Ron Biton

According to our database1, Ron Biton authored at least 15 papers between 2015 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution.
Pervasive and Mobile Computing, 2019

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures.
CoRR, 2019

Heuristic Approach Towards Countermeasure Selection using Attack Graphs.
CoRR, 2019

Evaluating the Information Security Awareness of Smartphone Users.
CoRR, 2019

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR, 2019

Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Design Procedure of Knowledge Base for Practical Attack Graph Generation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices.
CoRR, 2018

Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution.
CoRR, 2018

Taxonomy of mobile users' security awareness.
Computers & Security, 2018

Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
Proceedings of the Computer Security, 2018

2017
Classification of Smartphone Users Using Internet Traffic.
CoRR, 2017

A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2015
Sensor-Based Approach for Predicting Departure Time of Smartphone Users.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015


  Loading...