Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Kotak, Jaidip"'
Autor:
Biton, Dudi, Misra, Aditi, Levy, Efrat, Kotak, Jaidip, Bitton, Ron, Schuster, Roei, Papernot, Nicolas, Elovici, Yuval, Nassi, Ben
Machine learning (ML) models are known to be vulnerable to a number of attacks that target the integrity of their predictions or the privacy of their training data. To carry out these attacks, a black-box adversary must typically possess the ability
Externí odkaz:
http://arxiv.org/abs/2309.02159
Autor:
Kotak, Jaidip, Elovici, Yuval
Attack vectors for adversaries have increased in organizations because of the growing use of less secure IoT devices. The risk of attacks on an organization's network has also increased due to the bring your own device (BYOD) policy which permits emp
Externí odkaz:
http://arxiv.org/abs/2303.12800
Autor:
Mirsky, Yisroel, Demontis, Ambra, Kotak, Jaidip, Shankar, Ram, Gelei, Deng, Yang, Liu, Zhang, Xiangyu, Lee, Wenke, Elovici, Yuval, Biggio, Battista
AI has provided us with the ability to automate tasks, extract information from vast amounts of data, and synthesize media that is nearly indistinguishable from the real thing. However, positive tools can also be used for negative purposes. In partic
Externí odkaz:
http://arxiv.org/abs/2106.15764
Autor:
Kotak, Jaidip, Elovici, Yuval
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers due to the less secure nature of the devices. The widely adopted bring your own device (BYOD) policy which allows an employee to bring a
Externí odkaz:
http://arxiv.org/abs/2002.11686
Internet of Things is revolutionizing the current era with its vast usage in number of fields such as medicine, automation, home security, smart cities, etc. As these IoT devices' uses are increasing, the threat to its security and to its application
Externí odkaz:
http://arxiv.org/abs/1908.07835
Autor:
Mirsky, Yisroel, Demontis, Ambra, Kotak, Jaidip, Shankar, Ram, Gelei, Deng, Yang, Liu, Zhang, Xiangyu, Pintor, Maura, Lee, Wenke, Elovici, Yuval, Biggio, Battista
Publikováno v:
In Computers & Security January 2023 124
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions.
Autor:
Kotak, Jaidip1 (AUTHOR), Habler, Edan1 (AUTHOR), Brodt, Oleg1 (AUTHOR), Shabtai, Asaf1 (AUTHOR), Elovici, Yuval1 (AUTHOR) elovici@bgu.ac.il
Publikováno v:
Sensors (14248220). Apr2023, Vol. 23 Issue 8, p4018. 25p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Mistry, Nilay R., Koshy, Binoj, Dahiya, Mohindersinh, Chaudhary, Chirag, Patel, Harshal, Parekh, Dhaval, Kotak, Jaidip, Nayi, Komal, Badva, Priyanka
Publikováno v:
International Journal of Information Security & Privacy; Jul-Sep2016, Vol. 10 Issue 3, p10-24, 15p