Insight into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures I Homoliak, F Toffalini, J Guarnizo, Y Elovici, M Ochoa ACM Computing Surveys (CSUR) 52 (2), 1-40, 2019 | 290 | 2019 |
The security reference architecture for blockchains: Toward a standardized model for studying vulnerabilities, threats, and defenses I Homoliak, S Venugopalan, D Reijsbergen, Q Hum, R Schumi, ... IEEE Communications Surveys & Tutorials 23 (1), 341-390, 2020 | 102 | 2020 |
{StrongChain}: Transparent and Collaborative {Proof-of-Work} Consensus P Szalachowski, D Reijsbergen, I Homoliak, S Sun 28th USENIX Security Symposium (USENIX Security 19), 819-836, 2019 | 67 | 2019 |
HADES-IoT: A practical host-based anomaly detection system for IoT devices D Breitenbacher, I Homoliak, YL Aung, NO Tippenhauer, Y Elovici Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 64 | 2019 |
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition A Harilal, F Toffalini, J Castellanos, J Guarnizo, I Homoliak, M Ochoa Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017 | 60 | 2017 |
A security reference architecture for blockchains I Homoliak, S Venugopalan, Q Hum, P Szalachowski 2019 IEEE International Conference on Blockchain (Blockchain), 390-397, 2019 | 47 | 2019 |
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. A Harilal, F Toffalini, I Homoliak, JH Castellanos, J Guarnizo, S Mondal, ... J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 54-85, 2018 | 46 | 2018 |
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach PH Ivan Homoliak, Martin Teknös, Martín Ochoa, Dominik Breitenbacher, Saeid ... EAI Endorsed Transactions on Security and Safety 5 (17), https://eudl.eu/pdf …, 2018 | 43* | 2018 |
Adversarial attacks on remote user authentication using behavioural mouse dynamics YXM Tan, A Iacovazzi, I Homoliak, Y Elovici, A Binder 2019 International Joint Conference on Neural Networks (IJCNN), 1-10, 2019 | 32 | 2019 |
ASNM: Advanced security network metrics for attack vector description I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek Proceedings of the International Conference on Security and Management (SAM), 1, 2013 | 27 | 2013 |
SmartOTPs: An air-gapped 2-factor authentication for smart-contract wallets I Homoliak, D Breitenbacher, O Hujnak, P Hartel, A Binder, ... Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020 | 25* | 2020 |
Intercepting hail hydra: Real-time detection of algorithmically generated domains F Casino, N Lykousas, I Homoliak, C Patsakis, J Hernandez-Castro Journal of Network and Computer Applications 190, 103135, 2021 | 19 | 2021 |
ASNM Datasets: A collection of network attacks for testing of adversarial classifiers and intrusion detectors I Homoliak, K Malinka, P Hanacek Ieee Access 8, 112427-112453, 2020 | 19 | 2020 |
HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version) D Breitenbacher, I Homoliak, YL Aung, Y Elovici, NO Tippenhauer IEEE Internet of Things Journal 9 (12), 9640-9658, 2021 | 17 | 2021 |
Detection of masqueraders based on graph partitioning of file system access events F Toffalini, I Homoliak, A Harilal, A Binder, M Ochoa 2018 IEEE Security and Privacy Workshops (SPW), 217-227, 2018 | 16 | 2018 |
An empirical study into the success of listed smart contracts in ethereum P Hartel, I Homoliak, D Reijsbergen IEEE Access 7, 177539-177555, 2019 | 15 | 2019 |
Characteristics of buffer overflow attacks tunneled in HTTP traffic I Homoliak, D Ovsonka, K Koranda, P Hanacek 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 15 | 2014 |
Coinwatch: A clone-based approach for detecting vulnerabilities in cryptocurrencies Q Hum, WJ Tan, SY Tey, L Lenus, I Homoliak, Y Lin, J Sun 2020 IEEE International Conference on Blockchain (Blockchain), 17-25, 2020 | 13 | 2020 |
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic I Homoliak, D Ovsonka, M Gregr, P Hanacek The 9th International Conference for Internet Technology and Secured …, 2014 | 12 | 2014 |
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. I Homoliak, D Breitenbacher, P Hanacek J. Comput. 12 (2), 143-155, 2017 | 11 | 2017 |