Ron Biton
Orcid: 0000-0001-8942-9783
According to our database1,
Ron Biton
authored at least 40 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Mach. Learn., September, 2024
ACM Comput. Surv., April, 2024
Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking.
CoRR, 2024
A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares.
CoRR, 2024
Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications.
CoRR, 2024
2023
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks.
Comput. Secur., March, 2023
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems.
ACM Comput. Surv., 2023
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Contextual security awareness: A context-based approach for assessing the security awareness of users.
Knowl. Based Syst., 2022
CoRR, 2022
2021
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers.
IEEE Trans. Dependable Secur. Comput., 2021
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems.
CoRR, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
Adversarial robustness via stochastic regularization of neural activation sensitivity.
CoRR, 2020
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions.
CoRR, 2020
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities.
CoRR, 2020
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization.
CoRR, 2020
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution.
Pervasive Mob. Comput., 2019
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR, 2019
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018
Proceedings of the Computer Security, 2018
2017
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
2015
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015