关注
Hodaya Binyamini
Hodaya Binyamini
未知所在单位机构
在 post.bgu.ac.il 的电子邮件经过验证
标题
引用次数
引用次数
年份
A framework for modeling cyber attack techniques from security vulnerability descriptions
H Binyamini, R Bitton, M Inokuchi, T Yagyu, Y Elovici, A Shabtai
Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data …, 2021
182021
An automated, end-to-end framework for modeling attacks from vulnerability descriptions
H Binyamini, R Bitton, M Inokuchi, T Yagyu, Y Elovici, A Shabtai
arXiv preprint arXiv:2008.04377, 2020
182020
HateVersarial: Adversarial attack against hate speech detection algorithms on Twitter
E Grolman, H Binyamini, A Shabtai, Y Elovici, I Morikawa, T Shimizu
Proceedings of the 30th ACM Conference on User Modeling, Adaptation and …, 2022
162022
Automated cyber-security attack method prediction using detected vulnerabilities
H Binyamini, LW DiValentin, G Engelberg, D Klein, M Hadad, P Genc, ...
US Patent App. 18/335,686, 2023
32023
Attack information processing apparatus, attack information processing method, and computer readable medium
M Inokuchi, T Yagyu, A Shabtai, Y Elovici, R Bitton, H Binyamini
US Patent App. 17/793,110, 2023
12023
Automated cybersecurity vulnerability prioritization
A Ding, H Binyamini, G Engelberg, LW DiValentin, BG McCarty, D Klein, ...
US Patent App. 18/409,916, 2024
2024
Automated prediction of cyber-security attack techniques using knowledge mesh
G Engelberg, D Klein, M Hadad, H Binyamini
US Patent App. 18/335,305, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–7