Alert button
Picture for Asaf Shabtai

Asaf Shabtai

Alert button

Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes

Add code
Bookmark button
Alert button
Jul 17, 2020
Yoni Birman, Ziv Ido, Gilad Katz, Asaf Shabtai

Figure 1 for Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes
Figure 2 for Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes
Figure 3 for Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes
Figure 4 for Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes
Viaarxiv icon

Adversarial Learning in the Cyber Security Domain

Add code
Bookmark button
Alert button
Jul 05, 2020
Ihai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach

Figure 1 for Adversarial Learning in the Cyber Security Domain
Figure 2 for Adversarial Learning in the Cyber Security Domain
Figure 3 for Adversarial Learning in the Cyber Security Domain
Figure 4 for Adversarial Learning in the Cyber Security Domain
Viaarxiv icon

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

Add code
Bookmark button
Alert button
Jun 30, 2020
Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai

Figure 1 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 2 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 3 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 4 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Viaarxiv icon

DANTE: A framework for mining and monitoring darknet traffic

Add code
Bookmark button
Alert button
Mar 05, 2020
Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai

Figure 1 for DANTE: A framework for mining and monitoring darknet traffic
Figure 2 for DANTE: A framework for mining and monitoring darknet traffic
Figure 3 for DANTE: A framework for mining and monitoring darknet traffic
Figure 4 for DANTE: A framework for mining and monitoring darknet traffic
Viaarxiv icon

Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks

Add code
Bookmark button
Alert button
Feb 07, 2020
Moshe Kravchik, Asaf Shabtai

Figure 1 for Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks
Figure 2 for Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks
Figure 3 for Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks
Figure 4 for Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks
Viaarxiv icon

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization

Add code
Bookmark button
Alert button
Feb 06, 2020
Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici

Figure 1 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 2 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 3 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 4 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Viaarxiv icon

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

Add code
Bookmark button
Alert button
Sep 08, 2019
Gil Fidel, Ron Bitton, Asaf Shabtai

Figure 1 for When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures
Figure 2 for When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures
Figure 3 for When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures
Figure 4 for When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures
Viaarxiv icon

Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks

Add code
Bookmark button
Alert button
Jul 02, 2019
Moshe Kravchik, Asaf Shabtai

Figure 1 for Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks
Figure 2 for Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks
Figure 3 for Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks
Figure 4 for Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks
Viaarxiv icon

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Add code
Bookmark button
Alert button
May 31, 2019
Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai

Figure 1 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 2 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 3 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Figure 4 for Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup
Viaarxiv icon

ASPIRE: Automated Security Policy Implementation Using Reinforcement Learning

Add code
Bookmark button
Alert button
May 25, 2019
Yoni Birman, Shaked Hindi, Gilad Katz, Asaf Shabtai

Figure 1 for ASPIRE: Automated Security Policy Implementation Using Reinforcement Learning
Figure 2 for ASPIRE: Automated Security Policy Implementation Using Reinforcement Learning
Figure 3 for ASPIRE: Automated Security Policy Implementation Using Reinforcement Learning
Figure 4 for ASPIRE: Automated Security Policy Implementation Using Reinforcement Learning
Viaarxiv icon