Ron Biton

Orcid: 0000-0001-8942-9783

According to our database1, Ron Biton authored at least 40 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improving interpretability via regularization of neural activation sensitivity.
Mach. Learn., September, 2024

Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation.
ACM Comput. Surv., April, 2024

Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking.
CoRR, 2024

A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares.
CoRR, 2024

Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications.
CoRR, 2024

2023
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks.
Comput. Secur., March, 2023

Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems.
ACM Comput. Surv., 2023

ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment.
Proceedings of the Computer Security - ESORICS 2023, 2023

The Adversarial Implications of Variable-Time Inference.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Contextual security awareness: A context-based approach for assessing the security awareness of users.
Knowl. Based Syst., 2022

Latent SHAP: Toward Practical Human-Interpretable Explanations.
CoRR, 2022

Attacking Object Detector Using A Universal Targeted Label-Switch Patch.
CoRR, 2022

Evaluating the Security of Aircraft Systems.
CoRR, 2022

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks.
CoRR, 2022

Evaluating the Security of Open Radio Access Networks.
CoRR, 2022

On the vulnerability of anti-malware solutions to DNS attacks.
Comput. Secur., 2022

Security of Open Radio Access Networks.
Comput. Secur., 2022

2021
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers.
IEEE Trans. Dependable Secur. Comput., 2021

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems.
CoRR, 2021

SoK: Security and Privacy in the Age of Commercial Drones.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Heuristic Approach for Countermeasure Selection Using Attack Graphs.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
Adversarial robustness via stochastic regularization of neural activation sensitivity.
CoRR, 2020

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions.
CoRR, 2020

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities.
CoRR, 2020

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization.
CoRR, 2020

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Evaluating the Information Security Awareness of Smartphone Users.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution.
Pervasive Mob. Comput., 2019

Heuristic Approach Towards Countermeasure Selection using Attack Graphs.
CoRR, 2019

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR, 2019

Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Design Procedure of Knowledge Base for Practical Attack Graph Generation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Taxonomy of mobile users' security awareness.
Comput. Secur., 2018

Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
Proceedings of the Computer Security, 2018

2017
Classification of Smartphone Users Using Internet Traffic.
CoRR, 2017

A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2015
Sensor-Based Approach for Predicting Departure Time of Smartphone Users.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015


  Loading...