Seguir
Ivan Homoliak
Título
Citado por
Citado por
Ano
Insight into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
I Homoliak, F Toffalini, J Guarnizo, Y Elovici, M Ochoa
ACM Computing Surveys (CSUR) 52 (2), 1-40, 2019
1542019
HADES-IoT: A practical host-based anomaly detection system for IoT devices
D Breitenbacher, I Homoliak, YL Aung, NO Tippenhauer, Y Elovici
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
37*2019
The security reference architecture for blockchains: Toward a standardized model for studying vulnerabilities, threats, and defenses
I Homoliak, S Venugopalan, D Reijsbergen, Q Hum, R Schumi, ...
IEEE Communications Surveys & Tutorials 23 (1), 341-390, 2020
362020
{StrongChain}: Transparent and Collaborative {Proof-of-Work} Consensus
P Szalachowski, D Reijsbergen, I Homoliak, S Sun
28th USENIX Security Symposium (USENIX Security 19), 819-836, 2019
352019
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition
A Harilal, F Toffalini, J Castellanos, J Guarnizo, I Homoliak, M Ochoa
Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017
332017
A security reference architecture for blockchains
I Homoliak, S Venugopalan, Q Hum, P Szalachowski
2019 IEEE international Conference on blockchain (blockchain), 390-397, 2019
282019
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
A Harilal, F Toffalini, I Homoliak, JH Castellanos, J Guarnizo, S Mondal, ...
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 54-85, 2018
262018
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach
PH Ivan Homoliak, Martin Teknös, Martín Ochoa, Dominik Breitenbacher, Saeid ...
EAI Endorsed Transactions on Security and Safety 5 (17), https://eudl.eu/pdf …, 2018
23*2018
ASNM: Advanced security network metrics for attack vector description
I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek
Proceedings of the International Conference on Security and Management (SAM), 1, 2013
202013
Adversarial attacks on remote user authentication using behavioural mouse dynamics
YXM Tan, A Iacovazzi, I Homoliak, Y Elovici, A Binder
2019 International Joint Conference on Neural Networks (IJCNN), 1-10, 2019
162019
Detection of masqueraders based on graph partitioning of file system access events
F Toffalini, I Homoliak, A Harilal, A Binder, M Ochoa
2018 IEEE Security and Privacy Workshops (SPW), 217-227, 2018
132018
SmartOTPs: An air-gapped 2-factor authentication for smart-contract wallets
I Homoliak, D Breitenbacher, O Hujnak, P Hartel, A Binder, ...
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
11*2020
Intrusion Detection in Network Traffic
I Homoliak
https://www.researchgate.net/profile/Ivan_Homoliak/publication …, 2016
102016
ASNM Datasets: A collection of network attacks for testing of adversarial classifiers and intrusion detectors
I Homoliak, K Malinka, P Hanacek
IEEE Access 8, 112427-112453, 2020
92020
An empirical study into the success of listed smart contracts in ethereum
P Hartel, I Homoliak, D Reijsbergen
IEEE Access 7, 177539-177555, 2019
92019
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset.
I Homoliak, D Breitenbacher, P Hanacek
J. Comput. 12 (2), 143-155, 2017
92017
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic
I Homoliak, D Ovsonka, M Gregr, P Hanacek
The 9th International Conference for Internet Technology and Secured …, 2014
92014
Automated malware detection based on novel network behavioral signatures
M Barabas, I Homoliak, M Drozd, P Hanacek
International Journal of Engineering and Technology 5 (2), 249-253, 2013
92013
Characteristics of buffer overflow attacks tunneled in HTTP traffic
I Homoliak, D Ovsonka, K Koranda, P Hanacek
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
82014
Intercepting hail hydra: real-time detection of algorithmically generated domains
F Casino, N Lykousas, I Homoliak, C Patsakis, J Hernandez-Castro
Journal of Network and Computer Applications 190, 103135, 2021
72021
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20