A framework for modeling cyber attack techniques from security vulnerability descriptions H Binyamini, R Bitton, M Inokuchi, T Yagyu, Y Elovici, A Shabtai Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data …, 2021 | 18 | 2021 |
An automated, end-to-end framework for modeling attacks from vulnerability descriptions H Binyamini, R Bitton, M Inokuchi, T Yagyu, Y Elovici, A Shabtai arXiv preprint arXiv:2008.04377, 2020 | 18 | 2020 |
HateVersarial: Adversarial attack against hate speech detection algorithms on Twitter E Grolman, H Binyamini, A Shabtai, Y Elovici, I Morikawa, T Shimizu Proceedings of the 30th ACM Conference on User Modeling, Adaptation and …, 2022 | 16 | 2022 |
Automated cyber-security attack method prediction using detected vulnerabilities H Binyamini, LW DiValentin, G Engelberg, D Klein, M Hadad, P Genc, ... US Patent App. 18/335,686, 2023 | 3 | 2023 |
Attack information processing apparatus, attack information processing method, and computer readable medium M Inokuchi, T Yagyu, A Shabtai, Y Elovici, R Bitton, H Binyamini US Patent App. 17/793,110, 2023 | 1 | 2023 |
Automated cybersecurity vulnerability prioritization A Ding, H Binyamini, G Engelberg, LW DiValentin, BG McCarty, D Klein, ... US Patent App. 18/409,916, 2024 | | 2024 |
Automated prediction of cyber-security attack techniques using knowledge mesh G Engelberg, D Klein, M Hadad, H Binyamini US Patent App. 18/335,305, 2023 | | 2023 |