Yuval Elovici

Orcid: 0000-0002-9641-128X

Affiliations:
  • Telekom Innovation Laboratories at Ben-Gurion University of the Negev, Beer-Sheva, Israel


According to our database1, Yuval Elovici authored at least 447 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BENN: Bias Estimation Using a Deep Neural Network.
IEEE Trans. Neural Networks Learn. Syst., January, 2024

Enhancing Energy Sector Resilience: Integrating Security by Design Principles.
CoRR, 2024

DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers.
CoRR, 2024

GPT in Sheep's Clothing: The Risk of Customized GPTs.
CoRR, 2024

2023
How Polynomial Regression Improves DeNATing.
IEEE Trans. Netw. Serv. Manag., December, 2023

IoT device identification based on network communication analysis using deep learning.
J. Ambient Intell. Humaniz. Comput., July, 2023

Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics.
IEEE Trans. Mob. Comput., April, 2023

CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals.
IEEE Trans. Inf. Forensics Secur., 2023

Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph.
IEEE Trans. Dependable Secur. Comput., 2023

Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions.
Sensors, 2023

Adversarial Attacks Against IoT Identification Systems.
IEEE Internet Things J., 2023

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
IACR Cryptol. ePrint Arch., 2023

Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED.
IACR Cryptol. ePrint Arch., 2023

Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems.
ACM Comput. Surv., 2023

QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers.
CoRR, 2023

Evaluating the Security of Satellite Systems.
CoRR, 2023

FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning.
CoRR, 2023

Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks.
CoRR, 2023

IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response.
CoRR, 2023

SoK: Security Below the OS - A Security Analysis of UEFI.
CoRR, 2023

X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail.
CoRR, 2023

The Threat of Offensive AI to Organizations.
Comput. Secur., 2023

Protecting Autonomous Cars from Phantom Attacks.
Commun. ACM, 2023

The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Risk Oriented Resource Allocation in Robotic Swarm.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey.
Proceedings of the International Joint Conference on Neural Networks, 2023

Large-Scale Shill Bidder Detection in E-commerce.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023

Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

CDGeB: Cloud Data Geolocation Benchmark.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

The Adversarial Implications of Variable-Time Inference.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
Toward Scalable and Unified Example-Based Explanation and Outlier Detection.
IEEE Trans. Image Process., 2022

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack.
IEEE Trans. Inf. Forensics Secur., 2022

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices.
Sensors, 2022

Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream.
Sensors, 2022

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks.
Sensors, 2022

Not all datasets are born equal: On heterogeneous tabular data and adversarial examples.
Knowl. Based Syst., 2022

A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective.
J. Digit. Imaging, 2022

HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version).
IEEE Internet Things J., 2022

Enhancing real-world adversarial patches through 3D modeling of complex target scenes.
Neurocomputing, 2022

The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects.
IACR Cryptol. ePrint Arch., 2022

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.
ACM Comput. Surv., 2022

YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection.
CoRR, 2022

Latent SHAP: Toward Practical Human-Interpretable Explanations.
CoRR, 2022

Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models.
CoRR, 2022

Attacking Object Detector Using A Universal Targeted Label-Switch Patch.
CoRR, 2022

Transferability Ranking of Adversarial Examples.
CoRR, 2022

EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome.
CoRR, 2022

AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus.
CoRR, 2022

The Security of Deep Learning Defences for Medical Imaging.
CoRR, 2022

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks.
CoRR, 2022

Evaluating the Security of Open Radio Access Networks.
CoRR, 2022

VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream.
CoRR, 2022

Optical Speech Recovery From Desktop Speakers.
Computer, 2022

Security of Open Radio Access Networks.
Comput. Secur., 2022

Stop bugging me! Evading modern-day wiretapping using adversarial perturbations.
Comput. Secur., 2022

A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices.
Artif. Intell. Medicine, 2022

Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings.
IEEE Access, 2022

Fair and accurate age prediction using distribution aware data curation and augmentation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.
Proceedings of the 31st USENIX Security Symposium, 2022

HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter.
Proceedings of the UMAP '22: 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4, 2022

3D Marketplace: Distributed Attestation of 3D Designs on Blockchain.
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022

Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

FEPC: Fairness Estimation Using Prototypes and Critics for Tabular Data.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks.
Proceedings of the Computer Security - ESORICS 2022, 2022

Prioritizing Antivirus Alerts on Internal Enterprise Machines.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2021
Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks.
IEEE Trans. Neural Networks Learn. Syst., 2021

Detecting Spying Drones.
IEEE Secur. Priv., 2021

A Self-Healing Mechanism for Internet of Things Devices.
IEEE Secur. Priv., 2021

Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED.
IACR Cryptol. ePrint Arch., 2021

Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models.
CoRR, 2021

Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples.
CoRR, 2021

Dodging Attack Using Carefully Crafted Natural Makeup.
CoRR, 2021

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems.
CoRR, 2021

The Threat of Offensive AI to Organizations.
CoRR, 2021

Who's Afraid of Adversarial Transferability?
CoRR, 2021

Enhancing Real-World Adversarial Patches with 3D Modeling Techniques.
CoRR, 2021

CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Security and Privacy in the Age of Commercial Drones.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants.
Proceedings of the International Joint Conference on Neural Networks, 2021

Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021

FOOD: Fast Out-Of-Distribution Detector.
Proceedings of the International Joint Conference on Neural Networks, 2021

The Translucent Patch: A Physical and Universal Attack on Object Detectors.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Heuristic Approach for Countermeasure Selection Using Attack Graphs.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Game of Drones - Detecting Spying Drones Using Time Domain Analysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

POSTER: Recovering Songs from a Hanging Light Bulb.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
PALE: Time Bounded Practical Agile Leader Election.
IEEE Trans. Parallel Distributed Syst., 2020

ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
IEEE Trans. Inf. Forensics Secur., 2020

PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines.
IEEE Trans. Inf. Forensics Secur., 2020

User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study.
IEEE Trans. Inf. Forensics Secur., 2020

Intrusion Detection System for the MIL-STD-1553 Communication Bus.
IEEE Trans. Aerosp. Electron. Syst., 2020

The Security of IP-Based Video Surveillance Systems.
Sensors, 2020

Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal.
Sensors, 2020

Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
Neural Networks, 2020

Lightweight collaborative anomaly detection for the IoT using blockchain.
J. Parallel Distributed Comput., 2020

Speaker-to-speaker covert ultrasonic communication.
J. Inf. Secur. Appl., 2020

The Age of Testifying Wearable Devices: The Case of Intoxication Detection.
IACR Cryptol. ePrint Arch., 2020

Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations.
IACR Cryptol. ePrint Arch., 2020

Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems.
IACR Cryptol. ePrint Arch., 2020

Botnet IND: About Botnets of Botless IoT Devices.
IACR Cryptol. ePrint Arch., 2020

Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity.
CoRR, 2020

Deja vu from the SVM Era: Example-based Explanations with Outlier Detection.
CoRR, 2020

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers.
CoRR, 2020

Dynamic Adversarial Patch for Evading Object Detection Models.
CoRR, 2020

When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders.
CoRR, 2020

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples.
CoRR, 2020

Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems.
CoRR, 2020

GLOD: Gaussian Likelihood Out of Distribution Detector.
CoRR, 2020

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions.
CoRR, 2020

Adversarial Learning in the Cyber Security Domain.
CoRR, 2020

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities.
CoRR, 2020

ATHAFI: Agile Threat Hunting And Forensic Investigation.
CoRR, 2020

A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation.
CoRR, 2020

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization.
CoRR, 2020

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness.
CoRR, 2020

A novel approach for detecting vulnerable IoT devices connected behind a home NAT.
Comput. Secur., 2020

Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise.
Comput. Secur., 2020

CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices.
IEEE Access, 2020

MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images.
IEEE Access, 2020

OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis framework.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Adaptive Noise Injection for Training Stochastic Student Networks from Deterministic Teachers.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

DANTE: A Framework for Mining and Monitoring Darknet Traffic.
Proceedings of the Computer Security - ESORICS 2020, 2020

Security Ranking of IoT Devices Using an AHP Model.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

IoT Device Identification Using Deep Learning.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Helix: DGA Domain Embeddings for Tracking and Exploring Botnets.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions.
Proceedings of the Artificial Intelligence in Medicine, 2020

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Security Testbed for Internet-of-Things Devices.
IEEE Trans. Reliab., 2019

Xerox Day Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2019

Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs.
IEEE Trans. Inf. Forensics Secur., 2019

Digital Audio Signature for 3D Printing Integrity.
IEEE Trans. Inf. Forensics Secur., 2019

Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service.
EAI Endorsed Trans. Security Safety, 2019

Improving the effectiveness of intrusion detection systems for hierarchical data.
Knowl. Based Syst., 2019

Using malware for the greater good: Mitigating data leakage.
J. Netw. Comput. Appl., 2019

SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT.
IEEE Internet Things J., 2019

Dynamic Malware Analysis in the Modern Era - A State of the Art Survey.
ACM Comput. Surv., 2019

Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
ACM Comput. Surv., 2019

Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks.
CoRR, 2019

3D Marketplace: Distributed Attestation of 3D Designs on Blockchain.
CoRR, 2019

Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn.
CoRR, 2019

TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs.
CoRR, 2019

Heuristic Approach Towards Countermeasure Selection using Attack Graphs.
CoRR, 2019

Challenges for Security Assessment of Enterprises in the IoT Era.
CoRR, 2019

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR, 2019

MobilBye: Attacking ADAS with Camera Spoofing.
CoRR, 2019

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup.
CoRR, 2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version).
CoRR, 2019

SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps.
CoRR, 2019

Defense Methods Against Adversarial Examples for Recurrent Neural Networks.
CoRR, 2019

Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud.
Comput. Secur., 2019

Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis.
Comput. Secur., 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework.
IEEE Access, 2019

Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures.
IEEE Access, 2019

CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning.
Proceedings of the 28th USENIX Security Symposium, 2019

PIT: A Probe Into Internet of Things by Comprehensive Security Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Weighted Risk Score Model for IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Drones' Cryptanalysis - Smashing Cryptography with a Flicker.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

A Neural Attention Model for Real-Time Network Intrusion Detection.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics.
Proceedings of the International Joint Conference on Neural Networks, 2019

TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning.
Proceedings of the International Joint Conference on Neural Networks, 2019

Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces.
Proceedings of the International Joint Conference on Neural Networks, 2019

CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Design Procedure of Knowledge Base for Practical Attack Graph Generation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Security Analysis of Radar Systems.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Incentives in Collaborative Applications.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback.
IEEE Trans. Inf. Forensics Secur., 2018

Generic anomalous vertices detection utilizing a link prediction algorithm.
Soc. Netw. Anal. Min., 2018

N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders.
IEEE Pervasive Comput., 2018

Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining.
Knowl. Based Syst., 2018

Reverse Engineering IoT Devices: Effective Techniques and Methods.
IEEE Internet Things J., 2018

Handwritten Signature Verification Using Wrist-Worn Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Introduction to the Special Issue on Data Mining for Cybersecurity.
IEEE Intell. Syst., 2018

Quantifying the resilience of machine learning classifiers used for cyber security.
Expert Syst. Appl., 2018

Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods.
Expert Syst. Appl., 2018

Piping Botnet - Turning Green Technology into a Water Disaster.
CoRR, 2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018

Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018

CIoTA: Collaborative IoT Anomaly Detection via Blockchain.
CoRR, 2018

MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication.
CoRR, 2018

ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
CoRR, 2018

MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields.
CoRR, 2018

Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices.
CoRR, 2018

PALE: Partially Asynchronous Agile Leader Election.
CoRR, 2018

Game of Drones - Detecting Streamed POI from Encrypted FPV Channel.
CoRR, 2018

Bridgeware: the air-gap malware.
Commun. ACM, 2018

Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study.
Proceedings of the 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems, 2018

Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn?
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2018

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Leaking data from enterprise networks using a compromised smartwatch device.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Ransomware prevention using application authentication-based file access control.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Mining Subgraphs from Propagation Networks through Temporal Dynamic Analysis.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018

PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Liability Exposure when 3D-Printed Parts Fall from the Sky.
Proceedings of the Critical Infrastructure Protection XII, 2018

DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN.
Proceedings of the IEEE International Conference on Data Mining, 2018

On the Security of MIL-STD-1553 Communication Bus.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
Proceedings of the Computer Security, 2018

MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs.
Proceedings of the Database Systems for Advanced Applications, 2018

SMuF: State Machine Based Mutational Fuzzing Framework for Internet of Things.
Proceedings of the Critical Information Infrastructures Security, 2018

Session details: AI for Forensics.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

11th International Workshop on Artificial Intelligence and Security (AISec 2018).
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Cyber Security and the Role of Intelligent Systems in Addressing its Challenges.
ACM Trans. Intell. Syst. Technol., 2017

Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack.
ACM Trans. Intell. Syst. Technol., 2017

ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology.
IEEE Trans. Inf. Forensics Secur., 2017

On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Secur. Comput., 2017

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Soc. Syst., 2017

Anomaly detection for smartphone data streams.
Pervasive Mob. Comput., 2017

aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR).
CoRR, 2017

Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017

Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing.
CoRR, 2017

Temporal Pattern Discovery for Accurate Sepsis Diagnosis in ICU Patients.
CoRR, 2017

Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.
CoRR, 2017

Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017

MindDesktop: a general purpose brain computer interface.
CoRR, 2017

Oops!...I think I scanned a malware.
CoRR, 2017

HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System.
CoRR, 2017

xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs.
CoRR, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED.
CoRR, 2017

Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing.
CoRR, 2017

Network Flow Watermarking: A Survey.
IEEE Commun. Surv. Tutorials, 2017

USB-based attacks.
Comput. Secur., 2017

Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods.
Artif. Intell. Medicine, 2017

SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

dr0wned - Cyber-Physical Attack with Additive Manufacturing.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Scholarly Digital Libraries as a Platform for Malware Distribution.
Proceedings of the A Systems Approach to Cyber Security, 2017

Cyber security patrol: detecting fake and vulnerable wifi-enabled printers.
Proceedings of the Symposium on Applied Computing, 2017

Enhanced situation space mining for data streams.
Proceedings of the Symposium on Applied Computing, 2017

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017

On packet loss modeling: An empirical assessment.
Proceedings of the 8th International Conference on the Network of the Future, 2017

Evaluation of Additive and Subtractive Manufacturing from the Security Perspective.
Proceedings of the Critical Infrastructure Protection XI, 2017

Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk.
Proceedings of the 13th International Conference on Natural Computation, 2017

Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data.
Proceedings of the 13th International Conference on Natural Computation, 2017

A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

9-1-1 DDoS: Attacks, Analysis and Mitigation.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration').
Proceedings of the Computer Security - ESORICS 2017, 2017

LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

A Lightweight Vulnerability Mitigation Framework for IoT Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2017

How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Advanced Security Testbed Framework for Wearable IoT Devices.
ACM Trans. Internet Techn., 2016

Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016

Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
Secur. Informatics, 2016

ALDROID: efficient update of Android anti-virus software using designated active learning methods.
Knowl. Inf. Syst., 2016

Improving condition severity classification with an efficient active learning based framework.
J. Biomed. Informatics, 2016

XML-AD: Detecting anomalous patterns in XML documents.
Inf. Sci., 2016

Matching entities across online social networks.
Neurocomputing, 2016

SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
Expert Syst. Appl., 2016

A particle swarm model for estimating reliability and scheduling system maintenance.
Enterp. Inf. Syst., 2016

Security Testbed for the Internet of Things.
CoRR, 2016

Virtual Breathalyzer.
CoRR, 2016

Handwritten Signature Verification Using Hand-Worn Devices.
CoRR, 2016

Unsupervised Anomalous Vertices Detection Utilizing Link Prediction Algorithms.
CoRR, 2016

DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise.
CoRR, 2016

Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers.
CoRR, 2016

9-1-1 DDoS: Threat, Analysis and Mitigation.
CoRR, 2016

VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap.
CoRR, 2016

dr0wned - Cyber-Physical Attack with Additive Manufacturing.
CoRR, 2016

A model of the information security investment decision-making process.
Comput. Secur., 2016

Guided socialbots: Infiltrating the social networks of specific organizations' employees.
AI Commun., 2016

USBee: Air-gap covert-channel via electromagnetic emission from USB.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

An optical covert-channel to leak data through an air-gap.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

Personal Information Leakage During Password Recovery of Internet Services.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

POSTER: Towards Exposing Internet of Things: A Roadmap.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Active Discovery of Hidden Profiles in Social Networks Using Malware.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population.
ACM Trans. Intell. Syst. Technol., 2015

Evaluation of Security Solutions for Android Systems.
CoRR, 2015

Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
Comput. Secur., 2015

Topology manipulations for speeding betweenness centrality computation.
J. Complex Networks, 2015

GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.
Proceedings of the 24th USENIX Security Symposium, 2015

JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Boosting the Detection of Malicious Documents Using Designated Active Learning Methods.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

An Active Learning Framework for Efficient Condition Severity Classification.
Proceedings of the Artificial Intelligence in Medicine, 2015

2014
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage.
IEEE Trans. Knowl. Data Eng., 2014

Friend or foe? Fake profile identification in online social networks.
Soc. Netw. Anal. Min., 2014

Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Sci. Eng. Ethics, 2014

CoBAn: A context based model for data leakage prevention.
Inf. Sci., 2014

Novel active learning methods for enhanced PC malware detection in windows OS.
Expert Syst. Appl., 2014

Quantitative Analysis of Genealogy Using Digitised Family Trees.
CoRR, 2014

Reaction to New Security Threat Class.
CoRR, 2014

Online Social Networks: Threats and Solutions.
IEEE Commun. Surv. Tutorials, 2014

Implementing a database encryption solution, design and implementation issues.
Comput. Secur., 2014

Mobile malware detection through analysis of deviations in application network behavior.
Comput. Secur., 2014

Limiting access to unintentionally leaked sensitive documents using malware signatures.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Peers-Based Location of Mobile Devices.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

POSTER: Misuseablity Analysis for IT Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

OSPF vulnerability to persistent poisoning attacks: a systematic analysis.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Optimizing Data Misuse Detection.
ACM Trans. Knowl. Discov. Data, 2013

Computationally efficient link prediction in a variety of social networks.
ACM Trans. Intell. Syst. Technol., 2013

Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks.
J. Intell. Transp. Syst., 2013

Analyzing group E-mail exchange to detect data leakage.
J. Assoc. Inf. Sci. Technol., 2013

The CASH algorithm-cost-sensitive attribute selection using histograms.
Inf. Sci., 2013

Guest editorial: Special issue on data mining for information security.
Inf. Sci., 2013

Online Social Networks: Threats and Solutions Survey
CoRR, 2013

Organization Mining Using Online Social Networks
CoRR, 2013

ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks.
CoRR, 2013

Facebook Applications' Installation and Removal: A Temporal Analysis.
CoRR, 2013

Ethical Considerations when Employing Fake Identities in OSN for Research.
CoRR, 2013

Entity Matching in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Detecting Anomalous Behaviors Using Structural Properties of Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Trade-Offs in Social and Behavioral Modeling in Mobile Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Noninvasive detection of anti-forensic malware.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Nesto - Network selection and traffic offloading system for android mobile devices.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Analyzing users' web surfing patterns to trace terrorists and criminals.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Combining one-class classifiers via meta learning.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

ACTIDS: an active strategy for detecting and localizing network attacks.
Proceedings of the AISec'13, 2013

A fast and scalable method for threat detection in large-scale DNS logs.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

IP2User - Identifying the Username of an IP Address in Network-Related Events.
Proceedings of the IEEE International Congress on Big Data, 2013

Homing socialbots: intrusion on a specific organization's employee using Socialbots.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
A Survey of Data Leakage Detection and Prevention Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012

User Authentication Based on Representative Users.
IEEE Trans. Syst. Man Cybern. Part C, 2012

M-Score: A Misuseability Weight Measure.
IEEE Trans. Dependable Secur. Comput., 2012

Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Secur. Informatics, 2012

Detecting unknown computer worm activity via support vector machines and active learning.
Pattern Anal. Appl., 2012

A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions.
J. Intell. Inf. Syst., 2012

"Andromaly": a behavioral malware detection framework for android devices.
J. Intell. Inf. Syst., 2012

User identity verification via mouse dynamics.
Inf. Sci., 2012

Securing Your Transactions: Detecting Anomalous Patterns In XML Documents
CoRR, 2012

Detection of Deviations in Mobile Applications Network Behavior
CoRR, 2012

Organizational Intrusion: Organization Mining Using Socialbots.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Heuristics for Speeding Up Betweenness Centrality Computation.
Proceedings of the 2012 International Conference on Privacy, 2012

Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data.
Proceedings of the 2012 International Conference on Privacy, 2012

How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage.
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012

Detecting Spammers via Aggregated Historical Data Set.
Proceedings of the Network and System Security - 6th International Conference, 2012

Network-based intrusion detection systems go active!
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Predicting Student Exam's Scores by Analyzing Social Network Data.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2011
F-Sign: Automatic, Function-Based Signature Generation for Malware.
IEEE Trans. Syst. Man Cybern. Part C, 2011

A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011

Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content.
Secur. Commun. Networks, 2011

Optimizing Investment Decisions in Selecting Information Security Remedies.
Inf. Manag. Comput. Secur., 2011

Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering.
Int. J. Found. Comput. Sci., 2011

Stealing Reality: When Criminals Become Data Scientists (or Vice Versa).
IEEE Intell. Syst., 2011

Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Eliciting domain expert misuseability conceptions.
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011

Analyzing group communication for preventing data leakage via email.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Dynamic Sensitivity-Based Access Control.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

HoneyGen: An automated honeytokens generator.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011

LoOkie - it feels like being there.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Optimizing Targeting of Intrusion Detection Systems in Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
J. Comput. Virol., 2010

Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.
J. Comput. Virol., 2010

Efficient Multidimensional Suppression for K-Anonymity.
IEEE Trans. Knowl. Data Eng., 2010

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method.
J. Syst. Softw., 2010

Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS).
J. Assoc. Inf. Sci. Technol., 2010

Routing betweenness centrality.
J. ACM, 2010

Google Android: A Comprehensive Security Assessment.
IEEE Secur. Priv., 2010

Securing Android-Powered Mobile Devices Using SELinux.
IEEE Secur. Priv., 2010

Stealing Reality
CoRR, 2010

Efficient Collaborative Application Monitoring Scheme for Mobile Networks
CoRR, 2010

Applying Behavioral Detection on Android-Based Devices.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010

Cost-Sensitive Detection of Malicious Applications in Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Google Android: An Updated Security Review.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Cost Benefit Deployment of DNIPS.
Proceedings of IEEE International Conference on Communications, 2010

Continuous Verification Using Keystroke Dynamics.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Automated Static Code Analysis for Classifying Android Applications Using Machine Learning.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Rendezvous tunnel for anonymous publishing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

M-score: estimating the potential damage of data leakage incident by assigning misuseability weight.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

Detecting data misuse by applying context-based data linkage.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

2009
Unknown malcode detection and the imbalance problem.
J. Comput. Virol., 2009

Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Rec., 2009

A decision theoretic approach to combining information filtering.
Online Inf. Rev., 2009

Using artificial neural networks to detect unknown computer worms.
Neural Comput. Appl., 2009

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Secur. Tech. Rep., 2009

Troika - An improved stacking schema for classification tasks.
Inf. Sci., 2009

Incremental deployment of network monitors based on Group Betweenness Centrality.
Inf. Process. Lett., 2009

Collaborative attack on Internet users' anonymity.
Internet Res., 2009

Improving malware detection by applying multi-inducer ensemble.
Comput. Stat. Data Anal., 2009

Google Android: A State-of-the-Art Review of Security Mechanisms
CoRR, 2009

Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Method for Detecting Unknown Malicious Executables.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A Chronological Evaluation of Unknown Malcode Detection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009

SISR - A New Model for Epidemic Spreading of Electronic Threats.
Proceedings of the Information Security, 12th International Conference, 2009

Identity theft, computers and behavioral biometrics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

An Overview of IDS Using Anomaly Detection.
Proceedings of the Database Technologies: Concepts, 2009

2008
Detection of unknown computer worms based on behavioral classification of the host.
Comput. Stat. Data Anal., 2008

Malicious Code Detection Using Active Learning.
Proceedings of the Privacy, 2008

kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity.
Proceedings of the Protecting Persons While Protecting the People, 2008

Unknown malcode detection via text categorization and the imbalance problem.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Unknown malcode detection - A chronological evaluation.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Active learning to improve the detection of unknown computer worms activity.
Proceedings of the 11th International Conference on Information Fusion, 2008

A Distributed Framework for the Detection of New Worm-Related Malware.
Proceedings of the Intelligence and Security Informatics, 2008

Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008

Unknown Malcode Detection Using OPCODE Representation.
Proceedings of the Intelligence and Security Informatics, 2008

2007
MarCol: A Market-Based Recommender System.
IEEE Intell. Syst., 2007

Finding the most prominent group in complex networks.
AI Commun., 2007

Improving the Detection of Unknown Computer Worms Activity Using Active Learning.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007

Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007

Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain.
Proceedings of the 4th International Conference on Knowledge Capture (K-CAP 2007), 2007

Deployment of DNIDS in Social Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Simulating Threats Propagation within the NSP Infrastructure.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Host Based Intrusion Detection using Machine Learning.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Malicious Code Detection and Acquisition Using Active Learning.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
Cluster-analysis attack against a PRivAte Web solution (PRAW).
Online Inf. Rev., 2006

A decision theoretic approach to combining information filters: An analytical and empirical evaluation.
J. Assoc. Inf. Sci. Technol., 2006

An intelligent, interactive tool for exploration and visualization of time-oriented security data.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

Application of Artificial Neural Networks Techniques to Computer Worm Detection.
Proceedings of the International Joint Conference on Neural Networks, 2006

2005
TDS - An Innovative Terrorist Detection System.
Proceedings of the Fighting Terror in Cyberspace, 2005

PRAW - A PRivAcy model for the Web.
J. Assoc. Inf. Sci. Technol., 2005

Enhancing customer privacy while searching for products and services on the world wide web.
Internet Res., 2005

Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).
Proceedings of the Intelligence and Security Informatics, 2005

Designing Secure Indexes for Encrypted Databases.
Proceedings of the Data and Applications Security XIX, 2005

2004
A Structure Preserving Database Encryption Scheme.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Terrorist Detection System.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

2003
A decision-theoretic approach to data mining.
IEEE Trans. Syst. Man Cybern. Part A, 2003

Using the Information Structure Model to Compare Profile-Based Information Filtering Systems.
Inf. Retr., 2003

Privacy Preservation Improvement by Learning Optimal Profile Generation Rate.
Proceedings of the User Modeling 2003, 2003

Content-Based Methodology for Anomaly Detection on the Web.
Proceedings of the Web Intelligence, 2003

2002
A new privacy model for hiding group interests while accessing the Web.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

A New Privacy Model for Web Surfing.
Proceedings of the Next Generation Information Technologies and Systems, 2002

2001
Performance evaluation of a distributed application.
J. Oper. Res. Soc., 2001

1993
Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems.
Parallel Comput., 1993

1992
Multiple interfaces message passing system for transputer network.
Microprocess. Microprogramming, 1992


  Loading...