Filtros de búsqueda

Lista de obras de Yuval Elovici

3D Marketplace: Distributed Attestation of 3D Designs on Blockchain

manuscript published in 2019

A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists’ Perspective

artículo científico publicado en 2022

A model of the information security investment decision-making process

artículo científico publicado en 2016

A novel approach for detecting vulnerable IoT devices connected behind a home NAT

artículo científico publicado en 2020

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies

An Active Learning Framework for Efficient Condition Severity Classification

An optical covert-channel to leak data through an air-gap

Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph

artículo científico publicado en 2023

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations

Collaborative attack on Internet users' anonymity

Combined network analysis and machine learning allows the prediction of metabolic pathways from tomato metabolomics data

scientific article published on 18 June 2019

Data mining opportunities in geosocial networks for improving road safety

Database encryption

Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic

scientific article published on 20 March 2019

Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments

artículo científico publicado en 2020

Detecting unknown malicious code by applying classification techniques on OpCode patterns

article

Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS)

Detection of malicious PDF files and directions for enhancements: A state-of-the art survey

artículo científico publicado en 2015

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey

article

Detection of unknown computer worms based on behavioral classification of the host

article

Digital Audio Signature for 3D Printing Integrity

scientific article published in 2019

DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback

artículo científico publicado en 2018

Ethical considerations when employing fake identities in online social networks for research

artículo científico publicado en 2013

Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems

artículo científico publicado en 2022

Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator

F-Sign: Automatic, Function-Based Signature Generation for Malware

Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise

artículo científico publicado en 2020

Fast algorithm for successive computation of group betweenness centrality.

artículo científico publicado en 2007

Friend or foe? Fake profile identification in online social networks

article by Michael Fire et al published 23 May 2014 in Social Network Analysis and Mining

Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks

artículo científico publicado en 2020

Guest editorial: Special issue on data mining for information security

artículo científico publicado en 2013

Guided socialbots: Infiltrating the social networks of specific organizations’ employees

Homing socialbots

Implementing a database encryption solution, design and implementation issues

artículo científico publicado en 2014

Improving condition severity classification with an efficient active learning based framework

artículo científico publicado en 2016

Improving malware detection by applying multi-inducer ensemble

Increased cyber-biosecurity for DNA synthesis

artículo científico publicado en 2020

Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods

artículo científico publicado en 2017

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method

Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework

Large-Scale Shill Bidder Detection in E-commerce

artículo científico publicado en 2023

Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis

artículo científico publicado en 2019

Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques

scientific article published on 28 August 2019

Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content

article

N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

artículo científico publicado en 2018

ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields

scientific article published in 2020

On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers

Online Social Networks: Threats and Solutions

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations

artículo científico publicado en 2023

Organizational Intrusion: Organization Mining Using Socialbots

PRAW?A PRivAcy model for the Web

article

PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines

scientific article published in 2020

Routing betweenness centrality

SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods

scholarly article by Aviad Cohen et al published November 2016 in Expert Systems with Applications

Secure Crowdsource-Based Open-Source Code Verification (SC)^2V

artículo científico publicado en 2024

Securing Android-Powered Mobile Devices Using SELinux

Security of Open Radio Access Networks

artículo científico publicado en 2022

Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal

artículo científico publicado en 2020

Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)

Stop bugging me! Evading modern-day wiretapping using adversarial perturbations

artículo científico publicado en 2022

The Security of IP-Based Video Surveillance Systems

artículo científico publicado en 2020

The Social Amplifier—Reaction of Human Communities to Emergencies

The role of network setting and gender in online content popularity

USB-based attacks

artículo científico publicado en 2017

USBee: Air-gap covert-channel via electromagnetic emission from USB

Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud

artículo científico publicado en 2019

Xerox Day Vulnerability

artículo científico publicado en 2019

“Andromaly”: a behavioral malware detection framework for android devices