Ron Bitton
Ron Bitton
Department of software and information system engineering @ Ben Gurion university
Verified email at post.bgu.ac.il
Title
Cited by
Cited by
Year
System and method for assessing cybersecurity awareness
A Shabtai, R Puzis, L Rokach, L Orevi, G Malinsky, Z Katzir, R Bitton
US Patent App. 16/658,797, 2020
282020
Taxonomy of mobile users' security awareness
R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach, A Shabtai
Computers & Security 73, 266-293, 2018
272018
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution
O Leiba, R Bitton, Y Yitzchak, A Nadler, D Kashi, A Shabtai
Pervasive and Mobile Computing 58, 101019, 2019
21*2019
Deriving a cost-effective digital twin of an ICS to facilitate security evaluation
R Bitton, T Gluck, O Stan, M Inokuchi, Y Ohta, Y Yamada, T Yagyu, ...
European Symposium on Research in Computer Security, 533-554, 2018
112018
When explainability meets adversarial learning: Detecting adversarial examples using SHAP signatures
G Fidel, R Bitton, A Shabtai
2020 International Joint Conference on Neural Networks (IJCNN), 1-8, 2020
82020
A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers
R Bitton, A Shabtai
IEEE Transactions on Dependable and Secure Computing, 2019
7*2019
Classification of smartphone users using internet traffic
A Finkelstein, R Biton, R Puzis, A Shabtai
arXiv preprint arXiv:1701.00220, 2017
72017
Sensor-based approach for predicting departure time of smartphone users
R Biton, G Katz, A Shabtai
2015 2nd ACM International Conference on Mobile Software Engineering and …, 2015
52015
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
O Stan, R Bitton, M Ezrets, M Dadon, M Inokuchi, Y Ohta, Y Yamada, ...
arXiv preprint arXiv:1906.09786, 2019
32019
Evaluating the Information Security Awareness of Smartphone Users
R Bitton, K Boymgold, R Puzis, A Shabtai
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
22020
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
N Moscovich, R Bitton, Y Mallah, M Inokuchi, T Yagyu, M Kalech, Y Elovici, ...
arXiv preprint arXiv:2007.00059, 2020
12020
Design Procedure of Knowledge Base for Practical Attack Graph Generation
M Inokuchi, Y Ohta, S Kinoshita, T Yagyu, O Stan, R Bitton, Y Elovici, ...
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
12019
Heuristic Approach Towards Countermeasure Selection using Attack Graphs
O Stan, R Bitton, M Ezrets, M Dadon, M Inokuchi, Y Ohta, T Yagyu, ...
arXiv preprint arXiv:1906.10943, 2019
12019
Adversarial robustness via stochastic regularization of neural activation sensitivity
G Fidel, R Bitton, Z Katzir, A Shabtai
arXiv preprint arXiv:2009.11349, 2020
2020
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
H Binyamini, R Bitton, M Inokuchi, T Yagyu, Y Elovici, A Shabtai
arXiv preprint arXiv:2008.04377, 2020
2020
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
G Amit, I Rosenberg, M Levy, R Bitton, A Shabtai, Y Elovici
arXiv preprint arXiv:2002.02176, 2020
2020
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices
N Sivan, R Bitton, A Shabtai
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
2019
SoK: Security and Privacy in the Age of Commercial Drones
B Nassi, R Bitton, R Masuoka, A Shabtai, Y Elovici
The system can't perform the operation now. Try again later.
Articles 1–18