Follow
Erick Galinkin
Title
Cited by
Cited by
Year
Winning the ransomware lottery: A game-theoretic approach to preventing ransomware attacks
E Galinkin
International Conference on Decision and Game Theory for Security, 195-207, 2021
152021
Fast, lightweight IoT anomaly detection using feature pruning and PCA
J Carter, S Mancoridis, E Galinkin
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, 133-138, 2022
122022
The influence of dropout on membership inference in differentially private models
E Galinkin
arXiv preprint arXiv:2103.09008, 2021
72021
Evaluating attacker risk behavior in an internet of things ecosystem
E Galinkin, J Carter, S Mancoridis
International Conference on Decision and Game Theory for Security, 354-364, 2021
52021
The state of AI ethics report (June 2020)
A Gupta, C Lanteigne, V Heath, MB Ganapini, E Galinkin, A Cohen, ...
arXiv preprint arXiv:2006.14662, 2020
52020
Towards a responsible AI development lifecycle: Lessons from information security
E Galinkin
arXiv preprint arXiv:2203.02958, 2022
42022
The State of AI Ethics Report (October 2020)
A Gupta, A Royer, V Heath, C Wright, C Lanteigne, A Cohen, ...
arXiv preprint arXiv:2011.02787, 2020
32020
Green lighting ML: confidentiality, integrity, and availability of machine learning systems in deployment
A Gupta, E Galinkin
arXiv preprint arXiv:2007.04693, 2020
32020
The Future of Cyber Attacks and Defense is in the Cloud
E Galinkin, J Hwong, A Singh, C Estep, A Vamshi, R Canzanese
IEEE 14th International Conference on Malicious and Unwanted Software, 2019
32019
Attack on critical infrastructure leverages template injection
S Baird, E Carter, E Galinkin, C Marczewski, J Marshall
Talos Intelligence Blog. http://web. archive. org/web/20170718181549/http …, 2017
32017
What is the Shape of an Executable?
E Galinkin
Conference on Applied Machine Learning in Information Security, 2019
22019
Simulation of Attacker Defender Interaction in a Noisy Security Game
E Galinkin, E Pountourakis, J Carter, S Mancoridis
arXiv preprint arXiv:2212.04281, 2022
12022
Robustness and usefulness in AI explanation methods
E Galinkin
arXiv preprint arXiv:2203.03729, 2022
12022
The State of AI Ethics Report (January 2021)
A Gupta, A Royer, C Wright, FA Khan, V Heath, E Galinkin, R Khurana, ...
arXiv preprint arXiv:2105.09059, 2021
12021
Information security games: a survey
E Galinkin
arXiv preprint arXiv:2103.12520, 2021
12021
Malicious Network Traffic Detection via Deep Learning: An Information Theoretic View
E Galinkin
arXiv preprint arXiv:2009.07753, 2020
12020
AEGIS: Online Adaptive AI Content Safety Moderation with Ensemble of LLM Experts
S Ghosh, P Varshney, E Galinkin, C Parisien
arXiv preprint arXiv:2404.05993, 2024
2024
The Cost of Cybersecurity Exposures: Evidence from a Direct Measure of Firm Network Vulnerabilities
T Liu, C Makridis, E Galinkin
Available at SSRN 3746589, 2023
2023
IoT Malware Data Augmentation using a Generative Adversarial Network
J Carter, P Protopapas, S Mancoridis, E Galinkin
56th Hawaii International Conference on System Sciences, 2023
2023
Behavioral Malware Detection using a Language Model Classifier Trained on sys2vec Embeddings
J Carter, P Protopapas, S Mancoridis, E Galinkin
56th Hawaii International Conference on System Sciences, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20