default search action
Ron Biton
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Edan Habler, Ron Bitton, Asaf Shabtai:
Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation. ACM Comput. Surv. 56(4): 96:1-96:40 (2024) - [j10]Ofir Moshe, Gil Fidel, Ron Bitton, Asaf Shabtai:
Improving interpretability via regularization of neural activation sensitivity. Mach. Learn. 113(9): 6165-6196 (2024) - 2023
- [j9]Yair Meidan, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai:
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks. Comput. Secur. 126: 103073 (2023) - [j8]Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. ACM Comput. Surv. 55(9): 183:1-183:36 (2023) - 2022
- [j7]Asaf Nadler, Ron Bitton, Oleg Brodt, Asaf Shabtai:
On the vulnerability of anti-malware solutions to DNS attacks. Comput. Secur. 116: 102687 (2022) - [j6]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Security of Open Radio Access Networks. Comput. Secur. 122: 102890 (2022) - [j5]Adir Solomon, Michael Michaelshvili, Ron Bitton, Bracha Shapira, Lior Rokach, Rami Puzis, Asaf Shabtai:
Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowl. Based Syst. 246: 108709 (2022) - [j4]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1936-1954 (2022) - 2021
- [j3]Ron Bitton, Asaf Shabtai:
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers. IEEE Trans. Dependable Secur. Comput. 18(3): 1164-1181 (2021) - 2019
- [j2]Oded Leiba, Ron Bitton, Yechiav Yitzchak, Asaf Nadler, Davidoz Kashi, Asaf Shabtai:
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution. Pervasive Mob. Comput. 58 (2019) - 2018
- [j1]Ron Bitton, Andrey Finkelshtein, Lior Sidi, Rami Puzis, Lior Rokach, Asaf Shabtai:
Taxonomy of mobile users' security awareness. Comput. Secur. 73: 266-293 (2018)
Conference and Workshop Papers
- 2023
- [c13]Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi:
The Adversarial Implications of Variable-Time Inference. AISec@CCS 2023: 103-114 - [c12]Ofir Cohen, Ron Bitton, Asaf Shabtai, Rami Puzis:
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment. ESORICS (3) 2023: 431-451 - 2021
- [c11]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. CSF 2021: 1-16 - [c10]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. KDD 2021: 2574-2583 - [c9]Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici:
SoK: Security and Privacy in the Age of Commercial Drones. SP 2021: 1434-1451 - 2020
- [c8]Ron Bitton, Kobi Boymgold, Rami Puzis, Asaf Shabtai:
Evaluating the Information Security Awareness of Smartphone Users. CHI 2020: 1-13 - [c7]Gil Fidel, Ron Bitton, Asaf Shabtai:
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures. IJCNN 2020: 1-8 - 2019
- [c6]Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai:
Design Procedure of Knowledge Base for Practical Attack Graph Generation. AsiaCCS 2019: 594-601 - [c5]Nir Sivan, Ron Bitton, Asaf Shabtai:
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. RAID 2019: 243-260 - 2018
- [c4]Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation. ESORICS (1) 2018: 533-554 - [c3]Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, Asaf Shabtai:
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution. EuroS&P Workshops 2018: 29-39 - 2017
- [c2]Ron Biton, Clint Feher, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur:
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems. HASE 2017: 153-156 - 2015
- [c1]Ron Biton, Gilad Katz, Asaf Shabtai:
Sensor-Based Approach for Predicting Departure Time of Smartphone Users. MOBILESoft 2015: 146-147
Informal and Other Publications
- 2024
- [i24]Stav Cohen, Ron Bitton, Ben Nassi:
Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications. CoRR abs/2403.02817 (2024) - [i23]Stav Cohen, Ron Bitton, Ben Nassi:
A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares. CoRR abs/2408.05061 (2024) - [i22]Stav Cohen, Ron Bitton, Ben Nassi:
Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking. CoRR abs/2409.08045 (2024) - 2023
- [i21]Yair Meidan, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai:
D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks. CoRR abs/2303.01041 (2023) - [i20]Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi:
The Adversarial Implications of Variable-Time Inference. CoRR abs/2309.02159 (2023) - 2022
- [i19]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Open Radio Access Networks. CoRR abs/2201.06080 (2022) - [i18]Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. CoRR abs/2201.06093 (2022) - [i17]Edan Habler, Ron Bitton, Asaf Shabtai:
Evaluating the Security of Aircraft Systems. CoRR abs/2209.04028 (2022) - [i16]Ofir Moshe, Gil Fidel, Ron Bitton, Asaf Shabtai:
Improving Interpretability via Regularization of Neural Activation Sensitivity. CoRR abs/2211.08686 (2022) - [i15]Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Attacking Object Detector Using A Universal Targeted Label-Switch Patch. CoRR abs/2211.08859 (2022) - [i14]Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai:
Latent SHAP: Toward Practical Human-Interpretable Explanations. CoRR abs/2211.14797 (2022) - 2021
- [i13]Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems. CoRR abs/2107.01806 (2021) - [i12]Asaf Nadler, Ron Bitton, Oleg Brodt, Asaf Shabtai:
On The Vulnerability of Anti-Malware Solutions to DNS Attacks. CoRR abs/2109.11342 (2021) - 2020
- [i11]Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici:
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization. CoRR abs/2002.02176 (2020) - [i10]Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai:
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. CoRR abs/2007.00059 (2020) - [i9]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions. CoRR abs/2008.04377 (2020) - [i8]Gil Fidel, Ron Bitton, Ziv Katzir, Asaf Shabtai:
Adversarial robustness via stochastic regularization of neural activation sensitivity. CoRR abs/2009.11349 (2020) - 2019
- [i7]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. CoRR abs/1906.09786 (2019) - [i6]Ron Bitton, Kobi Boymgold, Rami Puzis, Asaf Shabtai:
Evaluating the Information Security Awareness of Smartphone Users. CoRR abs/1906.10229 (2019) - [i5]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach Towards Countermeasure Selection using Attack Graphs. CoRR abs/1906.10943 (2019) - [i4]Gil Fidel, Ron Bitton, Asaf Shabtai:
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures. CoRR abs/1909.03418 (2019) - 2018
- [i3]Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, Asaf Shabtai:
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution. CoRR abs/1805.04282 (2018) - [i2]Nir Sivan, Ron Bitton, Asaf Shabtai:
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. CoRR abs/1812.04829 (2018) - 2017
- [i1]Andrey Finkelstein, Ron Biton, Rami Puzis, Asaf Shabtai:
Classification of Smartphone Users Using Internet Traffic. CoRR abs/1701.00220 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint