Birhanu Eshete
Titolo
Citata da
Citata da
Anno
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
972019
Binspect: Holistic analysis and detection of malicious web pages
B Eshete, A Villafiorita, K Weldemariam
International conference on security and privacy in communication systemsá…, 2012
832012
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 487-504, 2017
562017
Webwinnow: Leveraging exploit kit workflows to detect malicious urls
B Eshete, VN Venkatakrishnan
Proceedings of the 4th ACM conference on Data and application security andá…, 2014
482014
Early detection of security misconfiguration vulnerabilities in web applications
B Eshete, A Villafiorita, K Weldemariam
2011 Sixth International Conference on Availability, Reliability andá…, 2011
342011
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
B Eshete, A Alhuzali, M Monshizadeh, PA Porras, VN Venkatakrishnan, ...
NDSS, 2015
272015
Effective analysis, characterization, and detection of malicious web pages
B Eshete
Proceedings of the 22nd International Conference on World Wide Web, 355-360, 2013
252013
Malicious Website Detection: Effectiveness and Efficiency Issues
B Eshete, A Villafiorita, K Weldemariam, FB Kessler
Proceedings of SysSec Workshop (SysSec), 2011, 123 - 126, 2011
242011
Host-based anomaly detection for pervasive medical systems
B Asfaw, D Bekele, B Eshete, A Villafiorita, K Weldemariam
2010 Fifth International Conference on Risks and Security of Internet andá…, 2010
242010
{NAVEX}: Precise and scalable exploit generation for dynamic web applications
A Alhuzali, R Gjomemo, B Eshete, VN Venkatakrishnan
27th {USENIX} Security Symposium ({USENIX} Security 18), 377-392, 2018
202018
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communicationsá…, 2019
192019
Chainsaw: Chained Automated Workflow-based Exploit Generation
A Alhuzali, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
192016
Einspect: Evolution-guided analysis and detection of malicious web pages
B Eshete, A Villafiorita, K Weldemariam, M Zulkernine
2013 IEEE 37th Annual Computer Software and Applications Conference, 375-380, 2013
172013
Confeagle: Automated analysis of configuration vulnerabilities in web applications
B Eshete, A Villafiorita, K Weldemariam, M Zulkernine
2013 IEEE 7th International Conference on Software Security and Reliabilityá…, 2013
122013
Propatrol: Attack investigation via extracted high-level tasks
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
International Conference on Information Systems Security, 107-126, 2018
112018
ICT for good: Opportunities, challenges and the way forward
B Eshete, A Mattioli, A Villafiorita, K Weldemariam
2010 Fourth International Conference on Digital Society, 14-19, 2010
112010
Measuring the Impact of Different Metrics on Software Quality: a Case Study in the Open Source Domain
V Sartori, B Eshete, A Villafiorita
Proceedings of the Fifth International Conference on Digital Society, 2011
62011
Attack analysis results for adversarial engagement 1 of the darpa transparent computing program
B Eshete, R Gjomemo, MN Hossain, S Momeni, R Sekar, S Stoller, ...
arXiv preprint arXiv:1610.06936, 2016
52016
Effective Analysis, Characterization, and Detection of Malicious Activities on the Web.
B Eshete
University of Trento, Italy, 2013
42013
Context Information Refinement for Pervasive Medical Systems
BM Eshete
Addis Ababa University, 2007
32007
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20