User profiles for Oleg Brodt
Oleg BrodtBen-Gurion University Verified email at bgu.ac.il Cited by 213 |
Security of open radio access networks
The Open Radio Access Network (O-RAN) is a promising radio access network (RAN)
architecture aimed at reshaping the RAN industry toward an open, adaptive, and intelligent RAN. …
architecture aimed at reshaping the RAN industry toward an open, adaptive, and intelligent RAN. …
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions
During the COVID-19 pandemic, most organizations were forced to implement a work-from-home
policy, and in many cases, employees have not been expected to return to the office on …
policy, and in many cases, employees have not been expected to return to the office on …
Evaluating the security of open radio access networks
The Open Radio Access Network (O-RAN) is a promising RAN architecture, aimed at
reshaping the RAN industry toward an open, adaptive, and intelligent RAN. In this paper, we …
reshaping the RAN industry toward an open, adaptive, and intelligent RAN. In this paper, we …
Increased cyber-biosecurity for DNA synthesis
Some unique functions in FDALabel, not previously available in a single application platform,
are particularly useful for addressing broad scientific questions. Drug labeling documents …
are particularly useful for addressing broad scientific questions. Drug labeling documents …
A Survey on Geolocation on the Internet
…, B Pincu, Y Glickshtein, R Kant, O Brodt… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In the interconnected world of the Internet, IP geolocation -identifying the geographic
location of a device, user, or data source given their IP -plays an essential role in numerous …
location of a device, user, or data source given their IP -plays an essential role in numerous …
Adversarial machine learning threat analysis and remediation in open radio access network (o-ran)
O-RAN is a new, open, adaptive, and intelligent RAN architecture. Motivated by the success
of artificial intelligence in other domains, O-RAN strives to leverage machine learning (ML) …
of artificial intelligence in other domains, O-RAN strives to leverage machine learning (ML) …
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions
Information and communication technology (ICT) is playing an expanding and critical role in
our modern lives. Due to its proliferation, ICT has a significant impact on global energy …
our modern lives. Due to its proliferation, ICT has a significant impact on global energy …
Detection of compromised functions in a serverless cloud environment
L Ben-Shimol, D Lavi, E Klevansky, O Brodt… - Computers & …, 2025 - Elsevier
Serverless computing is an emerging cloud paradigm with serverless functions at its core.
While serverless environments enable software developers to focus on developing …
While serverless environments enable software developers to focus on developing …
OSSIntegrity: Collaborative open-source code integrity verification
Open-source software (OSS) libraries have become popular among developers due to their
ability to reduce development time and costs. However, OSS can also be exploited and used …
ability to reduce development time and costs. However, OSS can also be exploited and used …
On the vulnerability of anti-malware solutions to DNS attacks
Anti-malware agents typically communicate with their remote services to share information
about suspicious files. These remote services use their up-to-date information and global …
about suspicious files. These remote services use their up-to-date information and global …