Ivan Homoliak
Orcid: 0000-0002-0790-0875
According to our database1,
Ivan Homoliak
authored at least 49 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering.
CoRR, 2024
SoK: Cryptocurrency Wallets - A Security Review and Classification based on Authentication Factors.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
IEEE Trans. Emerg. Top. Comput., 2023
CBDC-AquaSphere: Interoperable Central Bank Digital Currency Built on Trusted Computing and Blockchain.
CoRR, 2023
Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule.
CoRR, 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the IEEE International Conference on Blockchain, 2023
BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting.
Proceedings of the IEEE International Conference on Blockchain, 2023
Mitigating Undercutting Attacks: Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule.
Proceedings of the IEEE International Conference on Blockchain, 2023
2022
ASNM Datasets: A Collection of Network Traffic Data for Testing of Adversarial Classifiers and Network Intrusion Detectors.
Dataset, May, 2022
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version).
IEEE Internet Things J., 2022
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management.
CoRR, 2022
Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
J. Netw. Comput. Appl., 2021
DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy.
CoRR, 2021
The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses.
IEEE Commun. Surv. Tutorials, 2021
2020
CoRR, 2020
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors.
IEEE Access, 2020
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020
2019
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach.
EAI Endorsed Trans. Security Safety, 2019
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
ACM Comput. Surv., 2019
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors.
CoRR, 2019
The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses.
CoRR, 2019
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version).
CoRR, 2019
IEEE Access, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
2017
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset.
J. Comput., 2017
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
2016
PhD thesis, 2016
Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection.
Proceedings of the Security and Privacy in Communication Networks, 2016
On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016
2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014