Security of open radio access networks D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt, H Lehmann, Y Elovici, ... Computers & Security 122, 102890, 2022 | 26 | 2022 |
Increased cyber-biosecurity for DNA synthesis R Puzis, D Farbiash, O Brodt, Y Elovici, D Greenbaum Nature Biotechnology 38 (12), 1379-1381, 2020 | 26 | 2020 |
Evaluating the security of open radio access networks D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt, H Lehmann, Y Elovici, ... arXiv preprint arXiv:2201.06080, 2022 | 22 | 2022 |
Adversarial machine learning threat analysis and remediation in open radio access network (o-ran) E Habler, R Bitton, D Avraham, D Mimran, E Klevansky, O Brodt, ... arXiv preprint arXiv:2201.06093, 2022 | 12 | 2022 |
Detection of malicious network activity YA Mirsky, O Brodt, A Shabtai, Y Elovici, M Nakae US Patent 11,201,882, 2021 | 12 | 2021 |
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions J Kotak, E Habler, O Brodt, A Shabtai, Y Elovici Sensors 23 (8), 4018, 2023 | 11 | 2023 |
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. R Bitton, D Avraham, E Klevansky, D Mimran, O Brodt, H Lehmann, ... | 11 | 2022 |
On the vulnerability of anti-malware solutions to DNS attacks A Nadler, R Bitton, O Brodt, A Shabtai Computers & Security 116, 102687, 2022 | 10 | 2022 |
Method and a system for testing machine learning and deep learning models for robustness, and durability against adversarial bias and privacy attacks Y Elovici, A Shabtai, O Brodt, D Mimran, M Khavkin, E Grolman US Patent App. 17/320,489, 2021 | 8 | 2021 |
System and a Method for Assessment of Robustness and Fairness of Artificial Intelligence (AI) Based Models A Hacmon, Y Elovici, A Shabtai, E Grolman, O Brodt, S Fischer, R Fromm US Patent App. 17/467,341, 2022 | 2 | 2022 |
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring L Ben-Shimol, E Grolman, A Elyashar, I Maimon, D Mimran, O Brodt, ... arXiv preprint arXiv:2405.07172, 2024 | 1 | 2024 |
System and a Method for Bias Estimation in Artificial Intelligence (AI) Models Using Deep Neural Network S Fischer, R Fromm, A Hacmon, Y Elovici, A Shabtai, E Grolman, O Brodt US Patent App. 17/467,338, 2022 | 1 | 2022 |
Method and a system for real-time detection of attacks on ai-based object detectors D Avraham, A Shapira, R Bitton, A Shabtai, D Mimran, Y Elovici, O Brodt, ... US Patent App. 18/652,981, 2024 | | 2024 |
OSSIntegrity: Collaborative open-source code integrity verification M Nahum, E Grolman, I Maimon, D Mimran, O Brodt, A Elyashar, Y Elovici, ... Computers & Security 144, 103977, 2024 | | 2024 |
Detection of Compromised Functions in a Serverless Cloud Environment D Lavi, O Brodt, D Mimran, Y Elovici, A Shabtai arXiv preprint arXiv:2408.02641, 2024 | | 2024 |
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions S Brudni, S Anidgar, O Brodt, D Mimran, A Shabtai, Y Elovici 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 676-696, 2024 | | 2024 |
SMART: Serverless Module Analysis and Recognition Technique for Managed Applications A Ashkenazi, E Grolman, A Elyashar, D Mimran, O Brodt, Y Elovici, ... 2024 IEEE 24th International Symposium on Cluster, Cloud and Internet …, 2024 | | 2024 |
Method for Assessment of the Robustness and Resilience of Machine Learning Models to Model Extraction Attacks on AI-Based Systems Y Elovici, O Brodt, A Shabtai, E Grolman, D Mimran, M Khavkin US Patent App. 18/497,075, 2024 | | 2024 |
Secure Crowdsource-Based Open-Source Code Verification (SC)^ 2V M Nahum, E Grolman, I Maimon, D Mimran, O Brodt, A Elyashar, Y Elovici, ... Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 1536-1538, 2024 | | 2024 |
SoK: Security Below the OS--A Security Analysis of UEFI PP Surve, O Brodt, M Yampolskiy, Y Elovici, A Shabtai arXiv preprint arXiv:2311.03809, 2023 | | 2023 |