关注
Charalampos Katsis
Charalampos Katsis
PhD Student, Purdue University
在 purdue.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Gamification of cybersecurity for workforce development in critical infrastructure
TD Ashley, R Kwon, SNG Gourisetti, C Katsis, CA Bonebrake, PA Boyd
Ieee Access 10, 112487-112501, 2022
112022
Edge security: Challenges and issues
X Jin, C Katsis, F Sang, J Sun, A Kundu, R Kompella
arXiv preprint arXiv:2206.07164, 2022
112022
Prometheus: Infrastructure security posture analysis with ai-generated attack graphs
X Jin, C Katsis, F Sang, J Sun, E Bertino, RR Kompella, A Kundu
arXiv preprint arXiv:2312.13119, 2023
82023
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing
C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
82021
NEUTRON: a graph-based pipeline for zero-trust network architectures
C Katsis, F Cicala, D Thomsen, N Ringo, E Bertino
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
52022
Real-time Digital Signatures for Named Data Networking
C Katsis, A Singla, E Bertino
Proceedings of the 7th ACM Conference on Information-Centric Networking, 149-151, 2020
32020
Machine Learning Techniques for Cybersecurity
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Springer, 2023
22023
A Pro-Active Defense Framework for IoT Systems
E Bertino, H Lee, M Huang, C Katsis, Z Shen, B Ribeiro, D De Mello, ...
2023 IEEE 9th International Conference on Collaboration and Internet …, 2023
2023
Challenges in the Use of ML for Security
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 131-143, 2023
2023
Hardware Security Analysis
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 71-77, 2023
2023
Security Policy Learning
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 23-45, 2023
2023
Software Security Analysis
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 47-69, 2023
2023
Background on Machine Learning Techniques
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 9-21, 2023
2023
Attack Management
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 105-114, 2023
2023
Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs
X Jin, C Katsis, F Sang, J Sun, E Bertino, RR Kompella, A Kundu
2023 IEEE 9th International Conference on Collaboration and Internet Computing (CIC)| 979-8-3503-3912-3/23/$31.00© 2023 IEEE| DOI: 10.1109/CIC58953. 2023.00026
T Abdelzaher, N Ammar, IB Arpinar, MA Ayub, NH Barna, E Bertino, ...
系统目前无法执行此操作,请稍后再试。
文章 1–16