


default search action
Asaf Shabtai
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j89]Lavi Ben-Shimol, Danielle Lavi, Eitan Klevansky, Oleg Brodt, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
Detection of compromised functions in a serverless cloud environment. Comput. Secur. 150: 104261 (2025) - [j88]Alon Malach, Prasanna N. Wudali, Satoru Momiyama, Jun Furukawa, Toshinori Araki, Yuval Elovici, Asaf Shabtai:
CyberShapley: Explanation, prioritization, and triage of cybersecurity alerts using informative graph representation. Comput. Secur. 150: 104270 (2025) - [j87]David Tayouri, Omri Sgan Cohen, Inbar Maimon, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
CORAL: Container Online Risk Assessment with Logical attack graphs. Comput. Secur. 150: 104296 (2025) - [j86]Edan Habler, Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran
, Oleg Brodt
, Heiko Lehmann, Yuval Elovici, Asaf Shabtai
:
Adversarial machine learning threat analysis and remediation in Open Radio Access Network (O-RAN). J. Netw. Comput. Appl. 236: 104090 (2025) - 2024
- [j85]Mor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran
, Oleg Brodt
, Aviad Elyashar, Yuval Elovici, Asaf Shabtai
:
OSSIntegrity: Collaborative open-source code integrity verification. Comput. Secur. 144: 103977 (2024) - [j84]Edan Habler
, Ron Bitton
, Asaf Shabtai
:
Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation. ACM Comput. Surv. 56(4): 96:1-96:40 (2024) - [j83]Orel Lavie
, Asaf Shabtai, Gilad Katz
:
Cost effective transfer of reinforcement learning policies. Expert Syst. Appl. 237(Part A): 121380 (2024) - [j82]Ofir Moshe, Gil Fidel, Ron Bitton, Asaf Shabtai:
Improving interpretability via regularization of neural activation sensitivity. Mach. Learn. 113(9): 6165-6196 (2024) - [j81]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: explainable adversarial patch detection for object detectors in retail. Mach. Learn. 113(9): 6273-6292 (2024) - [j80]Efrat Levy
, Nadav Maman, Asaf Shabtai
, Yuval Elovici
:
AnoMili: Spoofing Hardening and Explainable Anomaly Detection for the 1553 Military Avionic Bus. IEEE Trans. Aerosp. Electron. Syst. 60(6): 7738-7753 (2024) - [j79]Amit Giloni
, Edita Grolman
, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici
, Asaf Shabtai
:
BENN: Bias Estimation Using a Deep Neural Network. IEEE Trans. Neural Networks Learn. Syst. 35(1): 117-131 (2024) - [c104]Adi Ashkenazi, Edita Grolman, Aviad Elyashar, Dudu Mimran, Oleg Brodt, Yuval Elovici, Asaf Shabtai:
SMART: Serverless Module Analysis and Recognition Technique for Managed Applications. CCGrid 2024: 442-452 - [c103]Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai:
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection. CVPR 2024: 5788-5797 - [c102]Noa Wegerhoff, Avishag Shapira, Yuval Elovici, Asaf Shabtai:
DataDetective: Dataset Watermarking for Leaker Identification in ML Training. ECAI 2024: 2442-2451 - [c101]Jonathan Brokman
, Omer Hofman, Roman Vainshtein, Amit Giloni
, Toshiya Shimizu, Inderjeet Singh
, Oren Rachmil, Alon Zolfi
, Asaf Shabtai
, Yuki Unno, Hisashi Kojima
:
MONTRAGE: Monitoring Training for Attribution of Generative Diffusion Models. ECCV (75) 2024: 1-17 - [c100]Roye Katzav, Amit Giloni
, Edita Grolman
, Hiroo Saito, Tomoyuki Shibata, Tsukasa Omino, Misaki Komatsu, Yoshikazu Hanatani, Yuval Elovici
, Asaf Shabtai
:
AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems. ECCV (75) 2024: 288-303 - [c99]Sagi Brudni, Sapir Anidgar, Oleg Brodt, Dudu Mimran, Asaf Shabtai, Yuval Elovici:
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions. EuroS&P 2024: 676-696 - [c98]Shoham Hanina, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Universal Adversarial Attack Against Speaker Recognition Models. ICASSP 2024: 4860-4864 - [c97]Edita Grolman, Amit Giloni, Ryuta Kremer, Hiroo Saito, Tomoyuki Shibata, Tsukasa Omino, Misaki Komatsu, Yoshikazu Hanatani, Asaf Shabtai, Yuval Elovici:
Query-Based External Information Leakage Attacks on Face Recognition Models. IJCNN 2024: 1-10 - [c96]Ido Sakazi, Edita Grolman, Yuval Elovici, Asaf Shabtai:
STFL: Utilizing a Semi-Supervised, Transfer-Learning, Federated-Learning Approach to Detect Phishing URL Attacks. IJCNN 2024: 1-10 - [c95]Shuki Zanyovka, Asaf Shabtai:
Simultaneous Transmission and Null Space Tracking Using Interference Feedback for Spatial Division Multiple Access. IWCMC 2024: 811-817 - [c94]Yarin Ozery, Asaf Nadler, Asaf Shabtai:
Information Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection. NDSS 2024 - [c93]Oryan Yehezkel, Alon Zolfi, Amit Baras, Yuval Elovici, Asaf Shabtai:
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms. NeurIPS 2024 - [c92]Mor Nahum
, Edita Grolman
, Inbar Maimon
, Dudu Mimran
, Oleg Brodt
, Aviad Elyashar
, Yuval Elovici
, Asaf Shabtai
:
Secure Crowdsource-Based Open-Source Code Verification (SC)^2V. SAC 2024: 1536-1538 - [i106]Sagiv Antebi, Noam Azulay, Edan Habler, Ben Ganon, Asaf Shabtai, Yuval Elovici:
GPT in Sheep's Clothing: The Risk of Customized GPTs. CoRR abs/2401.09075 (2024) - [i105]Oryan Yehezkel, Alon Zolfi, Amit Baras, Yuval Elovici, Asaf Shabtai:
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers. CoRR abs/2402.02554 (2024) - [i104]Daniel Nahmias, Gal Engelberg, Dan Klein, Asaf Shabtai:
Prompted Contextual Vectors for Spear-Phishing Detection. CoRR abs/2402.08309 (2024) - [i103]Amit Finkman, Eden Bar-Kochva, Avishag Shapira, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants. CoRR abs/2404.09066 (2024) - [i102]Lavi Ben-Shimol, Edita Grolman, Aviad Elyashar, Inbar Maimon, Dudu Mimran, Oleg Brodt, Martin Strassmann, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring. CoRR abs/2405.07172 (2024) - [i101]Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation. CoRR abs/2405.19954 (2024) - [i100]Yonatan Amaru, Prasanna N. Wudali, Yuval Elovici, Asaf Shabtai:
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning. CoRR abs/2406.05362 (2024) - [i99]Yuval Schwartz, Lavi Ben-Shimol, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI. CoRR abs/2407.05194 (2024) - [i98]Beni Ifland, Elad Duani, Rubin Krief, Miro Ohana, Aviram Zilberman, Andres Murillo, Ofir Manor, Ortal Lavi, Hikichi Kenji, Asaf Shabtai, Yuval Elovici, Rami Puzis:
GeNet: A Multimodal LLM-Based Co-Pilot for Network Topology and Configuration. CoRR abs/2407.08249 (2024) - [i97]Danielle Lavi, Oleg Brodt, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
Detection of Compromised Functions in a Serverless Cloud Environment. CoRR abs/2408.02641 (2024) - [i96]Tom Segal
, Asaf Shabtai, Yuval Elovici:
DOMBA: Double Model Balancing for Access-Controlled Language Models via Minimum-Bounded Aggregation. CoRR abs/2408.11121 (2024) - [i95]Ofir Cohen, Gil Ari Agmon, Asaf Shabtai, Rami Puzis:
The Information Security Awareness of Large Language Models. CoRR abs/2411.13207 (2024) - [i94]Ben Ganon, Alon Zolfi, Omer Hofman, Inderjeet Singh, Hisashi Kojima, Yuval Elovici, Asaf Shabtai:
DIESEL - Dynamic Inference-Guidance via Evasion of Semantic Embeddings in LLMs. CoRR abs/2411.19038 (2024) - [i93]Yael Itzhakev, Amit Giloni, Yuval Elovici, Asaf Shabtai:
Addressing Key Challenges of Adversarial Attacks and Defenses in the Tabular Domain: A Methodological Framework for Coherence and Consistency. CoRR abs/2412.07326 (2024) - 2023
- [j78]David Tayouri
, Nick Baum, Asaf Shabtai
, Rami Puzis
:
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage. IEEE Access 11: 27974-27991 (2023) - [j77]Yair Meidan
, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai:
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks. Comput. Secur. 126: 103073 (2023) - [j76]Ron Bitton
, Nadav Maman
, Inderjeet Singh
, Satoru Momiyama
, Yuval Elovici
, Asaf Shabtai
:
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. ACM Comput. Surv. 55(9): 183:1-183:36 (2023) - [j75]Yair Meidan
, Dan Avraham, Hanan Libhaber, Asaf Shabtai
:
CADeSH: Collaborative Anomaly Detection for Smart Homes. IEEE Internet Things J. 10(10): 8514-8532 (2023) - [j74]Jaidip Kotak
, Edan Habler
, Oleg Brodt, Asaf Shabtai
, Yuval Elovici
:
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. Sensors 23(8): 4018 (2023) - [j73]Efrat Levy
, Asaf Shabtai
, Bogdan Groza
, Pal-Stefan Murvay, Yuval Elovici
:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. IEEE Trans. Inf. Forensics Secur. 18: 4800-4814 (2023) - [j72]Adriana Berdich
, Bogdan Groza
, René Mayrhofer
, Efrat Levy
, Asaf Shabtai
, Yuval Elovici
:
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics. IEEE Trans. Mob. Comput. 22(4): 2417-2434 (2023) - [c91]Adi Offer
, Aviram Zilberman
, Asaf Shabtai
, Yuval Elovici
, Rami Puzis
:
CDGeB: Cloud Data Geolocation Benchmark. CCSW@CCS 2023: 69-74 - [c90]Ofir Cohen
, Ron Bitton
, Asaf Shabtai
, Rami Puzis
:
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment. ESORICS (3) 2023: 431-451 - [c89]Satoru Koda, Alon Zolfi, Edita Grolman, Asaf Shabtai, Ikuya Morikawa, Yuval Elovici:
Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey. IJCNN 2023: 1-10 - [c88]Yakov Mallah, Yuval Elovici, Asaf Shabtai:
Risk Oriented Resource Allocation in Robotic Swarm. PST 2023: 1-7 - [c87]Avishag Shapira, Alon Zolfi, Luca Demetrio
, Battista Biggio, Asaf Shabtai:
Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors. WACV 2023: 4560-4569 - [i92]Yair Meidan, Dan Avraham, Hanan Libhaber, Asaf Shabtai:
CADeSH: Collaborative Anomaly Detection for Smart Homes. CoRR abs/2303.01021 (2023) - [i91]Yair Meidan, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai:
D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks. CoRR abs/2303.01041 (2023) - [i90]Natan Semyonov, Rami Puzis, Asaf Shabtai, Gilad Katz:
ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network. CoRR abs/2305.06786 (2023) - [i89]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail. CoRR abs/2306.08422 (2023) - [i88]Yarin Ozery, Asaf Nadler, Asaf Shabtai:
Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention. CoRR abs/2307.02614 (2023) - [i87]David Tayouri, Telem Nachum, Asaf Shabtai:
MIRAGE: Multi-Binary Image Risk Assessment with Attack Graph Employment. CoRR abs/2311.03565 (2023) - [i86]Priyanka Prakash Surve, Oleg Brodt, Mark Yampolskiy, Yuval Elovici, Asaf Shabtai:
SoK: Security Below the OS - A Security Analysis of UEFI. CoRR abs/2311.03809 (2023) - [i85]Ryuta Kremer, Prasanna N. Wudali, Satoru Momiyama, Toshinori Araki, Jun Furukawa
, Yuval Elovici, Asaf Shabtai:
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response. CoRR abs/2311.03825 (2023) - [i84]Yizhak Vaisman, Gilad Katz, Yuval Elovici, Asaf Shabtai:
Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks. CoRR abs/2311.18525 (2023) - [i83]Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai:
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning. CoRR abs/2312.01200 (2023) - [i82]Roy Peled, Eran Aizikovich, Edan Habler, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Satellite Systems. CoRR abs/2312.01330 (2023) - [i81]Amit Baras, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers. CoRR abs/2312.02220 (2023) - 2022
- [j71]Adriana Berdich
, Bogdan Groza
, Efrat Levy
, Asaf Shabtai
, Yuval Elovici
, René Mayrhofer
:
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings. IEEE Access 10: 122399-122413 (2022) - [j70]Asaf Nadler
, Ron Bitton, Oleg Brodt, Asaf Shabtai:
On the vulnerability of anti-malware solutions to DNS attacks. Comput. Secur. 116: 102687 (2022) - [j69]Yael Mathov
, Tal Ben Senior, Asaf Shabtai, Yuval Elovici:
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. Comput. Secur. 121: 102841 (2022) - [j68]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Security of Open Radio Access Networks. Comput. Secur. 122: 102890 (2022) - [j67]Moshe Kravchik, Luca Demetrio
, Battista Biggio, Asaf Shabtai:
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems. Comput. Secur. 122: 102901 (2022) - [j66]Ishai Rosenberg
, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 54(5): 108:1-108:36 (2022) - [j65]Edita Grolman, Dvir Cohen, Tatiana Frenklach, Asaf Shabtai, Rami Puzis:
How and when to stop the co-training process. Expert Syst. Appl. 187: 115841 (2022) - [j64]Yoni Birman
, Shaked Hindi
, Gilad Katz, Asaf Shabtai:
Cost-effective ensemble models selection using deep reinforcement learning. Inf. Fusion 77: 133-148 (2022) - [j63]Yael Mathov
, Eden Levy, Ziv Katzir
, Asaf Shabtai, Yuval Elovici
:
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples. Knowl. Based Syst. 242: 108377 (2022) - [j62]Adir Solomon
, Michael Michaelshvili, Ron Bitton, Bracha Shapira
, Lior Rokach, Rami Puzis
, Asaf Shabtai:
Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowl. Based Syst. 246: 108709 (2022) - [j61]Shai Cohen
, Efrat Levy
, Avi Shaked
, Tair Cohen, Yuval Elovici
, Asaf Shabtai
:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. Sensors 22(11): 4259 (2022) - [j60]Edan Habler
, Asaf Shabtai
:
Analyzing Sequences of Airspace States to Detect Anomalous Traffic Conditions. IEEE Trans. Aerosp. Electron. Syst. 58(3): 1843-1857 (2022) - [j59]Orly Stan
, Ron Bitton
, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici
, Asaf Shabtai
:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1936-1954 (2022) - [j58]Moshe Kravchik
, Asaf Shabtai
:
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA. IEEE Trans. Dependable Secur. Comput. 19(4): 2179-2197 (2022) - [j57]Yam Sharon, David Berend
, Yang Liu
, Asaf Shabtai
, Yuval Elovici
:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. IEEE Trans. Inf. Forensics Secur. 17: 3225-3237 (2022) - [c86]Shay Sakazi, Yuval Elovici, Asaf Shabtai:
Prioritizing Antivirus Alerts on Internal Enterprise Machines. DIMVA 2022: 75-95 - [c85]Bogdan Groza
, Lucian Popa, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici:
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks. ESORICS (3) 2022: 658-679 - [c84]Amit Giloni, Edita Grolman, Yuval Elovici, Asaf Shabtai:
FEPC: Fairness Estimation Using Prototypes and Critics for Tabular Data. ICPR 2022: 4877-4884 - [c83]Alon Zolfi
, Shai Avidan, Yuval Elovici
, Asaf Shabtai
:
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models. ECML/PKDD (3) 2022: 304-320 - [c82]Nachiket Tapas, Sofia Belikovetsky, Francesco Longo, Antonio Puliafito, Asaf Shabtai, Yuval Elovici:
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain. SMARTCOMP 2022: 311-316 - [c81]Edita Grolman, Hodaya Binyamini, Asaf Shabtai, Yuval Elovici, Ikuya Morikawa, Toshiya Shimizu:
HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter. UMAP 2022: 143-152 - [c80]Yushi Cao, David Berend, Palina Tolmach, Guy Amit, Moshe Levy, Yang Liu
, Asaf Shabtai, Yuval Elovici:
Fair and accurate age prediction using distribution aware data curation and augmentation. WACV 2022: 2867-2877 - [d2]David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis:
MulVAL Interaction Rules Mapped to MITRE ATT&CK. IEEE DataPort, 2022 - [i80]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Open Radio Access Networks. CoRR abs/2201.06080 (2022) - [i79]Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. CoRR abs/2201.06093 (2022) - [i78]Efrat Levy, Nadav Maman, Asaf Shabtai, Yuval Elovici:
AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus. CoRR abs/2202.06870 (2022) - [i77]Avishag Shapira, Alon Zolfi, Luca Demetrio, Battista Biggio, Asaf Shabtai:
Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation. CoRR abs/2205.13618 (2022) - [i76]David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis:
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage. CoRR abs/2208.05750 (2022) - [i75]Edan Habler, Ron Bitton, Asaf Shabtai:
Evaluating the Security of Aircraft Systems. CoRR abs/2209.04028 (2022) - [i74]Orel Lavie, Asaf Shabtai, Gilad Katz:
A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection. CoRR abs/2209.09033 (2022) - [i73]Ofir Moshe, Gil Fidel, Ron Bitton, Asaf Shabtai:
Improving Interpretability via Regularization of Neural Activation Sensitivity. CoRR abs/2211.08686 (2022) - [i72]Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Attacking Object Detector Using A Universal Targeted Label-Switch Patch. CoRR abs/2211.08859 (2022) - [i71]Jacob Shams, Ben Nassi, Ikuya Morikawa, Toshiya Shimizu, Asaf Shabtai, Yuval Elovici:
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models. CoRR abs/2211.13644 (2022) - [i70]Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa
, Yuval Elovici, Asaf Shabtai:
Latent SHAP: Toward Practical Human-Interpretable Explanations. CoRR abs/2211.14797 (2022) - [i69]Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai:
YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection. CoRR abs/2212.02081 (2022) - 2021
- [j56]Shimon Harush, Yair Meidan, Asaf Shabtai
:
DeepStream: Autoencoder-based stream temporal clustering and anomaly detection. Comput. Secur. 106: 102276 (2021) - [j55]Tatiana Frenklach
, Dvir Cohen
, Asaf Shabtai, Rami Puzis
:
Android malware detection via an app similarity graph. Comput. Secur. 109: 102386 (2021) - [j54]Guy Amit
, Asaf Shabtai
, Yuval Elovici
:
A Self-Healing Mechanism for Internet of Things Devices. IEEE Secur. Priv. 19(1): 44-53 (2021) - [j53]Ron Bitton
, Asaf Shabtai
:
A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers. IEEE Trans. Dependable Secur. Comput. 18(3): 1164-1181 (2021) - [c79]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. CSF 2021: 1-16 - [c78]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CVPR 2021: 15232-15241 - [c77]Yael Daihes, Hen Tzaban, Asaf Nadler, Asaf Shabtai:
MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic. ESORICS (1) 2021: 736-756 - [c76]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
FOOD: Fast Out-Of-Distribution Detector. IJCNN 2021: 1-8 - [c75]Yoni Birman, Ziv Ido, Gilad Katz, Asaf Shabtai:
Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes. IJCNN 2021: 1-10 - [c74]Nir Regev, Lior Rokach, Asaf Shabtai:
Approximating Aggregated SQL Queries with LSTM Networks. IJCNN 2021: 1-8 - [c73]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants. IJCNN 2021: 1-10 - [c72]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. KDD 2021: 2574-2583 - [c71]Elior Nehemya
, Yael Mathov
, Asaf Shabtai
, Yuval Elovici
:
Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders. ECML/PKDD (4) 2021: 221-236 - [c70]Moshe Kravchik, Battista Biggio, Asaf Shabtai:
Poisoning attacks on cyber attack detectors for industrial control systems. SAC 2021: 116-125 - [c69]Lital Badash, Nachiket Tapas, Asaf Nadler, Francesco Longo
, Asaf Shabtai:
Blockchain-based bug bounty framework. SAC 2021: 239-248 - [c68]Shimon Harush, Yair Meidan, Asaf Shabtai:
DeepStream: autoencoder-based stream temporal clustering. SAC 2021: 445-448 - [c67]Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici:
SoK: Security and Privacy in the Age of Commercial Drones. SP 2021: 1434-1451 - [c66]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai:
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. USENIX Security Symposium 2021: 4259-4276 - [i68]Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. CoRR abs/2103.06297 (2021) - [i67]Yair Allouche, Nachiket Tapas, Francesco Longo, Asaf Shabtai, Yaron Wolfsthal:
TRADE: TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain Technology. CoRR abs/2103.13158 (2021) - [i66]Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. CoRR abs/2106.07074 (2021) - [i65]Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs/2106.07895 (2021) - [i64]Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems. CoRR abs/2107.01806 (2021) - [i63]Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici:
Dodging Attack Using Carefully Crafted Natural Makeup. CoRR abs/2109.06467 (2021) - [i62]Asaf Nadler, Ron Bitton, Oleg Brodt, Asaf Shabtai:
On The Vulnerability of Anti-Malware Solutions to DNS Attacks. CoRR abs/2109.11342 (2021) - [i61]Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai:
Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models. CoRR abs/2111.10759 (2021) - 2020
- [j52]Lior Sidi, Asaf Nadler
, Asaf Shabtai
:
MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses. IEEE Access 8: 161580-161592 (2020) - [j51]Omer Shwartz
, Amir Cohen, Asaf Shabtai
, Yossi Oren
:
Inner conflict: How smart device components can cause harm. Comput. Secur. 89 (2020) - [j50]Isabel Arend, Asaf Shabtai, Tali Idan, Ruty Keinan, Yoella Bereby-Meyer
:
Passive- and not active-risk tendencies predict cyber security behavior. Comput. Secur. 96: 101929 (2020) - [j49]Isabel Arend
, Asaf Shabtai
, Tali Idan, Ruty Keinan, Yoella Bereby-Meyer
:
Passive- and not active-risk tendencies predict cyber security behavior. Comput. Secur. 97: 101964 (2020) - [j48]Yair Meidan
, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
:
A novel approach for detecting vulnerable IoT devices connected behind a home NAT. Comput. Secur. 97: 101968 (2020) - [j47]Nachiket Tapas
, Yechiav Yitzchak, Francesco Longo
, Antonio Puliafito
, Asaf Shabtai:
P4UIoT: Pay-Per-Piece Patch Update Delivery for IoT Using Gradual Release. Sensors 20(7): 2156 (2020) - [j46]Naor Kalbo, Yisroel Mirsky
, Asaf Shabtai, Yuval Elovici:
The Security of IP-Based Video Surveillance Systems. Sensors 20(17): 4806 (2020) - [j45]Tomer Gluck, Moshe Kravchik
, Samuel Chocron, Yuval Elovici
, Asaf Shabtai:
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal. Sensors 20(21): 6157 (2020) - [j44]Orly Stan
, Adi Cohen, Yuval Elovici
, Asaf Shabtai
:
Intrusion Detection System for the MIL-STD-1553 Communication Bus. IEEE Trans. Aerosp. Electron. Syst. 56(4): 3010-3027 (2020) - [c65]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers. ACSAC 2020: 611-626 - [c64]Yoni Birman, Shaked Hindi, Gilad Katz, Asaf Shabtai:
Cost-Effective Malware Detection as a Service Over Serverless Cloud Using Deep Reinforcement Learning. CCGRID 2020: 420-429 - [c63]Ron Bitton, Kobi Boymgold, Rami Puzis, Asaf Shabtai:
Evaluating the Information Security Awareness of Smartphone Users. CHI 2020: 1-13 - [c62]Lior Sidi, Yisroel Mirsky, Asaf Nadler, Yuval Elovici, Asaf Shabtai:
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets. CIKM 2020: 2741-2748 - [c61]Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:
Security Ranking of IoT Devices Using an AHP Model. CSCML 2020: 29-44 - [c60]Amir Lukach, Ehud Gudes, Asaf Shabtai:
PUA Detection Based on Bundle Installer Characteristics. DBSec 2020: 261-273 - [c59]Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. ESORICS (1) 2020: 88-109 - [c58]Gil Fidel, Ron Bitton, Asaf Shabtai:
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures. IJCNN 2020: 1-8 - [i60]Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici:
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization. CoRR abs/2002.02176 (2020) - [i59]Moshe Kravchik, Asaf Shabtai:
Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks. CoRR abs/2002.02741 (2020) - [i58]Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai:
DANTE: A framework for mining and monitoring darknet traffic. CoRR abs/2003.02575 (2020) - [i57]Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai:
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. CoRR abs/2007.00059 (2020) - [i56]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Learning in the Cyber Security Domain. CoRR abs/2007.02407 (2020) - [i55]Yoni Birman, Ziv Ido, Gilad Katz, Asaf Shabtai:
Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes. CoRR abs/2007.09256 (2020) - [i54]Hen Tzaban, Asaf Nadler, Yael Daihes, Asaf Shabtai:
MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic. CoRR abs/2008.02003 (2020) - [i53]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions. CoRR abs/2008.04377 (2020) - [i52]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
GLOD: Gaussian Likelihood Out of Distribution Detector. CoRR abs/2008.06856 (2020) - [i51]Yushi Cao, David Berend, Palina Tolmach, Moshe Levy, Guy Amit, Asaf Shabtai, Yuval Elovici, Yang Liu:
Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems. CoRR abs/2009.05283 (2020) - [i50]Gil Fidel, Ron Bitton, Ziv Katzir, Asaf Shabtai:
Adversarial robustness via stochastic regularization of neural activation sensitivity. CoRR abs/2009.11349 (2020) - [i49]Eden Levy, Yael Mathov, Ziv Katzir, Asaf Shabtai, Yuval Elovici:
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples. CoRR abs/2010.03180 (2020) - [i48]Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici:
When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders. CoRR abs/2010.09246 (2020) - [i47]Tal Ben Senior, Yael Mathov, Asaf Shabtai, Yuval Elovici:
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations. CoRR abs/2010.12809 (2020) - [i46]Shahar Hoory, Tzvika Shapira, Asaf Shabtai, Yuval Elovici:
Dynamic Adversarial Patch for Evading Object Detection Models. CoRR abs/2010.13070 (2020) - [i45]Nir Regev, Lior Rokach, Asaf Shabtai:
Approximating Aggregated SQL Queries With LSTM Networks. CoRR abs/2010.13149 (2020) - [i44]Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici:
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers. CoRR abs/2010.16323 (2020) - [i43]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CoRR abs/2012.12528 (2020) - [i42]Amit Giloni, Edita Grolman, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici, Asaf Shabtai:
BENN: Bias Estimation Using Deep Neural Network. CoRR abs/2012.12537 (2020) - [i41]Moshe Kravchik, Battista Biggio, Asaf Shabtai:
Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems. CoRR abs/2012.15740 (2020) - [i40]Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici:
Botnet IND: About Botnets of Botless IoT Devices. IACR Cryptol. ePrint Arch. 2020: 1518 (2020)
2010 – 2019
- 2019
- [j43]Itay Hazan, Asaf Shabtai
:
Improving Grid-Based Location Prediction Algorithms by Speed and Direction Based Boosting. IEEE Access 7: 21211-21219 (2019) - [j42]Nadav Schweitzer, Ariel Stulman
, Tirza Hirst, Roy David Margalit, Asaf Shabtai
:
Network bottlenecks in OLSR based ad-hoc networks. Ad Hoc Networks 88: 36-54 (2019) - [j41]Asaf Nadler, Avi Aminov, Asaf Shabtai
:
Detection of malicious and low throughput data exfiltration over the DNS protocol. Comput. Secur. 80: 36-53 (2019) - [j40]Abraham Israeli, Lior Rokach, Asaf Shabtai
:
Constraint learning based gradient boosting trees. Expert Syst. Appl. 128: 287-300 (2019) - [j39]Oded Leiba, Ron Bitton, Yechiav Yitzchak, Asaf Nadler, Davidoz Kashi, Asaf Shabtai:
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution. Pervasive Mob. Comput. 58 (2019) - [j38]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs. IEEE Trans. Inf. Forensics Secur. 14(6): 1638-1653 (2019) - [j37]Shachar Siboni
, Vinay Sachidananda
, Yair Meidan
, Michael Bohadana, Yael Mathov
, Suhas Bhairav
, Asaf Shabtai
, Yuval Elovici:
Security Testbed for Internet-of-Things Devices. IEEE Trans. Reliab. 68(1): 23-44 (2019) - [c57]Shai Cohen, Tomer Gluck, Yuval Elovici, Asaf Shabtai:
Security Analysis of Radar Systems. CPS-SPC@CCS 2019: 3-14 - [c56]Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai:
Design Procedure of Knowledge Base for Practical Attack Graph Generation. AsiaCCS 2019: 594-601 - [c55]Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. CCS 2019: 2707-2708 - [c54]Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. CODASPY 2019: 85-96 - [c53]Nir Sivan, Ron Bitton, Asaf Shabtai:
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. RAID 2019: 243-260 - [c52]Shachar Siboni, Chanan Glezer
, Asaf Shabtai, Yuval Elovici:
A Weighted Risk Score Model for IoT Devices. SpaCCS Workshops 2019: 20-34 - [c51]Noga Agmon, Asaf Shabtai, Rami Puzis
:
Deployment optimization of IoT devices through attack graph analysis. WiSec 2019: 192-202 - [e3]Lorenzo Cavallaro, Johannes Kinder, Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6833-9 [contents] - [e2]Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, Joaquín García-Alfaro
:
Security and Safety Interplay of Intelligent Software Systems - ESORICS 2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11552, Springer 2019, ISBN 978-3-030-16873-5 [contents] - [i39]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Defense Methods Against Adversarial Examples for Recurrent Neural Networks. CoRR abs/1901.09963 (2019) - [i38]Lior Sidi, Asaf Nadler, Asaf Shabtai:
MaskDGA: A Black-box Evasion Technique Against DGA Classifiers and Adversarial Defenses. CoRR abs/1902.08909 (2019) - [i37]Ben Nassi, Asaf Shabtai, Ryusuke Masuoka, Yuval Elovici:
SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps. CoRR abs/1903.05155 (2019) - [i36]Noga Agmon, Asaf Shabtai, Rami Puzis:
Deployment Optimization of IoT Devices through Attack Graph Analysis. CoRR abs/1904.05853 (2019) - [i35]Yoni Birman, Shaked Hindi, Gilad Katz, Asaf Shabtai:
ASPIRE: Automated Security Policy Implementation Using Reinforcement Learning. CoRR abs/1905.10517 (2019) - [i34]Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai:
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup. CoRR abs/1905.13430 (2019) - [i33]Sefi Akerman, Edan Habler, Asaf Shabtai:
VizADS-B: Analyzing Sequences of ADS-B Images Using Explainable Convolutional LSTM Encoder-Decoder to Detect Cyber Attacks. CoRR abs/1906.07921 (2019) - [i32]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. CoRR abs/1906.09786 (2019) - [i31]Ron Bitton, Kobi Boymgold, Rami Puzis, Asaf Shabtai:
Evaluating the Information Security Awareness of Smartphone Users. CoRR abs/1906.10229 (2019) - [i30]Yael Mathov, Noga Agmon, Asaf Shabtai, Rami Puzis, Nils Ole Tippenhauer, Yuval Elovici:
Challenges for Security Assessment of Enterprises in the IoT Era. CoRR abs/1906.10922 (2019) - [i29]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach Towards Countermeasure Selection using Attack Graphs. CoRR abs/1906.10943 (2019) - [i28]Moshe Kravchik, Asaf Shabtai:
Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks. CoRR abs/1907.01216 (2019) - [i27]Sofia Belikovetsky, Oded Leiba, Asaf Shabtai, Yuval Elovici:
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain. CoRR abs/1908.06921 (2019) - [i26]Gil Fidel, Ron Bitton, Asaf Shabtai:
When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures. CoRR abs/1909.03418 (2019) - [i25]Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici:
The Security of IP-based Video Surveillance Systems. CoRR abs/1910.10749 (2019) - 2018
- [j36]Ron Bitton, Andrey Finkelshtein, Lior Sidi, Rami Puzis
, Lior Rokach, Asaf Shabtai:
Taxonomy of mobile users' security awareness. Comput. Secur. 73: 266-293 (2018) - [j35]Edan Habler, Asaf Shabtai:
Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages. Comput. Secur. 78: 155-173 (2018) - [j34]Edita Grolman, Andrey Finkelshtein, Rami Puzis
, Asaf Shabtai, Gershon Celniker, Ziv Katzir, Liron Rosenfeld:
Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis. IEEE Intell. Syst. 33(2): 40-53 (2018) - [j33]Yair Meidan
, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, Yuval Elovici:
N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 17(3): 12-22 (2018) - [j32]Gilad Katz
, Cornelia Caragea
, Asaf Shabtai:
Vertical Ensemble Co-Training for Text Classification. ACM Trans. Intell. Syst. Technol. 9(2): 21:1-21:23 (2018) - [c50]Abigail Paradise
, Dvir Cohen, Asaf Shabtai, Rami Puzis
:
ProfileGen: Generation of Automatic and Realistic Artificial Profiles. ASONAM 2018: 581-583 - [c49]Moshe Kravchik, Asaf Shabtai:
Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks. CPS-SPC@CCS 2018: 72-83 - [c48]Sadia Afroz, Battista Biggio
, Yuval Elovici, David Freeman, Asaf Shabtai:
11th International Workshop on Artificial Intelligence and Security (AISec 2018). CCS 2018: 2166-2167 - [c47]Asaf Shabtai:
Session details: AI for Detecting Software Vulnerabilities. AISec@CCS 2018 - [c46]Asaf Shabtai:
Session details: AI for Detecting Attacks. AISec@CCS 2018 - [c45]Orly Stan, Adi Cohen, Yuval Elovici, Asaf Shabtai:
On the Security of MIL-STD-1553 Communication Bus. ISSA/CSITS@ESORICS 2018: 153-171 - [c44]Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation. ESORICS (1) 2018: 533-554 - [c43]Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, Asaf Shabtai:
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution. EuroS&P Workshops 2018: 29-39 - [c42]Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. NDSS 2018 - [c41]Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. RAID 2018: 490-510 - [c40]Shachar Siboni, Asaf Shabtai, Yuval Elovici:
Leaking data from enterprise networks using a compromised smartwatch device. SAC 2018: 741-750 - [e1]Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai:
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, CCS 2018, Toronto, ON, Canada, October 19, 2018. ACM 2018, ISBN 978-1-4503-6004-3 [contents] - [r1]Abigail Paradise, Rami Puzis, Asaf Shabtai:
Socialbots. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [d1]Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf, Asaf Shabtai:
detection_of_IoT_botnet_attacks_N_BaIoT. UCI Machine Learning Repository, 2018 - [i24]Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. CoRR abs/1802.09089 (2018) - [i23]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs. CoRR abs/1803.02560 (2018) - [i22]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. CoRR abs/1804.08778 (2018) - [i21]Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf Shabtai, Yuval Elovici:
N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders. CoRR abs/1805.03409 (2018) - [i20]Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, Asaf Shabtai:
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution. CoRR abs/1805.04282 (2018) - [i19]Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren:
Shattered Trust: When Replacement Smartphone Components Attack. CoRR abs/1805.04850 (2018) - [i18]Moshe Kravchik, Asaf Shabtai:
Anomaly detection; Industrial control systems; convolutional neural networks. CoRR abs/1806.08110 (2018) - [i17]Abigail Paradise, Dvir Cohen, Asaf Shabtai, Rami Puzis:
Generation of Automatic and Realistic Artificial Profiles. CoRR abs/1807.00125 (2018) - [i16]Ben Nassi, Moshe Sror, Ido Lavi, Yair Meidan, Asaf Shabtai, Yuval Elovici:
Piping Botnet - Turning Green Technology into a Water Disaster. CoRR abs/1808.02131 (2018) - [i15]Yotam Intrator, Gilad Katz, Asaf Shabtai:
MDGAN: Boosting Anomaly Detection Using Multi-Discriminator Generative Adversarial Networks. CoRR abs/1810.05221 (2018) - [i14]Nir Sivan, Ron Bitton, Asaf Shabtai:
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. CoRR abs/1812.04829 (2018) - 2017
- [j31]Nir Ofek, Lior Rokach, Roni Stern
, Asaf Shabtai:
Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem. Neurocomputing 243: 88-102 (2017) - [j30]Asnat Greenstein-Messica, Lior Rokach, Asaf Shabtai:
Personal-discount sensitivity prediction for mobile coupon conversion optimization. J. Assoc. Inf. Sci. Technol. 68(8): 1940-1952 (2017) - [j29]Yisroel Mirsky, Asaf Shabtai, Bracha Shapira
, Yuval Elovici, Lior Rokach:
Anomaly detection for smartphone data streams. Pervasive Mob. Comput. 35: 83-107 (2017) - [j28]Itay Hazan, Asaf Shabtai:
Dynamic radius and confidence prediction in grid-based location prediction algorithms. Pervasive Mob. Comput. 42: 265-284 (2017) - [j27]Abigail Paradise
, Asaf Shabtai, Rami Puzis
, Aviad Elyashar, Yuval Elovici, Mehran Roshandel, Christoph Peylo:
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. IEEE Trans. Comput. Soc. Syst. 4(3): 65-79 (2017) - [j26]Nadav Schweitzer, Ariel Stulman
, Roy David Margalit, Asaf Shabtai:
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks. IEEE Trans. Mob. Comput. 16(8): 2174-2183 (2017) - [c39]Vinay Sachidananda, Shachar Siboni, Asaf Shabtai, Jinghui Toh, Suhas Bhairav, Yuval Elovici:
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things. IoTPTS@AsiaCCS 2017: 3-10 - [c38]Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa
, Nils Ole Tippenhauer
, Asaf Shabtai, Yuval Elovici:
SIPHON: Towards Scalable High-Interaction Physical Honeypots. CPSS@AsiaCCS 2017: 57-68 - [c37]Omer Shwartz, Guy Shitrit, Asaf Shabtai, Yossi Oren
:
From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts. EuroS&P Workshops 2017: 94-98 - [c36]Tomer Gluck, Rami Puzis
, Yossi Oren
, Asaf Shabtai:
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case. EuroS&P Workshops 2017: 99-103 - [c35]Ron Biton, Clint Feher, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur:
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems. HASE 2017: 153-156 - [c34]Yair Meidan
, Michael Bohadana, Asaf Shabtai, Juan David Guarnizo, Martín Ochoa
, Nils Ole Tippenhauer
, Yuval Elovici:
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. SAC 2017: 506-509 - [c33]Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren:
Shattered Trust: When Replacement Smartphone Components Attack. WOOT 2017 - [i13]Andrey Finkelstein, Ron Biton, Rami Puzis, Asaf Shabtai:
Classification of Smartphone Users Using Internet Traffic. CoRR abs/1701.00220 (2017) - [i12]Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
SIPHON: Towards Scalable High-Interaction Physical Honeypots. CoRR abs/1701.02446 (2017) - [i11]Orly Stan, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur:
Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus. CoRR abs/1707.05032 (2017) - [i10]Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers. CoRR abs/1707.05970 (2017) - [i9]Yair Meidan, Michael Bohadana, Asaf Shabtai, Martín Ochoa, Nils Ole Tippenhauer, Juan David Guarnizo, Yuval Elovici:
Detection of Unauthorized IoT Devices Using Machine Learning Techniques. CoRR abs/1709.04647 (2017) - [i8]Asaf Nadler, Avi Aminov, Asaf Shabtai:
Detection of Malicious and Low Throughput Data Exfiltration Over the DNS Protocol. CoRR abs/1709.08395 (2017) - [i7]Edan Habler, Asaf Shabtai:
Using LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages. CoRR abs/1711.10192 (2017) - 2016
- [j25]Nir Ofek, Soujanya Poria
, Lior Rokach, Erik Cambria
, Amir Hussain
, Asaf Shabtai:
Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis. Cogn. Comput. 8(3): 467-477 (2016) - [j24]Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren Bar-Ad, Yuval Elovici:
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework. Secur. Informatics 5(1): 1 (2016) - [j23]Asaf Shabtai, Maya Bercovitch, Lior Rokach, Ya'akov (Kobi) Gal
, Yuval Elovici, Erez Shmueli:
Behavioral Study of Users When Interacting with Active Honeytokens. ACM Trans. Inf. Syst. Secur. 18(3): 9:1-9:21 (2016) - [j22]Nadav Schweitzer, Ariel Stulman
, Asaf Shabtai, Roy David Margalit:
Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes. IEEE Trans. Mob. Comput. 15(1): 163-172 (2016) - [j21]Shachar Siboni, Asaf Shabtai, Nils Ole Tippenhauer
, Jemin Lee, Yuval Elovici:
Advanced Security Testbed Framework for Wearable IoT Devices. ACM Trans. Internet Techn. 16(4): 26:1-26:25 (2016) - [c32]Yisroel Mirsky, Asaf Shabtai, Lior Rokach, Bracha Shapira
, Yuval Elovici:
SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research. AISec@CCS 2016: 1-12 - [c31]Vinay Sachidananda, Jinghui Toh, Shachar Siboni, Asaf Shabtai, Yuval Elovici:
POSTER: Towards Exposing Internet of Things: A Roadmap. CCS 2016: 1820-1822 - [c30]Nadav Schweitzer, Ariel Stulman
, Asaf Shabtai:
Neighbor Contamination to Achieve Complete Bottleneck Control. MSWiM 2016: 247-253 - [c29]Andrey Finkelshtein, Rami Puzis
, Asaf Shabtai, Bronislav Sidik:
Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic. SBP-BRiMS 2016: 239-249 - [i6]Ben Feher, Lior Sidi, Asaf Shabtai, Rami Puzis:
The Security of WebRTC. CoRR abs/1601.00184 (2016) - [i5]Shachar Siboni, Vinay Sachidananda, Asaf Shabtai, Yuval Elovici:
Security Testbed for the Internet of Things. CoRR abs/1610.05971 (2016) - [i4]Asaf Shabtai:
Anomaly Detection Using the Knowledge-based Temporal Abstraction Method. CoRR abs/1612.04804 (2016) - 2015
- [c28]Yasmin Bokobza, Abigail Paradise
, Guy Rapaport, Rami Puzis
, Bracha Shapira
, Asaf Shabtai:
Leak Sinks: The Threat of Targeted Social Eavesdropping. ASONAM 2015: 375-382 - [c27]Abigail Paradise
, Asaf Shabtai, Rami Puzis
:
Hunting Organization-Targeted Socialbots. ASONAM 2015: 537-540 - [c26]Itay Hazan, Asaf Shabtai:
Noise Reduction of Mobile Sensors Data in the Prediction of Demographic Attributes. MOBILESoft 2015: 117-120 - [c25]Ron Biton, Gilad Katz
, Asaf Shabtai:
Sensor-Based Approach for Predicting Departure Time of Smartphone Users. MOBILESoft 2015: 146-147 - [c24]David Livshits, Alexandra Mikityuk, Stefan Pham
, Asaf Shabtai:
Towards Security of Native DRM Execution in HTML5. ISM 2015: 411-416 - [c23]Yisroel Mirsky, Noam Cohen, Asaf Shabtai:
Up-High to Down-Low: Applying Machine Learning to an Exploit Database. SECITC 2015: 184-200 - [c22]Idan Morad, Asaf Shabtai:
Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies. SECITC 2015: 201-211 - [i3]Asaf Shabtai, Dudu Mimran, Yuval Elovici:
Evaluation of Security Solutions for Android Systems. CoRR abs/1502.04870 (2015) - 2014
- [j20]Asaf Shabtai, Lena Tenenboim-Chekina, Dudu Mimran, Lior Rokach, Bracha Shapira
, Yuval Elovici:
Mobile malware detection through analysis of deviations in application network behavior. Comput. Secur. 43: 1-18 (2014) - [j19]Abigail Paradise, Rami Puzis
, Asaf Shabtai:
Anti-Reconnaissance Tools: Detecting Targeted Socialbots. IEEE Internet Comput. 18(5): 11-19 (2014) - [j18]Nir Ofek, Asaf Shabtai:
Dynamic Latent Expertise Mining in Social Networks. IEEE Internet Comput. 18(5): 20-27 (2014) - [j17]Gilad Katz
, Asaf Shabtai, Lior Rokach, Nir Ofek:
ConfDTree: A Statistical Method for Improving Decision Trees. J. Comput. Sci. Technol. 29(3): 392-407 (2014) - [j16]Arik Vartanian, Asaf Shabtai:
TM-Score: A Misuseability Weight Measure for Textual Content. IEEE Trans. Inf. Forensics Secur. 9(12): 2205-2219 (2014) - [j15]Ma'ayan Dror, Asaf Shabtai, Lior Rokach, Yuval Elovici:
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage. IEEE Trans. Knowl. Data Eng. 26(3): 682-697 (2014) - [c21]Asaf Shabtai, Yuval Elovici:
POSTER: Misuseablity Analysis for IT Infrastructure. CCS 2014: 1496-1498 - [c20]Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici:
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files. JISIC 2014: 91-98 - [p1]Gilad Katz, Asaf Shabtai, Lior Rokach:
Adapted Features and Instance Selection for Improving Co-training. Interactive Knowledge Discovery and Data Mining in Biomedical Informatics 2014: 81-100 - 2013
- [j14]Polina Zilberman, Gilad Katz
, Asaf Shabtai, Yuval Elovici:
Analyzing group E-mail exchange to detect data leakage. J. Assoc. Inf. Sci. Technol. 64(9): 1780-1790 (2013) - [j13]Asaf Shabtai, Maya Bercovitch, Lior Rokach, Yuval Elovici:
Optimizing Data Misuse Detection. ACM Trans. Knowl. Discov. Data 8(3): 16:1-16:23 (2013) - [c19]Asaf Shabtai, Idan Morad, Eyal Kolman, Ereli Eran, Alex Vaystikh, Eyal Gruss, Lior Rokach, Yuval Elovici:
IP2User - Identifying the Username of an IP Address in Network-Related Events. BigData Congress 2013: 435-436 - [c18]Eitan Menahem, Asaf Shabtai, Adi Levhar:
Detecting malware through temporal function-based features. CCS 2013: 1379-1382 - [i2]Yuri Shapira, Bracha Shapira, Asaf Shabtai:
Content-based data leakage detection using extended fingerprinting. CoRR abs/1302.2028 (2013) - 2012
- [b1]Asaf Shabtai
, Yuval Elovici, Lior Rokach:
A Survey of Data Leakage Detection and Prevention Solutions. Springer Briefs in Computer Science, Springer 2012, ISBN 978-1-4614-2052-1, pp. i-viii, 1-92 - [j12]Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer
, Yael Weiss:
"Andromaly": a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1): 161-190 (2012) - [j11]Asaf Shabtai, Yuval Shahar
, Yuval Elovici:
A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions. J. Intell. Inf. Syst. 39(1): 249-286 (2012) - [j10]Asaf Shabtai, Robert Moskovitch, Clint Feher, Shlomi Dolev
, Yuval Elovici:
Detecting unknown malicious code by applying classification techniques on OpCode patterns. Secur. Informatics 1(1): 1 (2012) - [j9]Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
M-Score: A Misuseability Weight Measure. IEEE Trans. Dependable Secur. Comput. 9(3): 414-428 (2012) - [c17]Gilad Katz
, Asaf Shabtai, Lior Rokach, Nir Ofek:
ConfDTree: Improving Decision Trees Using Confidence Intervals. ICDM 2012: 339-348 - 2011
- [j8]Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici:
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content. Secur. Commun. Networks 4(8): 947-965 (2011) - [j7]Asaf Shabtai, Eitan Menahem, Yuval Elovici:
F-Sign: Automatic, Function-Based Signature Generation for Malware. IEEE Trans. Syst. Man Cybern. Part C 41(4): 494-508 (2011) - [c16]Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure. CCS 2011: 765-768 - [c15]Polina Zilberman, Shlomi Dolev
, Gilad Katz
, Yuval Elovici, Asaf Shabtai:
Analyzing group communication for preventing data leakage via email. ISI 2011: 37-41 - [c14]Maya Bercovitch, Meir Renford, Lior Hasson, Asaf Shabtai, Lior Rokach, Yuval Elovici:
HoneyGen: An automated honeytokens generator. ISI 2011: 131-136 - [c13]Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Dynamic Sensitivity-Based Access Control. ISI 2011: 201-203 - [c12]Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Eliciting domain expert misuseability conceptions. K-CAP 2011: 193-194 - 2010
- [j6]Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev
, Chanan Glezer
:
Google Android: A Comprehensive Security Assessment. IEEE Secur. Priv. 8(2): 35-44 (2010) - [j5]Asaf Shabtai, Yuval Fledel, Yuval Elovici:
Securing Android-Powered Mobile Devices Using SELinux. IEEE Secur. Priv. 8(3): 36-44 (2010) - [j4]Asaf Shabtai, Uri Kanonov, Yuval Elovici:
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw. 83(8): 1524-1537 (2010) - [j3]Asaf Shabtai, Yuval Fledel, Yuval Elovici, Yuval Shahar
:
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics. J. Comput. Virol. 6(3): 239-259 (2010) - [c11]Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Detecting data misuse by applying context-based data linkage. Insider Threats@CCS 2010: 3-12 - [c10]Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici:
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. Insider Threats@CCS 2010: 13-20 - [c9]Asaf Shabtai, Yuval Fledel, Yuval Elovici:
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning. CIS 2010: 329-333 - [c8]Asaf Shabtai:
Malware Detection on Mobile Devices. Mobile Data Management 2010: 289-290 - [c7]Yuval Fledel, Asaf Shabtai, Dennis Potashnik, Yuval Elovici:
Google Android: An Updated Security Review. MobiCASE 2010: 401-414 - [c6]Asaf Shabtai, Yuval Elovici:
Applying Behavioral Detection on Android-Based Devices. MOBILWARE 2010: 235-249 - [c5]Polina Zilberman, Asaf Shabtai, Lior Rokach:
Analyzing Group Communication for Preventing Accidental Data Leakage via Email. CollSec 2010
2000 – 2009
- 2009
- [j2]Eitan Menahem, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Improving malware detection by applying multi-inducer ensemble. Comput. Stat. Data Anal. 53(4): 1483-1494 (2009) - [j1]Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer
:
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep. 14(1): 16-29 (2009) - [c4]Asaf Shabtai, Uri Kanonov, Yuval Elovici:
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. RAID 2009: 357-358 - [i1]Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev:
Google Android: A State-of-the-Art Review of Security Mechanisms. CoRR abs/0912.5101 (2009) - 2007
- [c3]Asaf Shabtai, Maor Atlas, Yuval Shahar
, Yuval Elovici:
Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain. K-CAP 2007: 7-14 - [c2]Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, Chanan Glezer:
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. KI 2007: 44-50 - 2006
- [c1]Asaf Shabtai, Denis Klimov, Yuval Shahar
, Yuval Elovici:
An intelligent, interactive tool for exploration and visualization of time-oriented security data. VizSEC 2006: 15-22
Coauthor Index
aka: Ron Bitton

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-19 01:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint