Urmăriți
Ron Bitton
Ron Bitton
Department of software and information system engineering @ Ben Gurion university
Adresă de e-mail confirmată pe post.bgu.ac.il
Titlu
Citat de
Citat de
Anul
SoK: Security and privacy in the age of commercial drones
B Nassi, R Bitton, R Masuoka, A Shabtai, Y Elovici
2021 IEEE symposium on security and privacy (SP), 1434-1451, 2021
160*2021
When explainability meets adversarial learning: Detecting adversarial examples using shap signatures
G Fidel, R Bitton, A Shabtai
2020 international joint conference on neural networks (IJCNN), 1-8, 2020
1152020
System and method for assessing cybersecurity awareness
A Shabtai, R Puzis, L Rokach, L Orevi, G Malinsky, Z Katzir, R Bitton
US Patent 10,454,958, 2019
1052019
Taxonomy of mobile users' security awareness
R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach, A Shabtai
Computers & Security 73, 266-293, 2018
732018
Deriving a cost-effective digital twin of an ICS to facilitate security evaluation
R Bitton, T Gluck, O Stan, M Inokuchi, Y Ohta, Y Yamada, T Yagyu, ...
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
642018
Incentivized delivery network of IoT software updates based on trustless proof-of-distribution
O Leiba, Y Yitzchak, R Bitton, A Nadler, A Shabtai
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 29-39, 2018
512018
A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers
R Bitton, A Shabtai
IEEE Transactions on Dependable and Secure Computing 18 (3), 1164-1181, 2019
462019
Extending attack graphs to represent cyber-attacks in communication protocols and modern it networks
O Stan, R Bitton, M Ezrets, M Dadon, M Inokuchi, Y Ohta, T Yagyu, ...
IEEE Transactions on Dependable and Secure Computing 19 (3), 1936-1954, 2020
432020
Evaluating the Information Security Awareness of Smartphone Users
R Bitton, K Boymgold, R Puzis, A Shabtai
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
292020
Evaluating the security of open radio access networks
D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt, H Lehmann, Y Elovici, ...
arXiv preprint arXiv:2201.06080, 2022
26*2022
Contextual security awareness: A context-based approach for assessing the security awareness of users
A Solomon, M Michaelshvili, R Bitton, B Shapira, L Rokach, R Puzis, ...
Knowledge-Based Systems 246, 108709, 2022
232022
Heuristic approach for countermeasure selection using attack graphs
O Stan, R Bitton, M Ezrets, M Dadon, M Inokuchi, Y Ohta, T Yagyu, ...
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
23*2021
An automated, end-to-end framework for modeling attacks from vulnerability descriptions
H Binyamini, R Bitton, M Inokuchi, T Yagyu, Y Elovici, A Shabtai
arXiv preprint arXiv:2008.04377, 2020
22*2020
Design procedure of knowledge base for practical attack graph generation
M Inokuchi, Y Ohta, S Kinoshita, T Yagyu, O Stan, R Bitton, Y Elovici, ...
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
182019
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks.
R Bitton, D Avraham, E Klevansky, D Mimran, O Brodt, H Lehmann, ...
16*2022
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution
O Leiba, R Bitton, Y Yitzchak, A Nadler, D Kashi, A Shabtai
Pervasive and Mobile Computing 58, 101019, 2019
142019
A framework for evaluating the cybersecurity risk of real world, machine learning production systems
R Bitton, N Maman, I Singh, S Momiyama, Y Elovici, A Shabtai
arXiv preprint arXiv:2107.01806, 2021
13*2021
Attacking object detector using a universal targeted label-switch patch
A Shapira, R Bitton, D Avraham, A Zolfi, Y Elovici, A Shabtai
arXiv preprint arXiv:2211.08859, 2022
82022
Classification of smartphone users using internet traffic
A Finkelstein, R Biton, R Puzis, A Shabtai
arXiv preprint arXiv:1701.00220, 2017
82017
On the vulnerability of anti-malware solutions to DNS attacks
A Nadler, R Bitton, O Brodt, A Shabtai
Computers & Security 116, 102687, 2022
72022
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20