Gamification of cybersecurity for workforce development in critical infrastructure TD Ashley, R Kwon, SNG Gourisetti, C Katsis, CA Bonebrake, PA Boyd Ieee Access 10, 112487-112501, 2022 | 11 | 2022 |
Edge security: Challenges and issues X Jin, C Katsis, F Sang, J Sun, A Kundu, R Kompella arXiv preprint arXiv:2206.07164, 2022 | 11 | 2022 |
Prometheus: Infrastructure security posture analysis with ai-generated attack graphs X Jin, C Katsis, F Sang, J Sun, E Bertino, RR Kompella, A Kundu arXiv preprint arXiv:2312.13119, 2023 | 8 | 2023 |
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021 | 8 | 2021 |
NEUTRON: a graph-based pipeline for zero-trust network architectures C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 5 | 2022 |
Real-time Digital Signatures for Named Data Networking C Katsis, A Singla, E Bertino Proceedings of the 7th ACM Conference on Information-Centric Networking, 149-151, 2020 | 3 | 2020 |
Machine Learning Techniques for Cybersecurity E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Springer, 2023 | 2 | 2023 |
A Pro-Active Defense Framework for IoT Systems E Bertino, H Lee, M Huang, C Katsis, Z Shen, B Ribeiro, D De Mello, ... 2023 IEEE 9th International Conference on Collaboration and Internet …, 2023 | | 2023 |
Challenges in the Use of ML for Security E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 131-143, 2023 | | 2023 |
Hardware Security Analysis E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 71-77, 2023 | | 2023 |
Security Policy Learning E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 23-45, 2023 | | 2023 |
Software Security Analysis E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 47-69, 2023 | | 2023 |
Background on Machine Learning Techniques E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 9-21, 2023 | | 2023 |
Attack Management E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 105-114, 2023 | | 2023 |
Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs X Jin, C Katsis, F Sang, J Sun, E Bertino, RR Kompella, A Kundu | | |
2023 IEEE 9th International Conference on Collaboration and Internet Computing (CIC)| 979-8-3503-3912-3/23/$31.00© 2023 IEEE| DOI: 10.1109/CIC58953. 2023.00026 T Abdelzaher, N Ammar, IB Arpinar, MA Ayub, NH Barna, E Bertino, ... | | |