


default search action
Yuval Elovici
Person information
- affiliation: Telekom Innovation Laboratories at Ben-Gurion University of the Negev, Beer-Sheva, Israel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j155]Lavi Ben-Shimol, Danielle Lavi, Eitan Klevansky, Oleg Brodt, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
Detection of compromised functions in a serverless cloud environment. Comput. Secur. 150: 104261 (2025) - [j154]Alon Malach, Prasanna N. Wudali, Satoru Momiyama, Jun Furukawa, Toshinori Araki, Yuval Elovici, Asaf Shabtai:
CyberShapley: Explanation, prioritization, and triage of cybersecurity alerts using informative graph representation. Comput. Secur. 150: 104270 (2025) - [j153]David Tayouri, Omri Sgan Cohen, Inbar Maimon, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
CORAL: Container Online Risk Assessment with Logical attack graphs. Comput. Secur. 150: 104296 (2025) - [j152]Edan Habler, Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran
, Oleg Brodt
, Heiko Lehmann, Yuval Elovici, Asaf Shabtai
:
Adversarial machine learning threat analysis and remediation in Open Radio Access Network (O-RAN). J. Netw. Comput. Appl. 236: 104090 (2025) - 2024
- [j151]Mor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran
, Oleg Brodt
, Aviad Elyashar, Yuval Elovici, Asaf Shabtai
:
OSSIntegrity: Collaborative open-source code integrity verification. Comput. Secur. 144: 103977 (2024) - [j150]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: explainable adversarial patch detection for object detectors in retail. Mach. Learn. 113(9): 6273-6292 (2024) - [j149]Efrat Levy
, Nadav Maman, Asaf Shabtai
, Yuval Elovici
:
AnoMili: Spoofing Hardening and Explainable Anomaly Detection for the 1553 Military Avionic Bus. IEEE Trans. Aerosp. Electron. Syst. 60(6): 7738-7753 (2024) - [j148]Moshe Levy
, Guy Amit
, Yuval Elovici
, Yisroel Mirsky
:
Ranking the Transferability of Adversarial Examples. ACM Trans. Intell. Syst. Technol. 15(5): 100:1-100:21 (2024) - [j147]Amit Giloni
, Edita Grolman
, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici
, Asaf Shabtai
:
BENN: Bias Estimation Using a Deep Neural Network. IEEE Trans. Neural Networks Learn. Syst. 35(1): 117-131 (2024) - [c203]Adi Ashkenazi, Edita Grolman, Aviad Elyashar, Dudu Mimran, Oleg Brodt, Yuval Elovici, Asaf Shabtai:
SMART: Serverless Module Analysis and Recognition Technique for Managed Applications. CCGrid 2024: 442-452 - [c202]Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai:
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection. CVPR 2024: 5788-5797 - [c201]Noa Wegerhoff, Avishag Shapira, Yuval Elovici, Asaf Shabtai:
DataDetective: Dataset Watermarking for Leaker Identification in ML Training. ECAI 2024: 2442-2451 - [c200]Roye Katzav, Amit Giloni
, Edita Grolman
, Hiroo Saito, Tomoyuki Shibata, Tsukasa Omino, Misaki Komatsu, Yoshikazu Hanatani, Yuval Elovici
, Asaf Shabtai
:
AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems. ECCV (75) 2024: 288-303 - [c199]Sagi Brudni, Sapir Anidgar, Oleg Brodt, Dudu Mimran, Asaf Shabtai, Yuval Elovici:
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions. EuroS&P 2024: 676-696 - [c198]Moshe Levy
, Guy Amit
, Yuval Elovici
, Yisroel Mirsky
:
The Security of Deep Learning Defenses in Medical Imaging. HealthSec@CCS 2024: 37-44 - [c197]Shoham Hanina, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Universal Adversarial Attack Against Speaker Recognition Models. ICASSP 2024: 4860-4864 - [c196]Edita Grolman, Amit Giloni, Ryuta Kremer, Hiroo Saito, Tomoyuki Shibata, Tsukasa Omino, Misaki Komatsu, Yoshikazu Hanatani, Asaf Shabtai, Yuval Elovici:
Query-Based External Information Leakage Attacks on Face Recognition Models. IJCNN 2024: 1-10 - [c195]Ido Sakazi, Edita Grolman, Yuval Elovici, Asaf Shabtai:
STFL: Utilizing a Semi-Supervised, Transfer-Learning, Federated-Learning Approach to Detect Phishing URL Attacks. IJCNN 2024: 1-10 - [c194]Nitzan Bitton Guetta, Aviv Slobodkin, Aviya Maimon, Eliya Habba, Royi Rassin, Yonatan Bitton, Idan Szpektor, Amir Globerson, Yuval Elovici:
Visual Riddles: a Commonsense and World Knowledge Challenge for Large Vision and Language Models. NeurIPS 2024 - [c193]Oryan Yehezkel, Alon Zolfi, Amit Baras, Yuval Elovici, Asaf Shabtai:
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms. NeurIPS 2024 - [c192]Mor Nahum
, Edita Grolman
, Inbar Maimon
, Dudu Mimran
, Oleg Brodt
, Aviad Elyashar
, Yuval Elovici
, Asaf Shabtai
:
Secure Crowdsource-Based Open-Source Code Verification (SC)^2V. SAC 2024: 1536-1538 - [c191]Ben Nassi, Etay Iluz, Or Hai Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici:
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras. SP 2024: 2422-2440 - [i159]Sagiv Antebi, Noam Azulay, Edan Habler, Ben Ganon, Asaf Shabtai, Yuval Elovici:
GPT in Sheep's Clothing: The Risk of Customized GPTs. CoRR abs/2401.09075 (2024) - [i158]Oryan Yehezkel, Alon Zolfi, Amit Baras, Yuval Elovici, Asaf Shabtai:
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers. CoRR abs/2402.02554 (2024) - [i157]Dov Shirtz, Inna Koberman, Aviad Elyashar, Rami Puzis, Yuval Elovici:
Enhancing Energy Sector Resilience: Integrating Security by Design Principles. CoRR abs/2402.11543 (2024) - [i156]Amit Finkman, Eden Bar-Kochva, Avishag Shapira, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants. CoRR abs/2404.09066 (2024) - [i155]Lavi Ben-Shimol, Edita Grolman, Aviad Elyashar, Inbar Maimon, Dudu Mimran, Oleg Brodt, Martin Strassmann, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring. CoRR abs/2405.07172 (2024) - [i154]Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation. CoRR abs/2405.19954 (2024) - [i153]Yonatan Amaru, Prasanna N. Wudali, Yuval Elovici, Asaf Shabtai:
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning. CoRR abs/2406.05362 (2024) - [i152]Yuval Schwartz, Lavi Ben-Shimol, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI. CoRR abs/2407.05194 (2024) - [i151]Beni Ifland, Elad Duani, Rubin Krief, Miro Ohana, Aviram Zilberman, Andres Murillo, Ofir Manor, Ortal Lavi, Hikichi Kenji, Asaf Shabtai, Yuval Elovici, Rami Puzis:
GeNet: A Multimodal LLM-Based Co-Pilot for Network Topology and Configuration. CoRR abs/2407.08249 (2024) - [i150]Fred Matanel Grabovski, Lior Yasur, Guy Amit, Yuval Elovici, Yisroel Mirsky:
Back-in-Time Diffusion: Unsupervised Detection of Medical Deepfakes. CoRR abs/2407.15169 (2024) - [i149]Nitzan Bitton Guetta, Aviv Slobodkin, Aviya Maimon, Eliya Habba, Royi Rassin, Yonatan Bitton, Idan Szpektor, Amir Globerson, Yuval Elovici:
Visual Riddles: a Commonsense and World Knowledge Challenge for Large Vision and Language Models. CoRR abs/2407.19474 (2024) - [i148]Danielle Lavi, Oleg Brodt, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
Detection of Compromised Functions in a Serverless Cloud Environment. CoRR abs/2408.02641 (2024) - [i147]Tom Segal
, Asaf Shabtai, Yuval Elovici:
DOMBA: Double Model Balancing for Access-Controlled Language Models via Minimum-Bounded Aggregation. CoRR abs/2408.11121 (2024) - [i146]Ben Ganon, Alon Zolfi, Omer Hofman, Inderjeet Singh, Hisashi Kojima, Yuval Elovici, Asaf Shabtai:
DIESEL - Dynamic Inference-Guidance via Evasion of Semantic Embeddings in LLMs. CoRR abs/2411.19038 (2024) - [i145]Yael Itzhakev, Amit Giloni, Yuval Elovici, Asaf Shabtai:
Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency. CoRR abs/2412.07326 (2024) - 2023
- [j146]Ben Nassi, Yisroel Mirsky, Jacob Shams, Raz Ben-Netanel, Dudi Nassi, Yuval Elovici:
Protecting Autonomous Cars from Phantom Attacks. Commun. ACM 66(4): 56-69 (2023) - [j145]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Maura Pintor
, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. Comput. Secur. 124: 103006 (2023) - [j144]Ron Bitton
, Nadav Maman
, Inderjeet Singh
, Satoru Momiyama
, Yuval Elovici
, Asaf Shabtai
:
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. ACM Comput. Surv. 55(9): 183:1-183:36 (2023) - [j143]Jaidip Kotak
, Yuval Elovici
:
Adversarial Attacks Against IoT Identification Systems. IEEE Internet Things J. 10(9, May 1): 7868-7883 (2023) - [j142]Jaidip Kotak
, Yuval Elovici:
IoT device identification based on network communication analysis using deep learning. J. Ambient Intell. Humaniz. Comput. 14(7): 9113-9129 (2023) - [j141]Jaidip Kotak
, Edan Habler
, Oleg Brodt, Asaf Shabtai
, Yuval Elovici
:
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. Sensors 23(8): 4018 (2023) - [j140]Florian Klaus Kaiser, Uriel Dardik, Aviad Elitzur, Polina Zilberman
, Nir Daniel
, Marcus Wiens, Frank Schultmann
, Yuval Elovici
, Rami Puzis
:
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph. IEEE Trans. Dependable Secur. Comput. 20(6): 4793-4809 (2023) - [j139]Efrat Levy
, Asaf Shabtai
, Bogdan Groza
, Pal-Stefan Murvay, Yuval Elovici
:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. IEEE Trans. Inf. Forensics Secur. 18: 4800-4814 (2023) - [j138]Adriana Berdich
, Bogdan Groza
, René Mayrhofer
, Efrat Levy
, Asaf Shabtai
, Yuval Elovici
:
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics. IEEE Trans. Mob. Comput. 22(4): 2417-2434 (2023) - [j137]Ari Adler
, Lior Bass, Yuval Elovici
, Rami Puzis:
How Polynomial Regression Improves DeNATing. IEEE Trans. Netw. Serv. Manag. 20(4): 5000-5011 (2023) - [c190]Dudi Biton
, Aditi Misra
, Efrat Levy
, Jaidip Kotak
, Ron Bitton
, Roei Schuster
, Nicolas Papernot
, Yuval Elovici
, Ben Nassi
:
The Adversarial Implications of Variable-Time Inference. AISec@CCS 2023: 103-114 - [c189]Ben Nassi
, Ofek Vayner
, Etay Iluz
, Dudi Nassi
, Jan Jancar
, Daniel Genkin
, Eran Tromer
, Boris Zadov
, Yuval Elovici
:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. CCS 2023: 268-280 - [c188]Adi Offer
, Aviram Zilberman
, Asaf Shabtai
, Yuval Elovici
, Rami Puzis
:
CDGeB: Cloud Data Geolocation Benchmark. CCSW@CCS 2023: 69-74 - [c187]Nitzan Bitton Guetta, Yonatan Bitton, Jack Hessel, Ludwig Schmidt, Yuval Elovici, Gabriel Stanovsky, Roy Schwartz:
Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images. ICCV 2023: 2616-2627 - [c186]Michael Fire
, Rami Puzis
, Dima Kagan
, Yuval Elovici
:
Large-Scale Shill Bidder Detection in E-commerce. IDEAS 2023: 79-86 - [c185]Satoru Koda, Alon Zolfi, Edita Grolman, Asaf Shabtai, Ikuya Morikawa, Yuval Elovici:
Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey. IJCNN 2023: 1-10 - [c184]Yakov Mallah, Yuval Elovici, Asaf Shabtai:
Risk Oriented Resource Allocation in Robotic Swarm. PST 2023: 1-7 - [c183]Ben Nassi, Raz Swissa, Jacob Shams, Boris Zadov, Yuval Elovici:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. SP (Workshops) 2023: 298-310 - [i144]Nitzan Bitton Guetta, Yonatan Bitton, Jack Hessel, Ludwig Schmidt, Yuval Elovici, Gabriel Stanovsky, Roy Schwartz:
Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images. CoRR abs/2303.07274 (2023) - [i143]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Based on Network Communication Analysis Using Deep Learning. CoRR abs/2303.12800 (2023) - [i142]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail. CoRR abs/2306.08422 (2023) - [i141]Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi:
The Adversarial Implications of Variable-Time Inference. CoRR abs/2309.02159 (2023) - [i140]Priyanka Prakash Surve, Oleg Brodt, Mark Yampolskiy, Yuval Elovici, Asaf Shabtai:
SoK: Security Below the OS - A Security Analysis of UEFI. CoRR abs/2311.03809 (2023) - [i139]Ryuta Kremer, Prasanna N. Wudali, Satoru Momiyama, Toshinori Araki, Jun Furukawa
, Yuval Elovici, Asaf Shabtai:
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response. CoRR abs/2311.03825 (2023) - [i138]Yizhak Vaisman, Gilad Katz, Yuval Elovici, Asaf Shabtai:
Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks. CoRR abs/2311.18525 (2023) - [i137]Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai:
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning. CoRR abs/2312.01200 (2023) - [i136]Roy Peled, Eran Aizikovich, Edan Habler, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Satellite Systems. CoRR abs/2312.01330 (2023) - [i135]Amit Baras, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers. CoRR abs/2312.02220 (2023) - [i134]Ben Nassi, Etay Iluz, Danny Cohen-Or, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici:
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED. IACR Cryptol. ePrint Arch. 2023: 923 (2023) - [i133]Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. IACR Cryptol. ePrint Arch. 2023: 1068 (2023) - 2022
- [j136]Adriana Berdich
, Bogdan Groza
, Efrat Levy
, Asaf Shabtai
, Yuval Elovici
, René Mayrhofer
:
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings. IEEE Access 10: 122399-122413 (2022) - [j135]Tom Mahler
, Erez Shalom
, Yuval Elovici
, Yuval Shahar
:
A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices. Artif. Intell. Medicine 123: 102229 (2022) - [j134]Yael Mathov
, Tal Ben Senior, Asaf Shabtai, Yuval Elovici:
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. Comput. Secur. 121: 102841 (2022) - [j133]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Security of Open Radio Access Networks. Comput. Secur. 122: 102890 (2022) - [j132]Ben Nassi
, Yaron Pirutin, Jacob Shams, Raz Swissa, Yuval Elovici
, Boris Zadov:
Optical Speech Recovery From Desktop Speakers. Computer 55(11): 40-51 (2022) - [j131]Ishai Rosenberg
, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 54(5): 108:1-108:36 (2022) - [j130]Yael Mathov, Lior Rokach, Yuval Elovici:
Enhancing real-world adversarial patches through 3D modeling of complex target scenes. Neurocomputing 499: 11-22 (2022) - [j129]Dominik Breitenbacher, Ivan Homoliak
, Yan Lin Aung
, Yuval Elovici
, Nils Ole Tippenhauer
:
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version). IEEE Internet Things J. 9(12): 9640-9658 (2022) - [j128]Tom Mahler
, Erez Shalom
, Arnon Makori, Yuval Elovici
, Yuval Shahar
:
A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective. J. Digit. Imaging 35(3): 666-677 (2022) - [j127]Yael Mathov
, Eden Levy, Ziv Katzir
, Asaf Shabtai, Yuval Elovici
:
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples. Knowl. Based Syst. 242: 108377 (2022) - [j126]Barak Davidovich, Ben Nassi
, Yuval Elovici
:
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream. Sensors 22(7): 2608 (2022) - [j125]Ben Nassi
, Jacob Shams
, Lior Rokach
, Yuval Elovici
:
Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices. Sensors 22(9): 3580 (2022) - [j124]Shai Cohen
, Efrat Levy
, Avi Shaked
, Tair Cohen, Yuval Elovici
, Asaf Shabtai
:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. Sensors 22(11): 4259 (2022) - [j123]Orly Stan
, Ron Bitton
, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici
, Asaf Shabtai
:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1936-1954 (2022) - [j122]Yam Sharon, David Berend
, Yang Liu
, Asaf Shabtai
, Yuval Elovici
:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. IEEE Trans. Inf. Forensics Secur. 17: 3225-3237 (2022) - [j121]Penny Chong
, Ngai-Man Cheung
, Yuval Elovici
, Alexander Binder
:
Toward Scalable and Unified Example-Based Explanation and Outlier Detection. IEEE Trans. Image Process. 31: 525-540 (2022) - [c182]Shay Sakazi, Yuval Elovici, Asaf Shabtai:
Prioritizing Antivirus Alerts on Internal Enterprise Machines. DIMVA 2022: 75-95 - [c181]Bogdan Groza
, Lucian Popa, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici:
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks. ESORICS (3) 2022: 658-679 - [c180]Ben Nassi, Jacob Shams
, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. EuroS&P Workshops 2022: 376-383 - [c179]Amit Giloni, Edita Grolman, Yuval Elovici, Asaf Shabtai:
FEPC: Fairness Estimation Using Prototypes and Critics for Tabular Data. ICPR 2022: 4877-4884 - [c178]Yonatan Bitton, Nitzan Bitton Guetta, Ron Yosef, Yuval Elovici, Mohit Bansal, Gabriel Stanovsky, Roy Schwartz:
WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models. NeurIPS 2022 - [c177]Alon Zolfi
, Shai Avidan, Yuval Elovici
, Asaf Shabtai
:
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models. ECML/PKDD (3) 2022: 304-320 - [c176]Nachiket Tapas, Sofia Belikovetsky, Francesco Longo, Antonio Puliafito, Asaf Shabtai, Yuval Elovici:
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain. SMARTCOMP 2022: 311-316 - [c175]Edita Grolman, Hodaya Binyamini, Asaf Shabtai, Yuval Elovici, Ikuya Morikawa, Toshiya Shimizu:
HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter. UMAP 2022: 143-152 - [c174]Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. USENIX Security Symposium 2022: 4401-4417 - [c173]Yushi Cao, David Berend, Palina Tolmach, Guy Amit, Moshe Levy, Yang Liu
, Asaf Shabtai, Yuval Elovici:
Fair and accurate age prediction using distribution aware data curation and augmentation. WACV 2022: 2867-2877 - [i132]Barak Davidovich, Ben Nassi, Yuval Elovici:
VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream. CoRR abs/2201.00419 (2022) - [i131]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Open Radio Access Networks. CoRR abs/2201.06080 (2022) - [i130]Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. CoRR abs/2201.06093 (2022) - [i129]Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky:
The Security of Deep Learning Defences for Medical Imaging. CoRR abs/2201.08661 (2022) - [i128]Efrat Levy, Nadav Maman, Asaf Shabtai, Yuval Elovici:
AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus. CoRR abs/2202.06870 (2022) - [i127]Ben Nassi, Jacob Shams, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. CoRR abs/2202.10080 (2022) - [i126]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. CoRR abs/2204.02057 (2022) - [i125]Efrat Levy, Ben Nassi, Raz Swissa, Yuval Elovici:
EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome. CoRR abs/2205.06765 (2022) - [i124]Yonatan Bitton, Nitzan Bitton Guetta, Ron Yosef, Yuval Elovici, Mohit Bansal, Gabriel Stanovsky, Roy Schwartz:
WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models. CoRR abs/2207.12576 (2022) - [i123]Moshe Levy, Yuval Elovici, Yisroel Mirsky:
Transferability Ranking of Adversarial Examples. CoRR abs/2208.10878 (2022) - [i122]Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Attacking Object Detector Using A Universal Targeted Label-Switch Patch. CoRR abs/2211.08859 (2022) - [i121]Jacob Shams, Ben Nassi, Ikuya Morikawa, Toshiya Shimizu, Asaf Shabtai, Yuval Elovici:
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models. CoRR abs/2211.13644 (2022) - [i120]Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa
, Yuval Elovici, Asaf Shabtai:
Latent SHAP: Toward Practical Human-Interpretable Explanations. CoRR abs/2211.14797 (2022) - [i119]Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai:
YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection. CoRR abs/2212.02081 (2022) - [i118]Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. IACR Cryptol. ePrint Arch. 2022: 227 (2022) - 2021
- [j120]Guy Amit
, Asaf Shabtai
, Yuval Elovici
:
A Self-Healing Mechanism for Internet of Things Devices. IEEE Secur. Priv. 19(1): 44-53 (2021) - [j119]Raz Ben-Netanel, Ben Nassi
, Adi Shamir
, Yuval Elovici
:
Detecting Spying Drones. IEEE Secur. Priv. 19(1): 65-73 (2021) - [j118]Ziv Katzir
, Yuval Elovici
:
Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks. IEEE Trans. Neural Networks Learn. Syst. 32(1): 128-138 (2021) - [c172]Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. CCS 2021: 1900-1914 - [c171]Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:
POSTER: Recovering Songs from a Hanging Light Bulb. CCS 2021: 2381-2383 - [c170]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Spying Drones Using Time Domain Analysis. CSCML 2021: 128-144 - [c169]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. CSF 2021: 1-16 - [c168]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CVPR 2021: 15232-15241 - [c167]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
FOOD: Fast Out-Of-Distribution Detector. IJCNN 2021: 1-8 - [c166]Ori Or-Meir, Aviad Cohen, Yuval Elovici, Lior Rokach, Nir Nissim:
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis. IJCNN 2021: 1-8 - [c165]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants. IJCNN 2021: 1-10 - [c164]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. KDD 2021: 2574-2583 - [c163]Elior Nehemya
, Yael Mathov
, Asaf Shabtai
, Yuval Elovici
:
Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders. ECML/PKDD (4) 2021: 221-236 - [c162]Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy:
Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel. RAID 2021: 135-147 - [c161]Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici:
SoK: Security and Privacy in the Age of Commercial Drones. SP 2021: 1434-1451 - [c160]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai:
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. USENIX Security Symposium 2021: 4259-4276 - [e5]Mark Yampolskiy, Yuval Elovici, Moti Yung:
AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8480-3 [contents] - [i117]Yael Mathov, Lior Rokach, Yuval Elovici:
Enhancing Real-World Adversarial Patches with 3D Modeling Techniques. CoRR abs/2102.05334 (2021) - [i116]Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. CoRR abs/2103.06297 (2021) - [i115]Ziv Katzir, Yuval Elovici:
Who's Afraid of Adversarial Transferability? CoRR abs/2105.00433 (2021) - [i114]Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. CoRR abs/2106.07074 (2021) - [i113]Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs/2106.07895 (2021) - [i112]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. CoRR abs/2106.15764 (2021) - [i111]Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems. CoRR abs/2107.01806 (2021) - [i110]Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici:
Dodging Attack Using Carefully Crafted Natural Makeup. CoRR abs/2109.06467 (2021) - [i109]Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-Man Cheung, Yuval Elovici, Alexander Binder:
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples. CoRR abs/2110.12357 (2021) - [i108]Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai:
Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models. CoRR abs/2111.10759 (2021) - [i107]Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. IACR Cryptol. ePrint Arch. 2021: 1064 (2021) - 2020
- [j117]Aviad Cohen
, Nir Nissim
, Yuval Elovici
:
MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images. IEEE Access 8: 19997-20011 (2020) - [j116]Matan Kintzlinger
, Aviad Cohen
, Nir Nissim
, Moshe Rav-Acha
, Vladimir Khalameizer, Yuval Elovici
, Yuval Shahar
, Amos Katz
:
CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices. IEEE Access 8: 48123-48140 (2020) - [j115]Mordechai Guri
, Yosef A. Solewicz, Yuval Elovici:
Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise. Comput. Secur. 91: 101721 (2020) - [j114]Yair Meidan
, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
:
A novel approach for detecting vulnerable IoT devices connected behind a home NAT. Comput. Secur. 97: 101968 (2020) - [j113]Mordechai Guri, Yosef A. Solewicz, Yuval Elovici:
Speaker-to-speaker covert ultrasonic communication. J. Inf. Secur. Appl. 51: 102458 (2020) - [j112]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight collaborative anomaly detection for the IoT using blockchain. J. Parallel Distributed Comput. 145: 75-97 (2020) - [j111]Daniel Nahmias
, Aviad Cohen, Nir Nissim
, Yuval Elovici:
Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments. Neural Networks 124: 243-257 (2020) - [j110]Naor Kalbo, Yisroel Mirsky
, Asaf Shabtai, Yuval Elovici:
The Security of IP-Based Video Surveillance Systems. Sensors 20(17): 4806 (2020) - [j109]Tomer Gluck, Moshe Kravchik
, Samuel Chocron, Yuval Elovici
, Asaf Shabtai:
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal. Sensors 20(21): 6157 (2020) - [j108]Orly Stan
, Adi Cohen, Yuval Elovici
, Asaf Shabtai
:
Intrusion Detection System for the MIL-STD-1553 Communication Bus. IEEE Trans. Aerosp. Electron. Syst. 56(4): 3010-3027 (2020) - [j107]Penny Chong, Yuval Elovici, Alexander Binder
:
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. IEEE Trans. Inf. Forensics Secur. 15: 1086-1101 (2020) - [j106]Mordechai Guri, Boris Zadov, Yuval Elovici:
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. IEEE Trans. Inf. Forensics Secur. 15: 1190-1203 (2020) - [j105]Mordechai Guri
, Boris Zadov, Dima Bykhovsky
, Yuval Elovici
:
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines. IEEE Trans. Inf. Forensics Secur. 15: 1879-1890 (2020) - [j104]Bronislav Sidik, Rami Puzis, Polina Zilberman
, Yuval Elovici:
PALE: Time Bounded Practical Agile Leader Election. IEEE Trans. Parallel Distributed Syst. 31(2): 470-485 (2020) - [c159]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers. ACSAC 2020: 611-626 - [c158]Tom Mahler
, Erez Shalom
, Yuval Elovici
, Yuval Shahar
:
A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions. AIME 2020: 273-286 - [c157]Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks. CCS 2020: 293-308 - [c156]Lior Sidi, Yisroel Mirsky, Asaf Nadler, Yuval Elovici, Asaf Shabtai:
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets. CIKM 2020: 2741-2748 - [c155]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Using Deep Learning. CISIS 2020: 76-86 - [c154]Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:
Security Ranking of IoT Devices Using an AHP Model. CSCML 2020: 29-44 - [c153]Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. ESORICS (1) 2020: 88-109 - [c152]Yi Xiang Marcus Tan, Yuval Elovici, Alexander Binder
:
Adaptive Noise Injection for Training Stochastic Student Networks from Deterministic Teachers. ICPR 2020: 7587-7594 - [c151]Vinay Sachidananda, Suhas Bhairav, Yuval Elovici:
OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis framework. SAC 2020: 729-738 - [i106]Mordechai Guri, Dima Bykhovsky, Yuval Elovici:
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness. CoRR abs/2002.01078 (2020) - [i105]Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici:
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization. CoRR abs/2002.02176 (2020) - [i104]Tom Mahler
, Yuval Elovici, Yuval Shahar:
A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation. CoRR abs/2002.06938 (2020) - [i103]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Using Deep Learning. CoRR abs/2002.11686 (2020) - [i102]Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai:
DANTE: A framework for mining and monitoring darknet traffic. CoRR abs/2003.02575 (2020) - [i101]Rami Puzis, Polina Zilberman, Yuval Elovici:
ATHAFI: Agile Threat Hunting And Forensic Investigation. CoRR abs/2003.03663 (2020) - [i100]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight Collaborative Anomaly Detection for the IoT using Blockchain. CoRR abs/2006.10587 (2020) - [i99]Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai:
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. CoRR abs/2007.00059 (2020) - [i98]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Learning in the Cyber Security Domain. CoRR abs/2007.02407 (2020) - [i97]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions. CoRR abs/2008.04377 (2020) - [i96]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
GLOD: Gaussian Likelihood Out of Distribution Detector. CoRR abs/2008.06856 (2020) - [i95]Yushi Cao, David Berend, Palina Tolmach, Moshe Levy, Guy Amit, Asaf Shabtai, Yuval Elovici, Yang Liu:
Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems. CoRR abs/2009.05283 (2020) - [i94]Eden Levy, Yael Mathov, Ziv Katzir, Asaf Shabtai, Yuval Elovici:
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples. CoRR abs/2010.03180 (2020) - [i93]Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici:
When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders. CoRR abs/2010.09246 (2020) - [i92]Tal Ben Senior, Yael Mathov, Asaf Shabtai, Yuval Elovici:
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations. CoRR abs/2010.12809 (2020) - [i91]Shahar Hoory, Tzvika Shapira, Asaf Shabtai, Yuval Elovici:
Dynamic Adversarial Patch for Evading Object Detection Models. CoRR abs/2010.13070 (2020) - [i90]Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici:
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers. CoRR abs/2010.16323 (2020) - [i89]Penny Chong, Yuval Elovici, Alexander Binder:
Deja vu from the SVM Era: Example-based Explanations with Outlier Detection. CoRR abs/2011.05577 (2020) - [i88]Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Yuval Elovici, Alexander Binder:
Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity. CoRR abs/2012.06330 (2020) - [i87]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CoRR abs/2012.12528 (2020) - [i86]Amit Giloni, Edita Grolman, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici, Asaf Shabtai:
BENN: Bias Estimation Using Deep Neural Network. CoRR abs/2012.12537 (2020) - [i85]Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. IACR Cryptol. ePrint Arch. 2020: 85 (2020) - [i84]Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. IACR Cryptol. ePrint Arch. 2020: 708 (2020) - [i83]Ben Nassi, Lior Rokach, Yuval Elovici:
The Age of Testifying Wearable Devices: The Case of Intoxication Detection. IACR Cryptol. ePrint Arch. 2020: 1504 (2020) - [i82]Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici:
Botnet IND: About Botnets of Botless IoT Devices. IACR Cryptol. ePrint Arch. 2020: 1518 (2020)
2010 – 2019
- 2019
- [j103]Nir Nissim
, Aviad Cohen
, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles
:
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework. IEEE Access 7: 110050-110073 (2019) - [j102]Jacob Gatlin
, Sofia Belikovetsky, Samuel Bennett Moore, Yosef A. Solewicz, Yuval Elovici, Mark Yampolskiy
:
Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures. IEEE Access 7: 133421-133432 (2019) - [j101]Nitzan Farhi, Nir Nissim, Yuval Elovici:
Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis. Comput. Secur. 85: 240-269 (2019) - [j100]Nir Nissim, Omri Lahav, Aviad Cohen
, Yuval Elovici, Lior Rokach:
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud. Comput. Secur. 87 (2019) - [j99]Ivan Homoliak
, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa:
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Comput. Surv. 52(2): 30:1-30:40 (2019) - [j98]Ori Or-Meir, Nir Nissim
, Yuval Elovici, Lior Rokach:
Dynamic Malware Analysis in the Modern Era - A State of the Art Survey. ACM Comput. Surv. 52(5): 88:1-88:48 (2019) - [j97]Nirnay Ghosh
, Saket Chandra
, Vinay Sachidananda
, Yuval Elovici:
SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT. IEEE Internet Things J. 6(6): 10773-10785 (2019) - [j96]Mordechai Guri, Rami Puzis, Kim-Kwang Raymond Choo, Sergey Rubinshtein, Gabi Kedma, Yuval Elovici:
Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145 (2019) - [j95]Ran Yahalom, Alon Steren, Yonatan Nameri, Maxim Roytman, Angel Porgador
, Yuval Elovici:
Improving the effectiveness of intrusion detection systems for hierarchical data. Knowl. Based Syst. 168: 59-69 (2019) - [j94]Vinay Sachidananda, Suhas Bhairav, Yuval Elovici:
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service. EAI Endorsed Trans. Security Safety 6(20): e1 (2019) - [j93]Ben Nassi
, Adi Shamir
, Yuval Elovici:
Xerox Day Vulnerability. IEEE Trans. Inf. Forensics Secur. 14(2): 415-430 (2019) - [j92]Sofia Belikovetsky
, Yosef A. Solewicz
, Mark Yampolskiy
, Jinghui Toh, Yuval Elovici:
Digital Audio Signature for 3D Printing Integrity. IEEE Trans. Inf. Forensics Secur. 14(5): 1127-1141 (2019) - [j91]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs. IEEE Trans. Inf. Forensics Secur. 14(6): 1638-1653 (2019) - [j90]Shachar Siboni
, Vinay Sachidananda
, Yair Meidan
, Michael Bohadana, Yael Mathov
, Suhas Bhairav
, Asaf Shabtai
, Yuval Elovici:
Security Testbed for Internet-of-Things Devices. IEEE Trans. Reliab. 68(1): 23-44 (2019) - [c150]Shai Cohen, Tomer Gluck, Yuval Elovici, Asaf Shabtai:
Security Analysis of Radar Systems. CPS-SPC@CCS 2019: 3-14 - [c149]Dominik Breitenbacher, Ivan Homoliak
, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. AsiaCCS 2019: 479-484 - [c148]Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai:
Design Procedure of Knowledge Base for Practical Attack Graph Generation. AsiaCCS 2019: 594-601 - [c147]Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. CCS 2019: 2707-2708 - [c146]Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. CODASPY 2019: 85-96 - [c145]Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs. COMPSAC (1) 2019: 801-810 - [c144]Ziv Katzir, Yuval Elovici:
Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces. IJCNN 2019: 1-9 - [c143]Daniel Nahmias, Aviad Cohen
, Nir Nissim, Yuval Elovici:
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning. IJCNN 2019: 1-8 - [c142]Yi Xiang Marcus Tan, Alfonso Iacovazzi
, Ivan Homoliak
, Yuval Elovici, Alexander Binder
:
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. IJCNN 2019: 1-10 - [c141]Mengxuan Tan, Alfonso Iacovazzi
, Ngai-Man Cheung, Yuval Elovici:
A Neural Attention Model for Real-Time Network Intrusion Detection. LCN 2019: 291-299 - [c140]Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici:
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding. RAID 2019: 213-225 - [c139]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Drones' Cryptanalysis - Smashing Cryptography with a Flicker. IEEE Symposium on Security and Privacy 2019: 1397-1414 - [c138]Shachar Siboni, Chanan Glezer
, Asaf Shabtai, Yuval Elovici:
A Weighted Risk Score Model for IoT Devices. SpaCCS Workshops 2019: 20-34 - [c137]Vinay Sachidananda, Suhas Bhairav, Nirnay Ghosh, Yuval Elovici:
PIT: A Probe Into Internet of Things by Comprehensive Security Analysis. TrustCom/BigDataSE 2019: 522-529 - [c136]Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici:
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. USENIX Security Symposium 2019: 461-478 - [e4]Lorenzo Cavallaro, Johannes Kinder, Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6833-9 [contents] - [e3]Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, Joaquín García-Alfaro
:
Security and Safety Interplay of Intelligent Software Systems - ESORICS 2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11552, Springer 2019, ISBN 978-3-030-16873-5 [contents] - [i81]Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici:
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. CoRR abs/1901.03597 (2019) - [i80]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Defense Methods Against Adversarial Examples for Recurrent Neural Networks. CoRR abs/1901.09963 (2019) - [i79]Ben Nassi, Asaf Shabtai, Ryusuke Masuoka, Yuval Elovici:
SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps. CoRR abs/1903.05155 (2019) - [i78]Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version). CoRR abs/1905.01027 (2019) - [i77]Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder:
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. CoRR abs/1905.11831 (2019) - [i76]Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai:
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup. CoRR abs/1905.13430 (2019) - [i75]Dudi Nassi, Raz Ben-Netanel, Yuval Elovici, Ben Nassi:
MobilBye: Attacking ADAS with Camera Spoofing. CoRR abs/1906.09765 (2019) - [i74]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. CoRR abs/1906.09786 (2019) - [i73]Yael Mathov, Noga Agmon, Asaf Shabtai, Rami Puzis, Nils Ole Tippenhauer, Yuval Elovici:
Challenges for Security Assessment of Enterprises in the IoT Era. CoRR abs/1906.10922 (2019) - [i72]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach Towards Countermeasure Selection using Attack Graphs. CoRR abs/1906.10943 (2019) - [i71]Saeid Hosseini
, Saeed Najafi Pour, Ngai-Man Cheung, Mohammad Reza Kangavari, Xiaofang Zhou, Yuval Elovici:
TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs. CoRR abs/1907.03191 (2019) - [i70]Ziv Katzir, Yuval Elovici:
Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn. CoRR abs/1907.05718 (2019) - [i69]Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs. CoRR abs/1907.05851 (2019) - [i68]Sofia Belikovetsky, Oded Leiba, Asaf Shabtai, Yuval Elovici:
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain. CoRR abs/1908.06921 (2019) - [i67]Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici:
The Security of IP-based Video Surveillance Systems. CoRR abs/1910.10749 (2019) - [i66]Yi Xiang Marcus Tan, Yuval Elovici, Alexander Binder
:
Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks. CoRR abs/1912.03609 (2019) - 2018
- [j89]Mordechai Guri, Yuval Elovici:
Bridgeware: the air-gap malware. Commun. ACM 61(4): 74-82 (2018) - [j88]Ziv Katzir, Yuval Elovici:
Quantifying the resilience of machine learning classifiers used for cyber security. Expert Syst. Appl. 92: 419-429 (2018) - [j87]Aviad Cohen
, Nir Nissim
, Yuval Elovici:
Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods. Expert Syst. Appl. 110: 143-169 (2018) - [j86]Nathalie Japkowicz
, Yuval Elovici:
Introduction to the Special Issue on Data Mining for Cybersecurity. IEEE Intell. Syst. 33(2): 3-4 (2018) - [j85]Alona Levy, Ben Nassi, Yuval Elovici, Erez Shmueli:
Handwritten Signature Verification Using Wrist-Worn Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 119:1-119:26 (2018) - [j84]Omer Shwartz
, Yael Mathov
, Michael Bohadana, Yuval Elovici, Yossi Oren
:
Reverse Engineering IoT Devices: Effective Techniques and Methods. IEEE Internet Things J. 5(6): 4965-4976 (2018) - [j83]Nir Nissim
, Yuval Lapidot, Aviad Cohen, Yuval Elovici:
Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining. Knowl. Based Syst. 153: 147-175 (2018) - [j82]Yair Meidan
, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, Yuval Elovici:
N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 17(3): 12-22 (2018) - [j81]Dima Kagan
, Yuval Elovici, Michael Fire:
Generic anomalous vertices detection utilizing a link prediction algorithm. Soc. Netw. Anal. Min. 8(1): 27 (2018) - [j80]Alfonso Iacovazzi
, Sanat Sarda
, Daniel Frassinelli, Yuval Elovici:
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback. IEEE Trans. Inf. Forensics Secur. 13(5): 1139-1154 (2018) - [c135]Sadia Afroz, Battista Biggio
, Yuval Elovici, David Freeman, Asaf Shabtai:
11th International Workshop on Artificial Intelligence and Security (AISec 2018). CCS 2018: 2166-2167 - [c134]Yuval Elovici:
Session details: AI for Forensics. AISec@CCS 2018 - [c133]Neeraj Karamchandani, Vinay Sachidananda, Suhas Setikere, Jianying Zhou
, Yuval Elovici:
SMuF: State Machine Based Mutational Fuzzing Framework for Internet of Things. CRITIS 2018: 101-112 - [c132]Saeid Hosseini
, Hongzhi Yin
, Ngai-Man Cheung, Kan Pak Leng, Yuval Elovici, Xiaofang Zhou
:
Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs. DASFAA (1) 2018: 342-351 - [c131]Mordechai Guri, Yosef A. Solewicz, Yuval Elovici:
MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication. DSC 2018: 1-8 - [c130]Orly Stan, Adi Cohen, Yuval Elovici, Asaf Shabtai:
On the Security of MIL-STD-1553 Communication Bus. ISSA/CSITS@ESORICS 2018: 153-171 - [c129]Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation. ESORICS (1) 2018: 533-554 - [c128]Swee Kiat Lim, Yi Loo, Ngoc-Trung Tran, Ngai-Man Cheung, Gemma Roig, Yuval Elovici:
DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN. ICDM 2018: 1122-1127 - [c127]Lynne Graves
, Mark Yampolskiy, Wayne E. King, Sofia Belikovetsky, Yuval Elovici:
Liability Exposure when 3D-Printed Parts Fall from the Sky. Critical Infrastructure Protection 2018: 39-64 - [c126]Alfonso Iacovazzi
, Sanat Sarda, Yuval Elovici:
Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers. INFOCOM 2018: 747-755 - [c125]Asaf Hecht, Adi Sagi, Yuval Elovici:
PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks. MALWARE 2018: 87-94 - [c124]Saeid Hosseini
, Hongzhi Yin
, Meihui Zhang, Yuval Elovici, Xiaofang Zhou
:
Mining Subgraphs from Propagation Networks through Temporal Dynamic Analysis. MDM 2018: 66-75 - [c123]Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. NDSS 2018 - [c122]Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici:
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs. PST 2018: 1-12 - [c121]Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. RAID 2018: 490-510 - [c120]Shachar Siboni, Asaf Shabtai, Yuval Elovici:
Leaking data from enterprise networks using a compromised smartwatch device. SAC 2018: 741-750 - [c119]Or Ami, Yuval Elovici, Danny Hendler:
Ransomware prevention using application authentication-based file access control. SAC 2018: 1610-1619 - [c118]Mayank Agarwal
, Rami Puzis
, Jawad Haj-Yahya
, Polina Zilberman
, Yuval Elovici:
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic. SEC 2018: 216-230 - [c117]Suhas Setikere, Vinay Sachidananda, Yuval Elovici:
Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things. SecureComm (1) 2018: 43-52 - [c116]Penny Chong, Yi Xiang Marcus Tan, Juan Guarnizo, Yuval Elovici, Alexander Binder
:
Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn? IEEE Symposium on Security and Privacy Workshops 2018: 15-21 - [c115]Vishal Dey, Vikramkumar Pudi, Anupam Chattopadhyay, Yuval Elovici:
Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study. VLSID 2018: 398-403 - [e2]Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai:
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, CCS 2018, Toronto, ON, Canada, October 19, 2018. ACM 2018, ISBN 978-1-4503-6004-3 [contents] - [r1]Elina Yaakobovich, Rami Puzis, Yuval Elovici:
Incentives in Collaborative Applications. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [i65]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Streamed POI from Encrypted FPV Channel. CoRR abs/1801.03074 (2018) - [i64]Bronislav Sidik, Rami Puzis, Polina Zilberman, Yuval Elovici:
PALE: Partially Asynchronous Agile Leader Election. CoRR abs/1801.03734 (2018) - [i63]Tom Mahler
, Nir Nissim, Erez Shalom, Israel Goldenberg, Guy Hasman, Arnon Makori, Itzik Kochav, Yuval Elovici, Yuval Shahar:
Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices. CoRR abs/1801.05583 (2018) - [i62]Mordechai Guri, Andrey Daidakulov, Yuval Elovici:
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields. CoRR abs/1802.02317 (2018) - [i61]Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici:
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields. CoRR abs/1802.02700 (2018) - [i60]Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. CoRR abs/1802.09089 (2018) - [i59]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs. CoRR abs/1803.02560 (2018) - [i58]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication. CoRR abs/1803.03422 (2018) - [i57]Tomer Golomb, Yisroel Mirsky, Yuval Elovici:
CIoTA: Collaborative IoT Anomaly Detection via Blockchain. CoRR abs/1803.03807 (2018) - [i56]Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines. CoRR abs/1804.04014 (2018) - [i55]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. CoRR abs/1804.08778 (2018) - [i54]Ivan Homoliak, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa:
Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. CoRR abs/1805.01612 (2018) - [i53]Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf Shabtai, Yuval Elovici:
N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders. CoRR abs/1805.03409 (2018) - [i52]Asaf Hecht, Adi Sagi, Yuval Elovici:
PIDS - A Behavioral Framework for Analysis and Detection of Network Printer Attacks. CoRR abs/1806.10642 (2018) - [i51]Ben Nassi, Moshe Sror, Ido Lavi, Yair Meidan, Asaf Shabtai, Yuval Elovici:
Piping Botnet - Turning Green Technology into a Water Disaster. CoRR abs/1808.02131 (2018) - [i50]Swee Kiat Lim, Yi Loo, Ngoc-Trung Tran, Ngai-Man Cheung, Gemma Roig, Yuval Elovici:
DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN. CoRR abs/1808.07632 (2018) - [i49]Ziv Katzir, Yuval Elovici:
Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces. CoRR abs/1811.09043 (2018) - 2017
- [j79]Nir Nissim, Yuval Shahar
, Yuval Elovici, George Hripcsak, Robert Moskovitch:
Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods. Artif. Intell. Medicine 81: 12-32 (2017) - [j78]Nir Nissim
, Ran Yahalom, Yuval Elovici:
USB-based attacks. Comput. Secur. 70: 675-688 (2017) - [j77]Alfonso Iacovazzi
, Yuval Elovici:
Network Flow Watermarking: A Survey. IEEE Commun. Surv. Tutorials 19(1): 512-530 (2017) - [j76]Yisroel Mirsky, Asaf Shabtai, Bracha Shapira
, Yuval Elovici, Lior Rokach:
Anomaly detection for smartphone data streams. Pervasive Mob. Comput. 35: 83-107 (2017) - [j75]Abigail Paradise
, Asaf Shabtai, Rami Puzis
, Aviad Elyashar, Yuval Elovici, Mehran Roshandel, Christoph Peylo:
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. IEEE Trans. Comput. Soc. Syst. 4(3): 65-79 (2017) - [j74]Polina Zilberman, Rami Puzis
, Yuval Elovici:
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers. IEEE Trans. Dependable Secur. Comput. 14(5): 521-534 (2017) - [j73]Nir Nissim
, Aviad Cohen, Yuval Elovici:
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology. IEEE Trans. Inf. Forensics Secur. 12(3): 631-646 (2017) - [j72]Yaniv Harel, Irad Ben-Gal, Yuval Elovici:
Cyber Security and the Role of Intelligent Systems in Addressing its Challenges. ACM Trans. Intell. Syst. Technol. 8(4): 49:1-49:12 (2017) - [j71]Mordechai Guri, Matan Monitz, Yuval Elovici:
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack. ACM Trans. Intell. Syst. Technol. 8(4): 50:1-50:25 (2017) - [c114]Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews
, Wayne E. King, Gabe Guss, Yuval Elovici:
How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective. ARES 2017: 78:1-78:10 - [c113]Omer Shwartz
, Yael Mathov, Michael Bohadana, Yuval Elovici, Yossi Oren
:
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices. CARDIS 2017: 1-21 - [c112]Vinay Sachidananda, Shachar Siboni, Asaf Shabtai, Jinghui Toh, Suhas Bhairav, Yuval Elovici:
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things. IoTPTS@AsiaCCS 2017: 3-10 - [c111]Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa
, Nils Ole Tippenhauer
, Asaf Shabtai, Yuval Elovici:
SIPHON: Towards Scalable High-Interaction Physical Honeypots. CPSS@AsiaCCS 2017: 57-68 - [c110]Noy Hadar, Shachar Siboni, Yuval Elovici:
A Lightweight Vulnerability Mitigation Framework for IoT Devices. IoT S&P@CCS 2017: 71-75 - [c109]Mordechai Guri, Boris Zadov, Yuval Elovici:
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED. DIMVA 2017: 161-184 - [c108]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration'). ESORICS (2) 2017: 98-115 - [c107]Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Attacks, Analysis and Mitigation. EuroS&P 2017: 218-232 - [c106]Ron Biton, Clint Feher, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur:
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems. HASE 2017: 153-156 - [c105]Teoh Teik Toe
, Yue Zhang, Y. Y. Nguwi, Yuval Elovici, W. L. Ng:
Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk. ICNC-FSKD 2017: 1790-1793 - [c104]Teoh Teik Toe
, Y. Y. Nguwi, Yuval Elovici, Ngai-Man Cheung, W. L. Ng:
Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data. ICNC-FSKD 2017: 2080-2083 - [c103]Mark Yampolskiy, Wayne E. King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici:
Evaluation of Additive and Subtractive Manufacturing from the Security Perspective. Critical Infrastructure Protection 2017: 23-44 - [c102]Alfonso Iacovazzi
, Daniel Frassinelli, Yuval Elovici:
On packet loss modeling: An empirical assessment. NOF 2017: 33-39 - [c101]Yair Meidan
, Michael Bohadana, Asaf Shabtai, Juan David Guarnizo, Martín Ochoa
, Nils Ole Tippenhauer
, Yuval Elovici:
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. SAC 2017: 506-509 - [c100]Jinghui Toh, Muhammad Hatib, Omer Porzecanski, Yuval Elovici:
Cyber security patrol: detecting fake and vulnerable wifi-enabled printers. SAC 2017: 535-542 - [c99]Yisroel Mirsky, Tal Halpern, Rishabh Upadhyay, Sivan Toledo, Yuval Elovici:
Enhanced situation space mining for data streams. SAC 2017: 842-849 - [c98]Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles
:
Scholarly Digital Libraries as a Platform for Malware Distribution. SG-CRC 2017: 107-128 - [c97]Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, Yuval Elovici:
dr0wned - Cyber-Physical Attack with Additive Manufacturing. WOOT 2017 - [c96]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit. WOOT 2017 - [i48]Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
SIPHON: Towards Scalable High-Interaction Physical Honeypots. CoRR abs/1701.02446 (2017) - [i47]Mordechai Guri, Boris Zadov, Eran Atias, Yuval Elovici:
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED. CoRR abs/1702.06715 (2017) - [i46]Ben Nassi, Adi Shamir, Yuval Elovici:
Oops!...I think I scanned a malware. CoRR abs/1703.07751 (2017) - [i45]Yisroel Mirsky, Mordechai Guri, Yuval Elovici:
HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System. CoRR abs/1703.10454 (2017) - [i44]Sofia Belikovetsky, Yosef A. Solewicz, Mark Yampolskiy, Jinghui Toh, Yuval Elovici:
Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing. CoRR abs/1705.06454 (2017) - [i43]Ori Ossmy, Ofir Tam, Rami Puzis, Lior Rokach, Ohad Inbar, Yuval Elovici:
MindDesktop: a general purpose brain computer interface. CoRR abs/1705.07490 (2017) - [i42]Alfonso Iacovazzi, Sanat Sarda, Daniel Frassinelli, Yuval Elovici:
DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback. CoRR abs/1705.09460 (2017) - [i41]Mordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici:
xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs. CoRR abs/1706.01140 (2017) - [i40]Orly Stan, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur:
Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus. CoRR abs/1707.05032 (2017) - [i39]Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers. CoRR abs/1707.05970 (2017) - [i38]Eitam Sheetrit, Nir Nissim, Denis Klimov, Lior Fuchs, Yuval Elovici, Yuval Shahar:
Temporal Pattern Discovery for Accurate Sepsis Diagnosis in ICU Patients. CoRR abs/1709.01720 (2017) - [i37]Samuel Bennett Moore, Jacob Gatlin, Sofia Belikovetsky, Mark Yampolskiy, Wayne E. King, Yuval Elovici:
Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing. CoRR abs/1709.01822 (2017) - [i36]Yair Meidan, Michael Bohadana, Asaf Shabtai, Martín Ochoa, Nils Ole Tippenhauer, Juan David Guarnizo, Yuval Elovici:
Detection of Unauthorized IoT Devices Using Machine Learning Techniques. CoRR abs/1709.04647 (2017) - [i35]Mordechai Guri, Dima Bykhovsky, Yuval Elovici:
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR). CoRR abs/1709.05742 (2017) - 2016
- [j70]Aviad Elyashar, Michael Fire, Dima Kagan
, Yuval Elovici:
Guided socialbots: Infiltrating the social networks of specific organizations' employees. AI Commun. 29(1): 87-106 (2016) - [j69]Daniel Dor
, Yuval Elovici:
A model of the information security investment decision-making process. Comput. Secur. 63: 1-13 (2016) - [j68]Rami Puzis
, Dov Shirtz, Yuval Elovici:
A particle swarm model for estimating reliability and scheduling system maintenance. Enterp. Inf. Syst. 10(4): 349-377 (2016) - [j67]Aviad Cohen, Nir Nissim, Lior Rokach, Yuval Elovici:
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods. Expert Syst. Appl. 63: 324-343 (2016) - [j66]Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:
Matching entities across online social networks. Neurocomputing 210: 91-106 (2016) - [j65]Eitan Menahem, Alon Schclar, Lior Rokach, Yuval Elovici:
XML-AD: Detecting anomalous patterns in XML documents. Inf. Sci. 326: 71-88 (2016) - [j64]Nir Nissim, Mary Regina Boland
, Nicholas P. Tatonetti
, Yuval Elovici, George Hripcsak, Yuval Shahar
, Robert Moskovitch:
Improving condition severity classification with an efficient active learning based framework. J. Biomed. Informatics 61: 44-54 (2016) - [j63]Nir Nissim, Robert Moskovitch, Oren Bar-Ad, Lior Rokach, Yuval Elovici:
ALDROID: efficient update of Android anti-virus software using designated active learning methods. Knowl. Inf. Syst. 49(3): 795-833 (2016) - [j62]Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren Bar-Ad, Yuval Elovici:
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework. Secur. Informatics 5(1): 1 (2016) - [j61]Asaf Shabtai, Maya Bercovitch, Lior Rokach, Ya'akov (Kobi) Gal
, Yuval Elovici, Erez Shmueli:
Behavioral Study of Users When Interacting with Active Honeytokens. ACM Trans. Inf. Syst. Secur. 18(3): 9:1-9:21 (2016) - [j60]Shachar Siboni, Asaf Shabtai, Nils Ole Tippenhauer
, Jemin Lee, Yuval Elovici:
Advanced Security Testbed Framework for Wearable IoT Devices. ACM Trans. Internet Techn. 16(4): 26:1-26:25 (2016) - [c95]Yisroel Mirsky, Asaf Shabtai, Lior Rokach, Bracha Shapira
, Yuval Elovici:
SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research. AISec@CCS 2016: 1-12 - [c94]Vinay Sachidananda, Jinghui Toh, Shachar Siboni, Asaf Shabtai, Yuval Elovici:
POSTER: Towards Exposing Internet of Things: A Roadmap. CCS 2016: 1820-1822 - [c93]Mordechai Guri, Eyal Shemer, Dov Shirtz, Yuval Elovici:
Personal Information Leakage During Password Recovery of Internet Services. EISIC 2016: 136-139 - [c92]Mordechai Guri, Matan Monitz, Yuval Elovici:
AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling. FNSS 2016: 1-11 - [c91]Mordechai Guri, Matan Monitz, Yuval Elovici:
USBee: Air-gap covert-channel via electromagnetic emission from USB. PST 2016: 264-268 - [c90]Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici:
An optical covert-channel to leak data through an air-gap. PST 2016: 642-649 - [i34]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers. CoRR abs/1606.05915 (2016) - [i33]Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici:
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap. CoRR abs/1607.03946 (2016) - [i32]Mordechai Guri, Eyal Shemer, Dov Shirtz, Yuval Elovici:
Personal Information Leakage During Password Recovery of Internet Services. CoRR abs/1608.01492 (2016) - [i31]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise. CoRR abs/1608.03431 (2016) - [i30]Mordechai Guri, Matan Monitz, Yuval Elovici:
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB. CoRR abs/1608.08397 (2016) - [i29]Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Yuval Elovici:
dr0wned - Cyber-Physical Attack with Additive Manufacturing. CoRR abs/1609.00133 (2016) - [i28]Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Threat, Analysis and Mitigation. CoRR abs/1609.02353 (2016) - [i27]Shachar Siboni, Vinay Sachidananda, Asaf Shabtai, Yuval Elovici:
Security Testbed for the Internet of Things. CoRR abs/1610.05971 (2016) - [i26]Dima Kagan, Michael Fire, Yuval Elovici:
Unsupervised Anomalous Vertices Detection Utilizing Link Prediction Algorithms. CoRR abs/1610.07525 (2016) - [i25]Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit. CoRR abs/1611.07350 (2016) - [i24]Ben Nassi, Lior Rokach, Yuval Elovici:
Virtual Breathalyzer. CoRR abs/1612.05083 (2016) - [i23]Ben Nassi, Alona Levy, Yuval Elovici, Erez Shmueli:
Handwritten Signature Verification Using Hand-Worn Devices. CoRR abs/1612.06305 (2016) - 2015
- [j59]Rami Puzis
, Yuval Elovici, Polina Zilberman, Shlomi Dolev
, Ulrik Brandes:
Topology manipulations for speeding betweenness centrality computation. J. Complex Networks 3(1): 84-112 (2015) - [j58]Nir Nissim, Aviad Cohen, Chanan Glezer
, Yuval Elovici:
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. Comput. Secur. 48: 246-266 (2015) - [j57]Michael Fire, Yuval Elovici:
Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population. ACM Trans. Intell. Syst. Technol. 6(2): 28:1-28:22 (2015) - [c89]Nir Nissim, Mary Regina Boland
, Robert Moskovitch, Nicholas P. Tatonetti
, Yuval Elovici, Yuval Shahar
, George Hripcsak:
An Active Learning Framework for Efficient Condition Severity Classification. AIME 2015: 13-24 - [c88]Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. CSF 2015: 276-289 - [c87]Nir Nissim, Aviad Cohen, Yuval Elovici:
Boosting the Detection of Malicious Documents Using Designated Active Learning Methods. ICMLA 2015: 760-765 - [c86]Yisroel Mirsky, Bracha Shapira
, Lior Rokach, Yuval Elovici:
pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts. PAKDD (2) 2015: 119-133 - [c85]Yisroel Mirsky, Aviad Cohen, Roni Stern, Ariel Felner, Lior Rokach, Yuval Elovici, Bracha Shapira:
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains. SOCS 2015: 70-77 - [c84]Mordechai Guri, Yuri Poliak, Bracha Shapira
, Yuval Elovici:
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. TrustCom/BigDataSE/ISPA (1) 2015: 65-73 - [c83]Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, Yuval Elovici:
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. USENIX Security Symposium 2015: 849-864 - [p4]Rami Puzis
, Yuval Elovici:
Active Discovery of Hidden Profiles in Social Networks Using Malware. Cyber Warfare 2015: 221-235 - [i22]Asaf Shabtai, Dudu Mimran, Yuval Elovici:
Evaluation of Security Solutions for Android Systems. CoRR abs/1502.04870 (2015) - [i21]Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici:
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations. CoRR abs/1503.07919 (2015) - [i20]Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici:
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. CoRR abs/1512.04116 (2015) - 2014
- [j56]Asaf Shabtai, Lena Tenenboim-Chekina, Dudu Mimran, Lior Rokach, Bracha Shapira
, Yuval Elovici:
Mobile malware detection through analysis of deviations in application network behavior. Comput. Secur. 43: 1-18 (2014) - [j55]Erez Shmueli, Ronen Vaisenberg, Ehud Gudes, Yuval Elovici:
Implementing a database encryption solution, design and implementation issues. Comput. Secur. 44: 33-50 (2014) - [j54]Michael Fire, Roy Goldschmidt, Yuval Elovici:
Online Social Networks: Threats and Solutions. IEEE Commun. Surv. Tutorials 16(4): 2019-2036 (2014) - [j53]Nir Nissim, Robert Moskovitch, Lior Rokach, Yuval Elovici:
Novel active learning methods for enhanced PC malware detection in windows OS. Expert Syst. Appl. 41(13): 5843-5857 (2014) - [j52]Gilad Katz
, Yuval Elovici, Bracha Shapira
:
CoBAn: A context based model for data leakage prevention. Inf. Sci. 262: 137-158 (2014) - [j51]Yuval Elovici, Michael Fire, Amir Herzberg
, Haya Schulmann:
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research. Sci. Eng. Ethics 20(4): 1027-1043 (2014) - [j50]Michael Fire, Dima Kagan
, Aviad Elyashar
, Yuval Elovici:
Friend or foe? Fake profile identification in online social networks. Soc. Netw. Anal. Min. 4(1): 194 (2014) - [j49]Ma'ayan Dror, Asaf Shabtai, Lior Rokach, Yuval Elovici:
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage. IEEE Trans. Knowl. Data Eng. 26(3): 682-697 (2014) - [c82]Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici:
OSPF vulnerability to persistent poisoning attacks: a systematic analysis. ACSAC 2014: 336-345 - [c81]Asaf Shabtai, Yuval Elovici:
POSTER: Misuseablity Analysis for IT Infrastructure. CCS 2014: 1496-1498 - [c80]Mordechai Guri, Anatoly Krasner, Yuval Elovici:
Peers-Based Location of Mobile Devices. FCC 2014: 439-445 - [c79]Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici:
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files. JISIC 2014: 91-98 - [c78]Mordechai Guri, Gabi Kedma, Boris Zadov, Yuval Elovici:
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements. JISIC 2014: 145-151 - [c77]Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:
Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries. JISIC 2014: 152-159 - [c76]Vitali Sepetnitsky, Mordechai Guri, Yuval Elovici:
Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator. JISIC 2014: 264-267 - [c75]Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. MALWARE 2014: 58-67 - [c74]Mordechai Guri, Gabi Kedma, Buky Carmeli, Yuval Elovici:
Limiting access to unintentionally leaked sensitive documents using malware signatures. SACMAT 2014: 129-140 - [i19]Yuval Elovici, Lior Rokach:
Reaction to New Security Threat Class. CoRR abs/1406.3110 (2014) - [i18]Michael Fire, Thomas Chesney, Yuval Elovici:
Quantitative Analysis of Genealogy Using Digitised Family Trees. CoRR abs/1408.5571 (2014) - [i17]Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:
Matching Entities Across Online Social Networks. CoRR abs/1410.6717 (2014) - [i16]Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici:
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies. CoRR abs/1411.0237 (2014) - 2013
- [j48]Yael Weiss, Yuval Elovici, Lior Rokach:
The CASH algorithm-cost-sensitive attribute selection using histograms. Inf. Sci. 222: 247-268 (2013) - [j47]Yuval Elovici, Lior Rokach, Sahin Albayrak
:
Guest editorial: Special issue on data mining for information security. Inf. Sci. 231: 1-3 (2013) - [j46]Polina Zilberman, Gilad Katz
, Asaf Shabtai, Yuval Elovici:
Analyzing group E-mail exchange to detect data leakage. J. Assoc. Inf. Sci. Technol. 64(9): 1780-1790 (2013) - [j45]Rami Puzis
, Yaniv Altshuler, Yuval Elovici, Shlomo Bekhor
, Yoram Shiftan, Alex Pentland:
Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks. J. Intell. Transp. Syst. 17(1): 91-105 (2013) - [j44]Michael Fire, Lena Tenenboim-Chekina, Rami Puzis
, Ofrit Lesser, Lior Rokach, Yuval Elovici:
Computationally efficient link prediction in a variety of social networks. ACM Trans. Intell. Syst. Technol. 5(1): 10:1-10:25 (2013) - [j43]Asaf Shabtai, Maya Bercovitch, Lior Rokach, Yuval Elovici:
Optimizing Data Misuse Detection. ACM Trans. Knowl. Discov. Data 8(3): 16:1-16:23 (2013) - [c73]Aviad Elyashar, Michael Fire, Dima Kagan
, Yuval Elovici:
Homing socialbots: intrusion on a specific organization's employee using Socialbots. ASONAM 2013: 1358-1365 - [c72]Asaf Shabtai, Idan Morad, Eyal Kolman, Ereli Eran, Alex Vaystikh, Eyal Gruss, Lior Rokach, Yuval Elovici:
IP2User - Identifying the Username of an IP Address in Network-Related Events. BigData Congress 2013: 435-436 - [c71]Ron Begleiter, Yuval Elovici, Yona Hollander, Ori Mendelson, Lior Rokach, Roi Saltzman:
A fast and scalable method for threat detection in large-scale DNS logs. IEEE BigData 2013: 738-741 - [c70]Eitan Menahem, Yuval Elovici, Nir Amar, Gabi Nakibly:
ACTIDS: an active strategy for detecting and localizing network attacks. AISec 2013: 55-66 - [c69]Eitan Menahem, Lior Rokach, Yuval Elovici:
Combining one-class classifiers via meta learning. CIKM 2013: 2435-2440 - [c68]Shlomi Dolev
, Idan Heimlich Shtacher, Bracha Shapira
, Yuval Elovici, Guy Messalem, Dudu Mimran, Marina Kopeetsky:
Exploiting simultaneous usage of different wireless interfaces for security and mobility. FGCT 2013: 21-26 - [c67]Gabi Kedma, Mordechai Guri, Tom Sela, Yuval Elovici:
Analyzing users' web surfing patterns to trace terrorists and criminals. ISI 2013: 143-145 - [c66]Ariel Bar, Dudu Mimran, Lena Chekina, Yuval Elovici, Bracha Shapira
:
Nesto - Network selection and traffic offloading system for android mobile devices. IWCMC 2013: 337-342 - [c65]Mordechai Guri, Gabi Kedma, Tom Sela, Buky Carmeli, Amit Rosner, Yuval Elovici:
Noninvasive detection of anti-forensic malware. MALWARE 2013: 1-10 - [c64]Ofrit Lesser, Lena Tenenboim-Chekina, Lior Rokach, Yuval Elovici:
Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks. SBP 2013: 368-376 - [c63]Yaniv Altshuler, Michael Fire, Nadav Aharony, Zeev Volkovich
, Yuval Elovici, Alex Pentland:
Trade-Offs in Social and Behavioral Modeling in Mobile Networks. SBP 2013: 412-423 - [c62]Yaniv Altshuler, Michael Fire, Erez Shmueli, Yuval Elovici, Alfred M. Bruckstein
, Alex Pentland, David Lazer:
Detecting Anomalous Behaviors Using Structural Properties of Social Networks. SBP 2013: 433-440 - [c61]Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:
Entity Matching in Online Social Networks. SocialCom 2013: 339-344 - [i15]Michael Fire, Rami Puzis, Yuval Elovici:
Organization Mining Using Online Social Networks. CoRR abs/1303.3741 (2013) - [i14]Michael Fire, Dima Kagan, Aviad Elyashar, Yuval Elovici:
Friend or Foe? Fake Profile Identification in Online Social Networks. CoRR abs/1303.3751 (2013) - [i13]Michael Fire, Roy Goldschmidt, Yuval Elovici:
Online Social Networks: Threats and Solutions Survey. CoRR abs/1303.3764 (2013) - [i12]Eitan Menahem, Gabi Nakibly, Yuval Elovici:
ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks. CoRR abs/1306.4845 (2013) - [i11]Dima Kagan, Michael Fire, Aviad Elyashar, Yuval Elovici:
Facebook Applications' Installation and Removal: A Temporal Analysis. CoRR abs/1309.4067 (2013) - [i10]Yuval Elovici, Michael Fire, Amir Herzberg, Haya Schulmann:
Ethical Considerations when Employing Fake Identities in OSN for Research. CoRR abs/1310.1651 (2013) - [i9]Michael Fire, Yuval Elovici:
Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population. CoRR abs/1311.4276 (2013) - 2012
- [b1]Asaf Shabtai
, Yuval Elovici, Lior Rokach:
A Survey of Data Leakage Detection and Prevention Solutions. Springer Briefs in Computer Science, Springer 2012, ISBN 978-1-4614-2052-1, pp. i-viii, 1-92 - [j42]Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, Alon Schclar:
User identity verification via mouse dynamics. Inf. Sci. 201: 19-36 (2012) - [j41]Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer
, Yael Weiss:
"Andromaly": a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1): 161-190 (2012) - [j40]Asaf Shabtai, Yuval Shahar
, Yuval Elovici:
A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions. J. Intell. Inf. Syst. 39(1): 249-286 (2012) - [j39]Nir Nissim, Robert Moskovitch, Lior Rokach, Yuval Elovici:
Detecting unknown computer worm activity via support vector machines and active learning. Pattern Anal. Appl. 15(4): 459-475 (2012) - [j38]Asaf Shabtai, Robert Moskovitch, Clint Feher, Shlomi Dolev
, Yuval Elovici:
Detecting unknown malicious code by applying classification techniques on OpCode patterns. Secur. Informatics 1(1): 1 (2012) - [j37]Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
M-Score: A Misuseability Weight Measure. IEEE Trans. Dependable Secur. Comput. 9(3): 414-428 (2012) - [j36]Alon Schclar, Lior Rokach, Adi Abramson, Yuval Elovici:
User Authentication Based on Representative Users. IEEE Trans. Syst. Man Cybern. Part C 42(6): 1669-1678 (2012) - [c60]Michael Fire, Gilad Katz
, Yuval Elovici, Bracha Shapira
, Lior Rokach:
Predicting Student Exam's Scores by Analyzing Social Network Data. AMT 2012: 584-595 - [c59]Eitan Menahem, Gabi Nakibly, Yuval Elovici:
Network-based intrusion detection systems go active! CCS 2012: 1004-1006 - [c58]Eitan Menahem, Rami Puzis, Yuval Elovici:
Detecting Spammers via Aggregated Historical Data Set. NSS 2012: 248-262 - [c57]Yaniv Altshuler, Michael Fire, Nadav Aharony, Yuval Elovici, Alex Pentland:
How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage. SBP 2012: 43-52 - [c56]Rami Puzis
, Polina Zilberman, Yuval Elovici, Shlomi Dolev
, Ulrik Brandes:
Heuristics for Speeding Up Betweenness Centrality Computation. SocialCom/PASSAT 2012: 302-311 - [c55]Yaniv Altshuler, Nadav Aharony, Michael Fire, Yuval Elovici, Alex Pentland:
Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data. SocialCom/PASSAT 2012: 969-974 - [c54]Aviad Elyashar, Michael Fire, Dima Kagan
, Yuval Elovici:
Organizational Intrusion: Organization Mining Using Socialbots. SocialInformatics 2012: 7-12 - [i8]Lena Chekina, Dudu Mimran, Lior Rokach, Yuval Elovici, Bracha Shapira:
Detection of Deviations in Mobile Applications Network Behavior. CoRR abs/1208.0564 (2012) - [i7]Eitan Menahem, Alon Schclar, Lior Rokach, Yuval Elovici:
Securing Your Transactions: Detecting Anomalous Patterns In XML Documents. CoRR abs/1209.1797 (2012) - 2011
- [j35]Yaniv Altshuler, Nadav Aharony, Alex Pentland, Yuval Elovici, Manuel Cebrián
:
Stealing Reality: When Criminals Become Data Scientists (or Vice Versa). IEEE Intell. Syst. 26(6): 22-30 (2011) - [j34]Shlomi Dolev
, Yuval Elovici, Alexander Kesselman, Polina Zilberman:
Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering. Int. J. Found. Comput. Sci. 22(5): 1073-1098 (2011) - [j33]Dov Shirtz, Yuval Elovici:
Optimizing Investment Decisions in Selecting Information Security Remedies. Inf. Manag. Comput. Secur. 19(2): 95-112 (2011) - [j32]Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici:
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content. Secur. Commun. Networks 4(8): 947-965 (2011) - [j31]Rami Puzis
, Meytal Tubi, Yuval Elovici, Chanan Glezer
, Shlomi Dolev
:
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks. ACM Trans. Model. Comput. Simul. 22(1): 5:1-5:26 (2011) - [j30]Asaf Shabtai, Eitan Menahem, Yuval Elovici:
F-Sign: Automatic, Function-Based Signature Generation for Malware. IEEE Trans. Syst. Man Cybern. Part C 41(4): 494-508 (2011) - [c53]Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure. CCS 2011: 765-768 - [c52]Talya Porat
, Inbal Rief, Rami Puzis
, Yuval Elovici:
LoOkie - it feels like being there. CHI Extended Abstracts 2011: 1873-1878 - [c51]Ori Ossmy, Ofir Tam, Rami Puzis, Lior Rokach, Ohad Inbar, Yuval Elovici:
MindDesktop - Computer Accessibility for Severely Handicapped. ICEIS (4) 2011: 316-320 - [c50]Polina Zilberman, Shlomi Dolev
, Gilad Katz
, Yuval Elovici, Asaf Shabtai:
Analyzing group communication for preventing data leakage via email. ISI 2011: 37-41 - [c49]Maya Bercovitch, Meir Renford, Lior Hasson, Asaf Shabtai, Lior Rokach, Yuval Elovici:
HoneyGen: An automated honeytokens generator. ISI 2011: 131-136 - [c48]Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Dynamic Sensitivity-Based Access Control. ISI 2011: 201-203 - [c47]Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Eliciting domain expert misuseability conceptions. K-CAP 2011: 193-194 - [c46]Michael Fire, Lena Tenenboim, Ofrit Lesser, Rami Puzis
, Lior Rokach, Yuval Elovici:
Link Prediction in Social Networks Using Computationally Efficient Topological Features. SocialCom/PASSAT 2011: 73-80 - [c45]Ofer Hermoni, Niv Gilboa
, Eyal Felstaine, Yuval Elovici, Shlomi Dolev:
Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs. SSS 2011: 223-237 - [c44]Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
A Method for Detecting Unknown Malicious Executables. TrustCom 2011: 190-196 - [i6]Yaniv Altshuler, Nadav Aharony, Michael Fire, Yuval Elovici, Alex Pentland:
Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data. CoRR abs/1111.4645 (2011) - [i5]Eitan Menahem, Lior Rokach, Yuval Elovici:
Combining One-Class Classifiers via Meta-Learning. CoRR abs/1112.5246 (2011) - 2010
- [j29]Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev
, Chanan Glezer
:
Google Android: A Comprehensive Security Assessment. IEEE Secur. Priv. 8(2): 35-44 (2010) - [j28]Asaf Shabtai, Yuval Fledel, Yuval Elovici:
Securing Android-Powered Mobile Devices Using SELinux. IEEE Secur. Priv. 8(3): 36-44 (2010) - [j27]Shlomi Dolev
, Yuval Elovici, Rami Puzis
:
Routing betweenness centrality. J. ACM 57(4): 25:1-25:27 (2010) - [j26]Yuval Elovici, Bracha Shapira
, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel:
Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS). J. Assoc. Inf. Sci. Technol. 61(2): 405-418 (2010) - [j25]Asaf Shabtai, Uri Kanonov, Yuval Elovici:
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw. 83(8): 1524-1537 (2010) - [j24]Slava Kisilevich, Lior Rokach, Yuval Elovici, Bracha Shapira
:
Efficient Multidimensional Suppression for K-Anonymity. IEEE Trans. Knowl. Data Eng. 22(3): 334-347 (2010) - [j23]Gil Tahan, Chanan Glezer
, Yuval Elovici, Lior Rokach:
Auto-Sign: an automatic signature generator for high-speed malware filtering devices. J. Comput. Virol. 6(2): 91-103 (2010) - [j22]Asaf Shabtai, Yuval Fledel, Yuval Elovici, Yuval Shahar
:
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics. J. Comput. Virol. 6(3): 239-259 (2010) - [c43]Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Detecting data misuse by applying context-based data linkage. Insider Threats@CCS 2010: 3-12 - [c42]Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. Insider Threats@CCS 2010: 13-20 - [c41]Ofer Hermoni, Niv Gilboa
, Eyal Felstaine, Yuval Elovici, Shlomi Dolev
:
Rendezvous tunnel for anonymous publishing. CCS 2010: 690-692 - [c40]Asaf Shabtai, Yuval Fledel, Yuval Elovici:
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning. CIS 2010: 329-333 - [c39]Tomer Shimshon, Robert Moskovitch, Lior Rokach, Yuval Elovici:
Continuous Verification Using Keystroke Dynamics. CIS 2010: 411-415 - [c38]Emily Rozenshine-Kemelmakher, Rami Puzis
, Ariel Felner
, Yuval Elovici:
Cost Benefit Deployment of DNIPS. ICC 2010: 1-5 - [c37]Yael Weiss, Yuval Fledel, Yuval Elovici, Lior Rokach:
Cost-Sensitive Detection of Malicious Applications in Mobile Devices. MobiCASE 2010: 382-395 - [c36]Yuval Fledel, Asaf Shabtai, Dennis Potashnik, Yuval Elovici:
Google Android: An Updated Security Review. MobiCASE 2010: 401-414 - [c35]Asaf Shabtai, Yuval Elovici:
Applying Behavioral Detection on Android-Based Devices. MOBILWARE 2010: 235-249 - [p3]Rami Puzis
, Meytal Tubi, Yuval Elovici:
Optimizing Targeting of Intrusion Detection Systems in Social Networks. Handbook of Social Network Technologies 2010: 549-568 - [e1]Nadav Aharony, Yaniv Altshuler, Yuval Elovici:
2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10, Washington, D.C., USA, August 10, 2010. USENIX Association 2010 [contents] - [i4]Yaniv Altshuler, Shlomi Dolev, Yuval Elovici:
Efficient Collaborative Application Monitoring Scheme for Mobile Networks. CoRR abs/1009.1132 (2010) - [i3]Yaniv Altshuler, Nadav Aharony, Yuval Elovici, Alex Pentland, Manuel Cebrián:
Stealing Reality. CoRR abs/1010.1028 (2010)
2000 – 2009
- 2009
- [j21]Eitan Menahem, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Improving malware detection by applying multi-inducer ensemble. Comput. Stat. Data Anal. 53(4): 1483-1494 (2009) - [j20]Rami Puzis
, Dana Yagil, Yuval Elovici, Dan Braha:
Collaborative attack on Internet users' anonymity. Internet Res. 19(1): 60-77 (2009) - [j19]Shlomi Dolev
, Yuval Elovici, Rami Puzis
, Polina Zilberman:
Incremental deployment of network monitors based on Group Betweenness Centrality. Inf. Process. Lett. 109(20): 1172-1176 (2009) - [j18]Eitan Menahem, Lior Rokach, Yuval Elovici:
Troika - An improved stacking schema for classification tasks. Inf. Sci. 179(24): 4097-4122 (2009) - [j17]Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer
:
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep. 14(1): 16-29 (2009) - [j16]Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar
, Yuval Elovici:
Using artificial neural networks to detect unknown computer worms. Neural Comput. Appl. 18(7): 663-674 (2009) - [j15]Alexander Binun, Bracha Shapira
, Yuval Elovici:
A decision theoretic approach to combining information filtering. Online Inf. Rev. 33(5): 920-942 (2009) - [j14]Erez Shmueli, Ronen Vaisenberg, Yuval Elovici, Chanan Glezer
:
Database encryption: an overview of contemporary challenges and design considerations. SIGMOD Rec. 38(3): 29-34 (2009) - [j13]Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Nathalie Japkowicz
, Yuval Elovici:
Unknown malcode detection and the imbalance problem. J. Comput. Virol. 5(4): 295-308 (2009) - [c34]Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Seyit Ahmet Çamtepe
, Bernhard Löhlein, Ulrich Heister, Sebastian Möller
, Lior Rokach, Yuval Elovici:
Identity theft, computers and behavioral biometrics. ISI 2009: 155-160 - [c33]Boris Rozenberg, Ehud Gudes, Yuval Elovici:
SISR - A New Model for Epidemic Spreading of Electronic Threats. ISC 2009: 242-249 - [c32]Erez Shmueli, Alexander Kruglov, Rami Puzis, Yuval Elovici, Roman Englert, Chanan Glezer:
An Attentive Digital Signage System. MuC (Workshopband) 2009: 10-15 - [c31]Robert Moskovitch, Clint Feher, Yuval Elovici:
A Chronological Evaluation of Unknown Malcode Detection. PAISI 2009: 112-117 - [c30]Shlomi Dolev
, Yuval Elovici, Alexander Kesselman, Polina Zilberman:
Trawling Traffic under Attack, Overcoming DDoS Attacks by Target-Controlled Traffic Filtering. PDCAT 2009: 336-341 - [c29]Asaf Shabtai, Uri Kanonov, Yuval Elovici:
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. RAID 2009: 357-358 - [c28]Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
Method for Detecting Unknown Malicious Executables. RAID 2009: 376-377 - [p2]Lior Rokach, Yuval Elovici:
An Overview of IDS Using Anomaly Detection. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 384-394 - [i2]Shlomi Dolev, Yuval Elovici, Rami Puzis, Polina Zilberman:
Incremental Deployment of Network Monitors Based on Group Betweenness Centrality. CoRR abs/0904.0352 (2009) - [i1]Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev:
Google Android: A State-of-the-Art Review of Security Mechanisms. CoRR abs/0912.5101 (2009) - 2008
- [j12]Robert Moskovitch, Yuval Elovici, Lior Rokach:
Detection of unknown computer worms based on behavioral classification of the host. Comput. Stat. Data Anal. 52(9): 4544-4566 (2008) - [c27]Boris Rozenberg, Ehud Gudes, Yuval Elovici:
A Distributed Framework for the Detection of New Worm-Related Malware. EuroISI 2008: 179-190 - [c26]Rami Puzis
, Marius David Klippel, Yuval Elovici, Shlomi Dolev:
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. EuroISI 2008: 191-203 - [c25]Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici:
Unknown Malcode Detection Using OPCODE Representation. EuroISI 2008: 204-215 - [c24]Robert Moskovitch, Nir Nissim, Roman Englert, Yuval Elovici:
Active learning to improve the detection of unknown computer worms activity. FUSION 2008: 1-8 - [c23]Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici:
Unknown malcode detection via text categorization and the imbalance problem. ISI 2008: 156-161 - [c22]Robert Moskovitch, Clint Feher, Yuval Elovici:
Unknown malcode detection - A chronological evaluation. ISI 2008: 267-268 - [c21]Slava Kisilevich, Yuval Elovici, Bracha Shapira
, Lior Rokach:
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity. ISIPS 2008: 63-81 - [c20]Robert Moskovitch, Nir Nissim, Yuval Elovici:
Malicious Code Detection Using Active Learning. PinKDD 2008: 74-91 - 2007
- [j11]Rami Puzis, Yuval Elovici, Shlomi Dolev:
Finding the most prominent group in complex networks. AI Commun. 20(4): 287-296 (2007) - [j10]I. Dan Melamed, Bracha Shapira
, Yuval Elovici:
MarCol: A Market-Based Recommender System. IEEE Intell. Syst. 22(3): 74-78 (2007) - [c19]Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer
, Yuval Shahar
, Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. CIDM 2007: 202-209 - [c18]Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Chanan Glezer
, Yuval Shahar
, Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. CISDA 2007: 169-177 - [c17]Meytal Tubi, Rami Puzis, Yuval Elovici:
Deployment of DNIDS in Social Networks. ISI 2007: 59-65 - [c16]Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici:
Host Based Intrusion Detection using Machine Learning. ISI 2007: 107-114 - [c15]Robert Moskovitch, Nir Nissim, Yuval Elovici:
Malicious Code Detection and Acquisition Using Active Learning. ISI 2007: 371 - [c14]Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici:
Simulating Threats Propagation within the NSP Infrastructure. ISI 2007: 380 - [c13]Asaf Shabtai, Maor Atlas, Yuval Shahar
, Yuval Elovici:
Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain. K-CAP 2007: 7-14 - [c12]Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, Chanan Glezer:
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. KI 2007: 44-50 - [c11]Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici:
Improving the Detection of Unknown Computer Worms Activity Using Active Learning. KI 2007: 489-493 - 2006
- [j9]Yuval Elovici, Bracha Shapira
, Paul B. Kantor:
A decision theoretic approach to combining information filters: An analytical and empirical evaluation. J. Assoc. Inf. Sci. Technol. 57(3): 306-320 (2006) - [j8]Yuval Elovici, Bracha Shapira
, Adlay Meshiach:
Cluster-analysis attack against a PRivAte Web solution (PRAW). Online Inf. Rev. 30(6): 624-643 (2006) - [c10]Dima Stopel, Zvi Boger, Robert Moskovitch, Yuval Shahar, Yuval Elovici:
Application of Artificial Neural Networks Techniques to Computer Worm Detection. IJCNN 2006: 2362-2369 - [c9]Asaf Shabtai, Denis Klimov, Yuval Shahar
, Yuval Elovici:
An intelligent, interactive tool for exploration and visualization of time-oriented security data. VizSEC 2006: 15-22 - 2005
- [j7]Yuval Elovici, Chanan Glezer
, Bracha Shapira
:
Enhancing customer privacy while searching for products and services on the world wide web. Internet Res. 15(4): 378-399 (2005) - [j6]Bracha Shapira
, Yuval Elovici, Adlay Meshiach, Tsvi Kuflik
:
PRAW - A PRivAcy model for the Web. J. Assoc. Inf. Sci. Technol. 56(2): 159-172 (2005) - [c8]Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes:
Designing Secure Indexes for Encrypted Databases. DBSec 2005: 54-68 - [c7]Yuval Elovici, Bracha Shapira
, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel:
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). ISI 2005: 244-255 - [p1]Yuval Elovici:
TDS - An Innovative Terrorist Detection System. Fighting Terror in Cyberspace 2005: 75-90 - 2004
- [c6]Yuval Elovici, Abraham Kandel, Mark Last, Bracha Shapira
, Omer Zaafrany, Moti Schneider, Menahem Friedman:
Terrorist Detection System. PKDD 2004: 540-542 - [c5]Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes:
A Structure Preserving Database Encryption Scheme. Secure Data Management 2004: 28-40 - 2003
- [j5]Yuval Elovici, Bracha Shapira
, Paul B. Kantor:
Using the Information Structure Model to Compare Profile-Based Information Filtering Systems. Inf. Retr. 6(1): 75-97 (2003) - [j4]Yuval Elovici, Dan Braha:
A decision-theoretic approach to data mining. IEEE Trans. Syst. Man Cybern. Part A 33(1): 42-51 (2003) - [c4]Mark Last, Bracha Shapira
, Yuval Elovici, Omer Zaafrany, Abraham Kandel:
Content-Based Methodology for Anomaly Detection on the Web. AWIC 2003: 113-123 - [c3]Tsvi Kuflik, Bracha Shapira
, Yuval Elovici, Adlai Maschiach:
Privacy Preservation Improvement by Learning Optimal Profile Generation Rate. User Modeling 2003: 168-177 - 2002
- [c2]Yuval Elovici, Bracha Shapira
, Adlai Maschiach:
A New Privacy Model for Web Surfing. NGITS 2002: 45-57 - [c1]Yuval Elovici, Bracha Shapira
, Adlai Maschiach:
A new privacy model for hiding group interests while accessing the Web. WPES 2002: 63-70 - 2001
- [j3]Niv Ahituv, Yuval Elovici:
Performance evaluation of a distributed application. J. Oper. Res. Soc. 52(8): 916-927 (2001)
1990 – 1999
- 1993
- [j2]Helnye Azaria, Yuval Elovici:
Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems. Parallel Comput. 19(6): 633-649 (1993) - 1992
- [j1]Helnye Azaria, Yuval Elovici, Roger D. Hersch:
Multiple interfaces message passing system for transputer network. Microprocess. Microprogramming 34(1-5): 237-242 (1992)
Coauthor Index
aka: Ron Bitton
aka: Yisroel Mirski

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-19 01:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint