Volgen
Birhanu Eshete
Titel
Geciteerd door
Geciteerd door
Jaar
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
3902019
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017
2112017
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1612019
Binspect: Holistic analysis and detection of malicious web pages
B Eshete, A Villafiorita, K Weldemariam
Security and Privacy in Communication Networks: 8th International ICST …, 2013
1232013
{NAVEX}: Precise and scalable exploit generation for dynamic web applications
A Alhuzali, R Gjomemo, B Eshete, VN Venkatakrishnan
27th USENIX Security Symposium (USENIX Security 18), 377-392, 2018
752018
Webwinnow: Leveraging exploit kit workflows to detect malicious urls
B Eshete, VN Venkatakrishnan
Proceedings of the 4th ACM conference on Data and application security and …, 2014
592014
Early detection of security misconfiguration vulnerabilities in web applications
B Eshete, A Villafiorita, K Weldemariam
2011 Sixth International Conference on Availability, Reliability and …, 2011
572011
Chainsaw: Chained Automated Workflow-based Exploit Generation
A Alhuzali, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
472016
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
B Eshete, A Alhuzali, M Monshizadeh, PA Porras, VN Venkatakrishnan, ...
NDSS, 2015
392015
Making Machine Learning Trustworthy
B Eshete
Science 373 (6556), 743-744, 2021
352021
Malicious Website Detection: Effectiveness and Efficiency Issues
B Eshete, A Villafiorita, K Weldemariam, FB Kessler
Proceedings of SysSec Workshop (SysSec), 2011, 123 - 126, 2011
352011
Effective analysis, characterization, and detection of malicious web pages
B Eshete
Proceedings of the 22nd International Conference on World Wide Web, 355-360, 2013
322013
Host-based anomaly detection for pervasive medical systems
B Asfaw, D Bekele, B Eshete, A Villafiorita, K Weldemariam
2010 Fifth International Conference on Risks and Security of Internet and …, 2010
302010
Propatrol: Attack investigation via extracted high-level tasks
S M. Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Information Systems Security: 14th International Conference, ICISS 2018 …, 2018
252018
Einspect: Evolution-guided analysis and detection of malicious web pages
B Eshete, A Villafiorita, K Weldemariam, M Zulkernine
2013 IEEE 37th Annual Computer Software and Applications Conference, 375-380, 2013
252013
Pricure: privacy-preserving collaborative inference in a multi-party setting
I Jarin, B Eshete
Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics, 25-35, 2021
212021
Morphence: Moving target defense against adversarial examples
A Amich, B Eshete
Proceedings of the 37th Annual Computer Security Applications Conference, 61-75, 2021
182021
Confeagle: Automated analysis of configuration vulnerabilities in web applications
B Eshete, A Villafiorita, K Weldemariam, M Zulkernine
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
162013
ICT for good: Opportunities, challenges and the way forward
B Eshete, A Mattioli, A Villafiorita, K Weldemariam
2010 Fourth International Conference on Digital Society, 14-19, 2010
122010
Explanation-guided diagnosis of machine learning evasion attacks
A Amich, B Eshete
Security and Privacy in Communication Networks: 17th EAI International …, 2021
112021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20