UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

4 5 6 7 8
hits: 405
51.
  • Malboard: A novel user keys... Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis
    Farhi, Nitzan; Nissim, Nir; Elovici, Yuval Computers & security, August 2019, 2019-08-00, 20190801, Volume: 85
    Journal Article
    Peer reviewed

    Concealing malicious components within widely used USB peripherals has become a popular attack vector utilizing social engineering techniques and exploiting users’ trust in USB devices. This vector ...
Full text
52.
  • TANTRA: Timing-Based Advers... TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
    Sharon, Yam; Berend, David; Liu, Yang ... IEEE transactions on information forensics and security, 2022, Volume: 17
    Journal Article
    Peer reviewed
    Open access

    Network intrusion attacks are a known threat. To detect such attacks, network intrusion detection systems (NIDSs) have been developed and deployed. These systems apply machine learning models to ...
Full text
53.
  • Towards Scalable and Unifie... Towards Scalable and Unified Example-based Explanation and Outlier Detection
    Chong, Penny; Cheung, Ngai-Man; Elovici, Yuval ... IEEE transactions on image processing, 2022
    Journal Article
    Peer reviewed
    Open access

    When neural networks are employed for high-stakes decision-making, it is desirable that they provide explanations for their prediction in order for us to understand the features that have contributed ...
Full text
54.
  • PowerHammer: Exfiltrating D... PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines
    Guri, Mordechai; Zadov, Boris; Bykhovsky, Dima ... IEEE transactions on information forensics and security, 2020, Volume: 15
    Journal Article
    Peer reviewed
    Open access

    In this article, we provide an implementation, evaluation, and analysis of PowerHammer - an attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code running on a ...
Full text

PDF
55.
  • CoBAn: A context based mode... CoBAn: A context based model for data leakage prevention
    Katz, Gilad; Elovici, Yuval; Shapira, Bracha Information sciences, 03/2014, Volume: 262
    Journal Article
    Peer reviewed

    A new context-based model (CoBAn) for accidental and intentional data leakage prevention (DLP) is proposed. Existing methods attempt to prevent data leakage by either looking for specific keywords ...
Full text
56.
  • Not all datasets are born e... Not all datasets are born equal: On heterogeneous tabular data and adversarial examples
    Mathov, Yael; Levy, Eden; Katzir, Ziv ... Knowledge-based systems, 04/2022, Volume: 242
    Journal Article
    Peer reviewed

    Recent work on adversarial learning has mainly focused on neural networks and domains in which those networks excel, such as computer vision and audio processing. Typically, the data in those domains ...
Full text
57.
  • Detection of malicious PDF ... Detection of malicious PDF files and directions for enhancements: A state-of-the art survey
    Nissim, Nir; Cohen, Aviad; Glezer, Chanan ... Computers & security, 02/2015, Volume: 48
    Journal Article
    Peer reviewed

    Initial penetration is one of the first steps of an Advanced Persistent Threat (APT) attack, and it is considered one of the most significant means of initiating cyber-attacks aimed at organizations. ...
Full text
58.
  • SoK: Security and Privacy in the Age of Commercial Drones
    Nassi, Ben; Bitton, Ron; Masuoka, Ryusuke ... 2021 IEEE Symposium on Security and Privacy (SP)
    Conference Proceeding

    As the number of drones increases and the era in which they begin to fill the skies approaches, an important question needs to be answered: From a security and privacy perspective, are society and ...
Full text
59.
  • Optical Speech Recovery Fro... Optical Speech Recovery From Desktop Speakers
    Nassi, Ben; Pirutin, Yaron; Shams, Jacob ... Computer (Long Beach, Calif.), 2022-Nov., 2022-11-00, Volume: 55, Issue: 11
    Journal Article
    Peer reviewed

    In this article, we show that desktop speakers’ internal (electrical circuitry) and external (reflective diaphragm) design may expose users to confidential information leakage. We demonstrate that ...
Full text
60.
  • The Translucent Patch: A Physical and Universal Attack on Object Detectors
    Zolfi, Alon; Kravchik, Moshe; Elovici, Yuval ... 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021-June
    Conference Proceeding
    Open access

    Physical adversarial attacks against object detectors have seen increasing success in recent years. However, these attacks require direct access to the object of interest in order to apply a physical ...
Full text

PDF
4 5 6 7 8
hits: 405

Load filters