Birhanu Eshete
Publications
Mentoring
Teaching
Service
Contact
<b>Birhanu Eshete</b>
Latest
Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Chainsaw: Chained Automated Workflow-based Exploit Generation
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration
WebWinnow: Leveraging exploit kit workflows to detect malicious URLs
Effective Analysis, Characterization, and Detection of Malicious Activities on the Web
EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages
ConfEagle: Automated Analysis of Security Configuration Vulnerabilities in Web Applications
Effective Analysis, Characterization, and Detection of Malicious Web Pages
SAMo: Experimenting a Social Accountability Web Platform
Social Accountability for Mozambique: an Experience Report from the Moamba District
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages
Early Detection of Security Misconfiguration Vulnerabilities in Web Applications
Malicious Website Detection: Effectiveness and Efficiency Issues
Measuring the Impact of Different Metrics on Software Quality: a Case Study in the Open Source Domain
Host-based Anomaly Detection for Pervasive Medical Systems
Context Information Refinement for Pervasive Medical Systems
ICT for Good: Opportunities, Challenges and the Way Forward
Context Information Refinement for Pervasive Medical Systems
Cite
×