Polina Zilberman

Orcid: 0000-0003-3593-7330

According to our database1, Polina Zilberman authored at least 22 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MABAT: A Multi-Armed Bandit Approach for Threat-Hunting.
IEEE Trans. Inf. Forensics Secur., 2023

Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Attack DB OTX-XFORCE-VT.
Dataset, May, 2022

2021
Spillover Today? Predicting Traffic Overflows on Private Peering of Major Content Providers.
IEEE Trans. Netw. Serv. Manag., 2021

2020
PALE: Time Bounded Practical Agile Leader Election.
IEEE Trans. Parallel Distributed Syst., 2020

Predicting traffic overflows on private peering.
CoRR, 2020

ATHAFI: Agile Threat Hunting And Forensic Investigation.
CoRR, 2020

SoK: A Survey of Open Source Threat Emulators.
CoRR, 2020

2019
Attack Hypothesis Generation.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
PALE: Partially Asynchronous Agile Leader Election.
CoRR, 2018

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

2017
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Secur. Comput., 2017

DiscOF: Balanced flow discovery in OpenFlow.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

2016
Floware: Balanced Flow Monitoring in Software Defined Networks.
CoRR, 2016

2015
Topology manipulations for speeding betweenness centrality computation.
J. Complex Networks, 2015

2013
Analyzing group E-mail exchange to detect data leakage.
J. Assoc. Inf. Sci. Technol., 2013

2012
Heuristics for Speeding Up Betweenness Centrality Computation.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering.
Int. J. Found. Comput. Sci., 2011

Analyzing group communication for preventing data leakage via email.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2010
Analyzing Group Communication for Preventing Accidental Data Leakage via Email.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

2009
Incremental deployment of network monitors based on Group Betweenness Centrality.
Inf. Process. Lett., 2009


  Loading...