[go: nahoru, domu]

Follow
Elisa Bertino
Elisa Bertino
Professor of Computer Science, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Year
Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs
AS Li, A Iyengar, A Kundu, E Bertino
arXiv preprint arXiv:2407.13918, 2024
2024
Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs
A Shuai Li, A Iyengar, A Kundu, E Bertino
arXiv e-prints, arXiv: 2407.13918, 2024
2024
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications
M Masfiqur Rahman, I Karim, E Bertino
arXiv e-prints, arXiv: 2407.13742, 2024
2024
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode
Z Shen, I Karim, E Bertino
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
2024
Ariotedef: Adversarially robust iot early defense system based on self-evolution against multi-step attacks
M Huang, H Lee, A Kundu, X Chen, A Mudgerikar, N Li, E Bertino
ACM Transactions on Internet of Things 5 (3), 1-34, 2024
12024
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation
S Bhardwaj, AS Li, M Dave, E Bertino
Computers & Security 140, 103769, 2024
22024
Transfer Learning for Security: Challenges and Future Directions
A Shuai Li, A Iyengar, A Kundu, E Bertino
arXiv e-prints, arXiv: 2403.00935, 2024
2024
Transfer Learning for Security: Challenges and Future Directions
AS Li, A Iyengar, A Kundu, E Bertino
arXiv preprint arXiv:2403.00935, 2024
12024
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware
A Yu, J Kang, J Morris, E Bertino, D Lin
IEEE Transactions on Dependable and Secure Computing, 2024
2024
Trustguard: Gnn-based robust and explainable trust evaluation with dynamicity support
J Wang, Z Yan, J Lan, E Bertino, W Pedrycz
IEEE Transactions on Dependable and Secure Computing, 2024
52024
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning
KS Mubasshir, I Karim, E Bertino
arXiv preprint arXiv:2401.04958, 2024
2024
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning
K Samin Mubasshir, I Karim, E Bertino
arXiv e-prints, arXiv: 2401.04958, 2024
2024
Prometheus: Infrastructure security posture analysis with ai-generated attack graphs
X Jin, C Katsis, F Sang, J Sun, E Bertino, RR Kompella, A Kundu
arXiv preprint arXiv:2312.13119, 2023
92023
Flowmur: A stealthy and practical audio backdoor attack with limited knowledge
J Lan, J Wang, B Yan, Z Yan, E Bertino
arXiv preprint arXiv:2312.09665, 2023
22023
Kalis2. 0-a SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for the IoT
A Rullo, D Midi, A Mudjerikar, E Bertino
IEEE Internet of Things Journal, 2023
12023
Trustworthy AI and Data Lineage
E Bertino, S Bhattacharya, E Ferrari, D Milojicic
IEEE Internet Computing 27 (6), 5-6, 2023
2023
Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements
SA Matei, E Bertino
arXiv preprint arXiv:2311.04326, 2023
12023
Artificial intelligence ethics education in cybersecurity: challenges and opportunities: a focus group report
D Jackson, SA Matei, E Bertino
arXiv preprint arXiv:2311.00903, 2023
22023
A Pro-Active Defense Framework for IoT Systems
E Bertino, H Lee, M Huang, C Katsis, Z Shen, B Ribeiro, D De Mello, ...
2023 IEEE 9th International Conference on Collaboration and Internet …, 2023
2023
A universally composable key exchange framework for operational technology communication protocols
AS Sani, E Bertino, D Yuan, ZY Dong
2023 IEEE International Conference on Communications, Control, and Computing …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20