Sofia Belikovetsky
Sofia Belikovetsky
Verified email at post.bgu.ac.il
Title
Cited by
Cited by
Year
dr0wned - Cyber-Physical Attack with Additive Manufacturing
S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici
11th USENIX Workshop on Offensive Technologies (WOOT 17), 0
67*
Security of additive manufacturing: Attack taxonomy and survey
M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum, ...
Additive Manufacturing 21, 431-457, 2018
662018
Digital audio signature for 3D printing integrity
S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici
IEEE Transactions on Information Forensics and Security 14 (5), 1127-1141, 2018
38*2018
Power consumption-based detection of sabotage attacks in additive manufacturing
SB Moore, J Gatlin, S Belikovetsky, M Yampolskiy, WE King, Y Elovici
arXiv preprint arXiv:1709.01822, 2017
182017
Evaluation of additive and subtractive manufacturing from the security perspective
M Yampolskiy, W King, G Pope, S Belikovetsky, Y Elovici
International Conference on Critical Infrastructure Protection, 23-44, 2017
122017
Load rebalancing games in dynamic systems with migration costs
S Belikovetsky, T Tamir
Theoretical Computer Science 622, 16-33, 2016
42016
Detecting sabotage attacks in additive manufacturing using actuator power signatures
J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy
IEEE Access 7, 133421-133432, 2019
32019
3D marketplace: Distributed attestation of 3D designs on blockchain
S Belikovetsky, O Leiba, A Shabtai, Y Elovici
arXiv preprint arXiv:1908.06921, 2019
22019
Liability exposure when 3D-printed parts fall from the sky
L Graves, M Yampolskiy, W King, S Belikovetsky, Y Elovici
International Conference on Critical Infrastructure Protection, 39-64, 2018
12018
Twelfth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection
K Hemsley, R Fisher, L Graves, M Yampolskiy, W King, S Belikovetsky, ...
2018
dr0wned
S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks..................
S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici, A Shah, ...
Time-Division is Optimal for Covert Communication Over Some Broadcast Channels.... VYF Tan and S.-H. Lee 1377
S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici, A Shah, ...
The system can't perform the operation now. Try again later.
Articles 1–13