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006