Dudu Mimran

Orcid: 0009-0004-9610-6156

According to our database1, Dudu Mimran authored at least 21 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Adversarial machine learning threat analysis and remediation in Open Radio Access Network (O-RAN).
J. Netw. Comput. Appl., 2025

CORAL: Container Online Risk Assessment with Logical attack graphs.
Comput. Secur., 2025

Detection of compromised functions in a serverless cloud environment.
Comput. Secur., 2025

2024
Detection of Compromised Functions in a Serverless Cloud Environment.
CoRR, 2024

LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI.
CoRR, 2024

GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation.
CoRR, 2024

Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring.
CoRR, 2024

CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants.
CoRR, 2024

OSSIntegrity: Collaborative open-source code integrity verification.
Comput. Secur., 2024

Secure Crowdsource-Based Open-Source Code Verification (SC)^2V.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

SMART: Serverless Module Analysis and Recognition Technique for Managed Applications.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2022
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks.
CoRR, 2022

Evaluating the Security of Open Radio Access Networks.
CoRR, 2022

Security of Open Radio Access Networks.
Comput. Secur., 2022

2015
Evaluation of Security Solutions for Android Systems.
CoRR, 2015

2014
Mobile malware detection through analysis of deviations in application network behavior.
Comput. Secur., 2014

2013
Nesto - Network selection and traffic offloading system for android mobile devices.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

2012
Detection of Deviations in Mobile Applications Network Behavior
CoRR, 2012

2008
All the news that's fit to e-ink.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008


  Loading...