selected publications
-
academic article
- Defense Methods Against Adversarial Examples for Recurrent Neural Networks.. ARXIV: CRYPTOGRAPHY AND SECURITY. 2019
- Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.. CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY. 2019
- Digital Audio Signature for 3D Printing Integrity. IEEE Transactions on Information Forensics and Security. 14:1127-1141. 2019
- Security Testbed for Internet-of-Things Devices. IEEE Transactions on Reliability. 68:23-44. 2019
- SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps.. ARXIV: CRYPTOGRAPHY AND SECURITY. 2019
- N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders. arXiv preprint arXiv:1805.03409. 2018
- Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. arXiv preprint arXiv:1805.01612. 2018
- Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. arXiv preprint arXiv …. 2018
- Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs. arXiv preprint arXiv:1803.02560. 2018
- Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. Machine Learning. 5:2. 2018
- ANALYST INTUITION INSPIRED NEURAL NETWORK BASED CYBER SECURITY ANOMALY DETECTION. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL. 14:379-386. 2018
- PALE: Partially Asynchronous Agile Leader Election. arXiv preprint arXiv:1801.03734. 2018
- Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic. Information Security. 2018
- Bridgeware: the air-gap malware. Communications of the ACM. 61:74-82. 2018
- CIoTA: Collaborative IoT Anomaly Detection via Blockchain. arXiv preprint arXiv:1803.03807. 2018
- Game of Drones - Detecting Streamed POI from Encrypted FPV Channel.. arXiv preprint arXiv:1801.03074. 2018
- Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. arXiv preprint arXiv:1707.05970. 2018
- Introduction to the Special Issue on Data Mining for Cybersecurity. IEEE Intelligent Systems. 33:3-4. 2018
- MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields.. arXiv preprint arXiv:1802.02317. 2018
- Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication. arXiv preprint arXiv …. 2018
- Novel Set of General Descriptive Features For Enhanced Detection of Malicious Emails Using Machine Learning Methods. Expert Systems with Applications. 2018
- ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields.. arXiv preprint arXiv:1802.02700. 2018
- PIDS - A Behavioral Framework for Analysis and Detection of Network Printer Attacks.. arXiv preprint arXiv:1806.10642. 2018
- Piping Botnet - Turning Green Technology into a Water Disaster.. ARXIV: CRYPTOGRAPHY AND SECURITY. 2018
- PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines.. arXiv preprint arXiv:1804.04014. 2018
- Quantifying the resilience of machine learning classifiers used for cyber security. Expert Systems with Applications. 92:419-429. 2018
- Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers.. ARXIV: CRYPTOGRAPHY AND SECURITY. 2018
- Trusted System-Calls Analysis Methodology Aimed at Detection of Compromised Virtual Machines Using Sequential Mining. Knowledge-Based Systems. 153:Pages 147-175. 2018
- Detection of Unauthorized IoT Devices Using Machine Learning Techniques. arXiv preprint arXiv:1709.04647. 2017
- Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing. arXiv preprint arXiv:1709.01822. 2017
- Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods. Artificial Intelligence in Medicine. 81:12-32. 2017
- Oops!... I think I scanned a malware. arXiv preprint arXiv:1703.07751. 2017
- ALDOCX: detection of unknown malicious microsoft office documents using designated active learning methods based on new structural feature extraction methodol.... IEEE Transactions on Information Forensics and Security. 12:631-646. 2017
- Anomaly detection for smartphone data streams. Pervasive and Mobile Computing. 35:83-107. 2017
- Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack. ACM Transactions on Intelligent Systems and Technology (TIST). 8:50-25. 2017
- Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. IEEE Transactions on Computational Social Systems. 4:65-79. 2017
- Cyber Security and the Role of Intelligent Systems in Addressing its Challenges. ACM Transactions on Intelligent Systems and Technology (TIST). 8:49-12. 2017
- DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback. arXiv preprint arXiv:1705.09460. 13:1139-1154. 2017
- Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing.. arXiv preprint arXiv:1705.06454. 2017
- Group Decision Support for Leisure Activities Using Voting and Social Networks. Group Decision and Negotiation. 26:473-494. 2017
- HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System.. arXiv preprint arXiv:1703.10454. 2017
- LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED. arXiv preprint arXiv:1702.06715. 161-184. 2017
- MindDesktop: a general purpose brain computer interface.. arXiv preprint arXiv:1705.07490. 2017
- Network Flow Watermarking: A Survey. IEEE Communications Surveys & Tutorials. 19:512-530. 2017
- On network footprint of traffic inspection and filtering at global scrubbing centers. IEEE Transactions on Dependable and Secure Computing. 14:521-534. 2017
- Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.. arXiv preprint arXiv:1707.05032. 2017
- Temporal Pattern Discovery for Accurate Sepsis Diagnosis in ICU Patients.. arXiv preprint arXiv:1709.01720. 2017
- The role of network setting and gender in online content popularity. Information, Communication & Society. 20:1607-1624. 2017
- USB-based attacks. Computers & Security. 70:675-688. 2017
- aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR).. arXiv preprint arXiv:1709.05742. 2017
- xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs.. arXiv preprint arXiv:1706.01140. 2017
- SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods. Expert Systems with Applications. 63:324-343. 2016
- SPEAKE (a) R: Turn Speakers to Microphones for Fun and Profit. arXiv preprint arXiv:1611.07350. 2016
- Unsupervised Anomalous Vertices Detection Utilizing Link Prediction Algorithms. arXiv preprint arXiv:1610.07525. 8. 2016
- Matching entities across online social networks. Neurocomputing. 210:91-106. 2016
- Security Testbed for the Internet of Things. arXiv preprint arXiv:1610.05971. 2016
- Generic Anomalous Vertices Detection Utilizing a Link Prediction Algorithm. arXiv preprint arXiv:1610.07525. 2016
- dr0wned - Cyber-Physical Attack with Additive Manufacturing. arXiv preprint arXiv:1609.00133. 2016
- Improving condition severity classification with an efficient active learning based framework. Journal of biomedical informatics. 61:44-54. 2016
- Auditing defense against XSS worms in online social network-based web applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. 36:216-245. 2016
- 9-1-1 DDoS: Threat, Analysis and Mitigation.. arXiv preprint arXiv:1609.02353. 2016
- A model of the information security investment decision-making process. Computers & Security. 63:1-13. 2016
- A particle swarm model for estimating reliability and scheduling system maintenance. Enterprise Information Systems. 10:349-377. 2016
- ALDROID: efficient update of Android anti-virus software using designated active learning methods. Knowledge and Information Systems. 49:795-833. 2016
- Advanced security testbed framework for wearable IoT devices. ACM Transactions on Internet Technology (TOIT). 16:26-25. 2016
- Behavioral study of users when interacting with active honeytokens. ACM Transactions on Information and System Security (TISSEC). 18:9-21. 2016
- DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise.. arXiv preprint arXiv:1608.03431. 2016
- Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers. arXiv preprint arXiv:1606.05915. 2016
- Handwritten Signature Verification Using Hand-Worn Devices.. arXiv preprint arXiv:1612.06305. 2016
- Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework. Security Informatics. 5:1-20. 2016
- Virtual Breathalyzer. arXiv preprint arXiv:1612.05083. 2016
- VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap.. arXiv preprint arXiv:1607.03946. 2016
- XML-AD. Information Sciences. 2016
- XML-AD: Detecting anomalous patterns in XML documents. Information Sciences. 326:71-88. 2016
- On the RatiOnality and Optimality Of tRanspORtatiOn netwORks defense: a netwORk CentRality appROaCh. Securing Transportation Systems. 35-63. 2015
- Evaluation of Security Solutions for Android Systems. arXiv preprint arXiv:1502.04870. 2015
- Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. Computers & Security. 48:246-266. 2015
- Data mining of online genealogy datasets for revealing lifespan patterns in human population. ACM Transactions on Intelligent Systems and Technology (TIST). 6:28. 2015
- Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains. Annual Symposium on Combinatorial Search. 2015
- Topology manipulations for speeding betweenness centrality computation. J. Complex Networks. 3:84-112. 2015
- Topology manipulations for speeding betweenness centrality computation. Journal of Complex Networks. 3:84-112. 2015
- Novel active learning methods for enhanced PC malware detection in windows OS. Expert Systems with Applications. 41:5843-5857. 2014
- Implementing a database encryption solution, design and implementation issues. Computers & Security. 44:33-50. 2014
- Reaction to New Security Threat Class. arXiv preprint arXiv:1406.3110. 2014
- 10. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers & Security. 43:1-218. 2014
- Mobile malware detection through analysis of deviations in application network behavior. Computers & Security. 43:1-18. 2014
- CoBAn: A context based model for data leakage prevention. Information Sciences. 262:137-158. 2014
- Friend or foe? Fake profile identification in online social networks. Social Network Analysis and Mining. 4:194. 2014
- Guided socialbots: Infiltrating the social networks of specific organizations’ employees. AI communications. 29:87-106. 2014
- Incentives in Collaborative Applications. Encyclopedia of Social Network Analysis and Mining. 715-723. 2014
- OCCT: A one-class clustering tree for implementing one-to-many data linkage. IEEE Transactions on Knowledge and Data Engineering. 26:682-697. 2014
- Online social networks: threats and solutions. IEEE Communications Surveys & Tutorials. 16:2019-2036. 2014
- Optimizing data misuse detection. ACM Transactions on Knowledge Discovery from Data (TKDD). 8:16-23. 2014
- Quantitative Analysis of Genealogy Using Digitised Family Trees.. arXiv preprint arXiv:1408.5571. 2014
- Ethical Considerations when Employing Fake Identities in Online Social Networks for Research. Science and Engineering Ethics. 20:1027-1043. 2013
- The Social Amplifier - Reaction of Human Communities to Emergencies. Journal of Statistical Physics. 152:399-418,. 2013
- The CASH algorithm-cost-sensitive attribute selection using histograms. Information Sciences. 222:247-268. 2013
- Analyzing group E-mail exchange to detect data leakage. Journal of the Association for Information Science and Technology. 64:1780-1790. 2013
- Computationally efficient link prediction in a variety of social networks. ACM Transactions on Intelligent Systems and Technology (TIST). 5:10. 2013
- Editorial: Guest editorial: Special issue on data mining for information security. Information Sciences: an International Journal. 231:1–3-3. 2013
- Facebook Applications' Installation and Removal: A Temporal Analysis. arXiv preprint arXiv:1309.4067. 2013
- Links reconstruction attack. Security and Privacy in Social …. 2013
- Owning the Routing Table. Part II. Black Hat. 2013
- Social Privacy Protector - Protecting Users' Privacy in Social Networks. InProc. of the Second International Conference on Social Eco-Informatics (SOTICS), Venice, Italy. 2012
- Securing your transactions: Detecting anomalous patterns in xml documents. arXiv preprint arXiv:1209.1797. abs/1209.1797. 2012
- A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions. Journal of Intelligent Information Systems. 39:249-286. 2012
- “Andromaly”: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems. 38:161-190. 2012
- Augmented Betweenness Centrality for Environmentally-Aware Traffic Monitoring in Transportation Networks. Journal of Intelligent Transportation Systems: Technology, Planning, and Operations. 17:91-105. 2012
- Detecting spammers via aggregated historical data set. The 6th International Conference on Network and System Security (NSS). 7645:248-262. 2012
- Detecting unknown computer worm activity via support vector machines and active learning. Pattern Analysis and Applications. 15:459-475. 2012
- Detecting unknown malicious code by applying classification techniques on opcode patterns. Security Informatics. 1:1-22. 2012
- Detection of deviations in mobile applications network behavior. arXiv preprint arXiv:1208.0564. 2012
- M-score: A misuseability weight measure. IEEE Transactions on Dependable and Secure Computing. 9:414-428. 2012
- Predicting student exam’s scores by analyzing social network data. Active Media Technology. 584-595. 2012
- Strangers Intrusion Detection - Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies. Human Journal. 1:26-39. 2012
- TTLed random walks for collaborative monitoring in mobile and social networks. Handbook of Optimization in Complex …. 2012
- User authentication based on representative users. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews). 42:1669-1678. 2012
- User identity verification via mouse dynamics. Information Sciences. 201:19-36. 2012
- 2011 Index IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) Vol. 41. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS. 41:977. 2011
- Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content. Security and Communication Networks. 4:947-965. 2011
- Article 5 (26 pages)-A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks. ACM Transactions on Modeling and Computer Simulation (TOMACS). 22:5:1-5:26. 2011
- Augmented betweenness centrality for mobility prediction in transportation networks. International Workshop on Finding Patterns of Human Behaviors in NEtworks and MObility Data, NEMO11. 2011
- F-sign: Automatic, function-based signature generation for malware. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews). 41:494-508. 2011
- Optimizing Investment Decisions in Selecting Information Security Remedies.. Information Management & Computer Security. 19:95-112. 2011
- Stealing reality: when criminals become data scientists (or vice versa). IEEE Intelligent Systems. 26(6):22-30. 2011
- Trawling Traffic under Attack, Overcoming DDoS Attacks by Target-Controlled Traffic Filtering. International Journal of Foundations of Computer Science. 22:1073-1098. 2011
- Stealing reality. arXiv preprint arXiv:1010.1028. 2010
- Efficient Collaborative Application Monitoring Scheme for Mobile Networks. arXiv preprint arXiv:1009.1132. 2010
- Applying behavioral detection on android-based devices. Mobile Wireless Middleware, Operating Systems, and Applications. 48:235-249. 2010
- Auto-Sign: an automatic signature generator for high-speed malware filtering devices. Journal in Computer Virology. 6:91-103. 2010
- Database Encryption - An Overview of Contemporary Challenges and Design Considerations. ACM SIGMOD Record. 38:29-34. 2010
- Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS). Journal of the Association for Information Science and Technology. 61:405-418. 2010
- Efficient multidimensional suppression for k-anonymity. IEEE Transactions on Knowledge and Data Engineering. 22:334-347. 2010
- Google android: A comprehensive security assessment. IEEE Security & Privacy. 8:35-44. 2010
- Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. Journal of Systems and Software. 83:1524-1537. 2010
- Optimizing Targeting of Intrusion Detection Systems in Social Networks. Handbook of Social Network Technologies and Applications. 549-568. 2010
- Routing betweenness centrality. Journal of the ACM (JACM). 57:25:1-25:27. 2010
- Securing Android-powered mobile devices using SELinux. IEEE Security & Privacy. 8:36-44. 2010
- Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics. Journal in Computer Virology. 6:239-259. 2010
- Troika - An improved stacking schema for classification tasks. Information Sciences. 179:4097-4122. 2009
- Unknown malcode detection and the imbalance problem. Journal in Computer Virology. 5:295-308. 2009
- Improving malware detection by applying multi-inducer ensemble. Computational Statistics & Data Analysis. 53:1483-1494. 2009
- Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Technical Report. 14:16-29. 2009
- A State-of-the-Art Review of Security Mechanisms. Cornell University. 2009
- A chronological evaluation of unknown malcode detection. Intelligence and Security Informatics. 112-117. 2009
- A decision theoretic approach to combining information filtering. Online Information Review. 33:920-942. 2009
- Collaborative attack on Internet users' anonymity. Internet Research. 19:60-77. 2009
- Google android: A state-of-the-art review of security mechanisms. arXiv preprint arXiv:0912.5101. abs/0912.5. 2009
- Improving malware detection by applying multi-inducer ensemble Fe: 160. Operations Research Management Science. 49:545. 2009
- Incremental deployment of network monitors based on Group Betweenness Centrality. Information Processing Letters. 109:1172-1176. 2009
- Malicious code detection using active learning. Privacy, security, and trust in KDD. 74-91. 2009
- Protecting Critical Infrastructures from Cyber Attacks Involving Malware. Modelling Cyber Security: Approaches, Methodology, Strategies. 59:140. 2009
- SISR --- A New Model for Epidemic Spreading of Electronic Threats. Information Security. 242-249. 2009
- SISR-A New Model for Epidemic Spreading of Electronic Threats (Short Paper). Lecture Notes in Computer Science. 1:242-249. 2009
- Using artificial neural networks to detect unknown computer worms. Neural Computing and Applications. 18:663-674. 2009
- kACTUS 2: Privacy preserving in classification tasks using k-Anonymity. Protecting Persons While …. 5661:63-81. 2009
- Acquisition of malicious code using active learning. Proc. 2nd Int’l Workshop on Privacy, Security, & Trust in KDD. 2008
- Enhancement to the Advanced Terrorist Detection System (ATDS). NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION SECURITY. 15:71. 2008
- How to Protect Critical Infrastructure from Cyber-Terrorist Attacks. NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION SECURITY. 15:224. 2008
- A distributed framework for the detection of new worm-related malware. Intelligence and Security Informatics. 179-190. 2008
- An Overview of IDS Using Anomaly Detection. Cyber Warfare and Cyber Terrorism. 2008
- Detection of unknown computer worms based on behavioral classification of the host. Computational Statistics & Data Analysis. 52:4544-4566. 2008
- Optimization of NIDS placement for protection of intercommunicating critical infrastructures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5376 LNCS:191-203. 2008
- Unknown malcode detection using opcode representation. Intelligence and Security Informatics. 204-215. 2008
- Unknown malicious code detection-practical issues. Proc. Seventh European Conf. on Information Warfare. 145-153. 2008
- A Theory of Actionable Data Mining with Application to Semiconductor Manufacturing Control. International Journal of Production Research. 45:3059-3084. 2007
- Evasive Routing: Achieving Anonymity Using Multiple ISPs. 網際網路技術學刊. 8:83-96. 2007
- Fast algorithm for successive computation of group betweenness centrality. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics. 76:056709. 2007
- Finding the most prominent group in complex networks. AI communications. 20:287-296. 2007
- Identifying computers hidden behind a nat using machine learning techniques. ECIW2008-7th European Conference on Information Warfare and Security: ECIW2008. 335-340. 2007
- Improving the detection of unknown computer worms activity using active learning. KI 2007: Advances in Artificial Intelligence. 489-493. 2007
- MarCol: A market-based recommender system. IEEE Intelligent Systems. 22:74-78. 2007
- Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques. Int J Comput Sci Eng. 15:202-208. 2006
- A decision theoretic approach to combining information filters: An analytical and empirical evaluation. Journal of the Association for Information Science and Technology. 57:306-320. 2006
- Cluster-analysis attack against a private web solution (PRAW). Online Information Review. 30:624-643. 2006
- Hidden-Web Privacy Preservation Surfing (Hi-Wepps) Model. Privacy and Technologies of Identity. 335-348. 2006
- Using the knowledge-based temporal-abstraction (KBTA) method for detection of electronic threats. ECIW2006-Proceedings of the 5th European Conference on i-Warfare and Security: ECIW 2006. 215. 2006
- 15, 4 Enhancmg customer prlvacy. Internet Research. 15:4. 2005
- Center-Negev and during 1969-1992 held a part-time position as associate professor at Ben Gurion Univer-sity of the Negev at the Departments of Mathematics and.... Fighting Terror in Cyberspace. 65:157. 2005
- Detection System. Fighting Terror in Cyberspace. 65:75. 2005
- Enhancing customer privacy while searching for products and services on the World Wide Web. Internet Research. 15:378-399. 2005
- PRAW- The Model for PRivAte Web. J. Amer. Soc. Inform. Sci., Technol. 56:159-172. 2005
- PRAW-A PRivAcy model for the Web: Research Articles. Journal of the Association for Information Science and Technology. 56:159-172. 2005
- INTELLIGENT TECHNOLOGY FOR CONTENT MONITORING ON THE WEB. SERIES IN MACHINE PERCEPTION AND ARTIFICIAL INTELLIGENCE. 58:539-559. 2004
- OHT-Online-HTML Tracer for Detecting Terrorist Activities on the Web. Proceedings of the 3rd European Conference on Information Warfare and Security: ECIW. 371. 2004
- Using data mining techniques for detecting terror-related activities on the web. Journal of Information Warfare. 3:17-29. 2004
- A bounded local adaptive packet pricing(BLAPP) scheme for IP networks.. WSEAS Transactions on Communications. 2:282-288. 2003
- A decision-theoretic approach to data mining. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans. 33:42-51. 2003
- Content-based methodology for anomaly detection on the web. Advances in Web Intelligence. 954-954. 2003
- Privacy preservation improvement by learning optimal profile generation rate. User Modeling. 2702:168-177. 2003
- Using data mining for detecting terror-related activities on the Web. Proceedings of the Second European Conference on Information Warfare and Security (ECIW’03). 271-280. 2003
- Using the Information Structure Model to Compare Profile-Based Information Filtering Systems. Information Retrieval. 6:75-97. 2003
- A new privacy model for web surfing. Next Generation Information Technologies and Systems. 2382:45-16. 2002
- Performance evaluation of a distributed application. Journal of the Operational Research Society. 52:916-927. 2001
- Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems.. Parallel Computing. 19:633-649. 1993
- Multiple interfaces message passing system for transputer network. Microprocessing and Microprogramming. 34:237-242. 1992
-
book
-
conference paper
- Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs. International Conference on Database Systems for Advanced Applications. 342-351. 2018
- Leaking data from enterprise networks using a compromised smartwatch device. Proceedings of the 33rd Annual ACM …. 741-750. 2018
- Opening Pandora’s Box: Effective Techniques for Reverse Engineering IoT Devices. International Conference on Smart Card Research and Advanced Applications. 1-21. 2017
- Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data. 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). 2080-2083. 2017
- Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk. 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). 1790-1793. 2017
- 9-1-1 DDoS: Attacks, Analysis and Mitigation. Security and Privacy (EuroS&P), 2017 IEEE European Symposium on. 218-232. 2017
- A Lightweight Vulnerability Mitigation Framework for IoT Devices. Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. 71-75. 2017
- A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems. High Assurance Systems Engineering (HASE), 2017 IEEE 18th International Symposium on. 153-156. 2017
- Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise (‘DiskFiltration’). European Symposium on Research in Computer Security. 98-115. 2017
- Cyber security patrol: detecting fake and vulnerable wifi-enabled printers. Proceedings of the Symposium on Applied Computing. 535-542. 2017
- EVALUATION OF ADDITIVE AND SUBTRACTIVE MANUFACTURING FROM THE SECURITY PERSPECTIVE. International Conference on Critical Infrastructure Protection. 23-44. 2017
- Enhanced situation space mining for data streams. Proceedings of the Symposium on Applied Computing. 842-849. 2017
- How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective. Proceedings of the 12th International Conference on Availability, Reliability and Security. 78-10. 2017
- Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things. Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security. 3-10. 2017
- ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. Proceedings of the Symposium on Applied Computing. 506-509. 2017
- Scholarly Digital Libraries as a Platform for Malware Distribution.. SG-CRC. 107-128. 2017
- Siphon: Towards scalable high-interaction physical honeypots. Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security. 57-68. 2017
- Usbee: Air-gap covert-channel via electromagnetic emission from usb. Privacy, Security and Trust (PST), 2016 14th Annual Conference on. 264-268. 2016
- AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling. International Conference on Future Network Systems and Security. 1-11. 2016
- Sherlock vs moriarty: A smartphone dataset for cybersecurity research. Proceedings of the 2016 ACM workshop on Artificial intelligence and security. 1-12. 2016
- POSTER: Towards Exposing Internet of Things: A Roadmap. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1820-1822. 2016
- Personal Information Leakage During Password Recovery of Internet Services. Intelligence and Security Informatics Conference (EISIC), 2016 European. 136-139. 2016
- An optical covert-channel to leak data through an air-gap. Privacy, Security and Trust (PST), 2016 14th Annual Conference on. 642-649. 2016
- Boosting the detection of malicious documents using designated active learning methods. Machine Learning and Applications (ICMLA), 2015 IEEE 14th International Conference on. 760-765. 2015
- JoKER: Trusted detection of kernel rootkits in android devices via JTAG interface. Trustcom/BigDataSE/ISPA, 2015 IEEE. 65-73. 2015
- An active learning framework for efficient condition severity classification. Conference on Artificial Intelligence in Medicine in Europe. 13-24. 2015
- Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations. Computer Security Foundations Symposium (CSF), 2015 IEEE 28th. 276-289. 2015
- GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.. USENIX Security Symposium. 849-864. 2015
- Search problems in the domain of multiplication: Case study on anomaly detection using markov chains. Eighth Annual Symposium on Combinatorial Search. 2015
- pcstream: A stream clustering algorithm for dynamically detecting and managing temporal contexts. Pacific-Asia Conference on Knowledge Discovery and Data Mining. 119-133. 2015
- POSTER: Misuseablity Analysis for IT Infrastructure. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 1496-1498. 2014
- ALPD: Active learning framework for enhancing the detection of malicious PDF files. Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint. 91-98. 2014
- Resilience of Anti-malware Programs to Na"ive Modifications of Malicious Binaries. Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint. 152-159. 2014
- Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries. Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint. 152-159. 2014
- Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements. Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint. 145-151. 2014
- CEASER-ALE: An Active Learning Enhancement for Conditions Severity Classification. ACM KDD on Workshop on Connected Health at Big Data Era, NYC, USA, 2014. 2014
- Limiting access to unintentionally leaked sensitive documents using malware signatures. Proceedings of the 19th ACM symposium on Access control models and technologies. 129-140. 2014
- AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on. 58-67. 2014
- Exfiltration of information from air-gapped machines using monitor's LED indicator. Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint. 264-267. 2014
- OSPF vulnerability to persistent poisoning attacks: A systematic analysis. Proceedings of the 30th Annual Computer Security Applications Conference. 336-345. 2014
- ACTIDS: an active strategy for detecting and localizing network attacks. Proceedings of the 2013 ACM workshop on Artificial intelligence and security. 55-66. 2013
- Combining one-class classifiers via meta learning. Proceedings of the 22nd ACM international conference on Conference on information & knowledge management. 2435-2440. 2013
- A fast and scalable method for threat detection in large-scale DNS logs. Big Data, 2013 IEEE International Conference on. 738-741. 2013
- Entity matching in online social networks. Social Computing (SocialCom), 2013 International Conference on. 339-344. 2013
- Homing socialbots: intrusion on a specific organization's employee using Socialbots. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 1358-1365. 2013
- Nesto - Network selection and traffic offloading system for android mobile devices. Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International. 337-342. 2013
- IP2User--Identifying the Username of an IP Address in Network-Related Events. Big Data (BigData Congress), 2013 IEEE International Congress on. 435-436. 2013
- Detecting application update attack on mobile devices through network featur. Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on. 91-92. 2013
- Detecting Anomalous Behaviors Using Structural Properties of Social Networks.. SBP. 433-440. 2013
- Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks.. SBP. 368-376. 2013
- Trade-Offs in Social and Behavioral Modeling in Mobile Networks.. SBP. 412-423. 2013
- Analyzing users' web surfing patterns to trace terrorists and criminals. Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on. 143-145. 2013
- Exploiting simultaneous usage of different wireless interfaces for security and mobility. Future Generation Communication Technology (FGCT), 2013 Second International Conference on. 21-26. 2013
- Noninvasive detection of anti-forensic malware. Malicious and Unwanted Software:" The Americas"(MALWARE), 2013 8th International Conference on. 1-10. 2013
- Organizational intrusion: Organization mining using socialbots. Social Informatics (SocialInformatics), 2012 International Conference on. 7-12. 2012
- Network-based intrusion detection systems go active!. Proceedings of the 2012 ACM conference on Computer and communications security. 1004-1006. 2012
- Incremental learning with accuracy prediction of social and individual properties from mobile-phone data. Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). 969-974. 2012
- How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage.. SBP. 43-52. 2012
- Data mining opportunities in geosocial networks for improving road safety. IEEE 27th Convention of Electrical & Electronics Engineers in Israel (IEEEI). 1-4. 2012
- Heuristics for speeding up betweenness centrality computation. Proceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012. 302-311. 2012
- A method for detecting unknown malicious executables. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. 190-196. 2011
- Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.. Proceedings of the 18th ACM conference on Computer and communications security. 765-768. 2011
- Rendezvous tunnel for anonymous publishing: Clean slate and tor based designs. Symposium on Self-Stabilizing Systems. 223-237. 2011
- Analyzing group communication for preventing data leakage via email. Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on. 37-41. 2011
- Dynamic Sensitivity-Based Access Control. Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on. 201-203. 2011
- Eliciting domain expert misuseability conceptions. Proceedings of the sixth international conference on Knowledge capture. 193-194. 2011
- HoneyGen: An automated honeytokens generator. Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on. 131-136. 2011
- Link prediction in social networks using computationally efficient topological features. Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on. 73-80. 2011
- LoOkie - It feels like being there. Conference on Human Factors in Computing Systems - Proceedings. 1873-1878. 2011
- MindDesktop - Computer Accessibility for Severely Handicapped.. ICEIS (4 …. 316-320. 2011
- Cost-sensitive detection of malicious applications in mobile devices. International Conference on Mobile Computing, Applications, and Services. 382-395. 2010
- Automated static code analysis for classifying android applications using machine learning. Computational Intelligence and Security (CIS), 2010 International Conference on. 329-333. 2010
- Clustering di-graphs for continuously verifying users according to their typing patterns. Electrical and Electronics Engineers in Israel (IEEEI), 2010 IEEE 26th Convention of. 000445-000449. 2010
- Continuous verification using keystroke dynamics. Computational Intelligence and Security (CIS), 2010 International Conference on. 411-415. 2010
- Cost benefit deployment of dnips. Communications (ICC), 2010 IEEE International Conference on. 23-27. 2010
- Detecting data misuse by applying context-based data linkage. Proceedings of the 2010 ACM workshop on Insider threats. 3-12. 2010
- Google Android: An updated security review. International Conference on Mobile Computing, Applications, and Services. 401-414. 2010
- M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. Proceedings of the 2010 ACM workshop on Insider threats. 13-20. 2010
- Rendezvous tunnel for anonymous publishing. Proceedings of the 17th ACM conference on Computer and communications security. 690-692. 2010
- Ttled random walks for collaborative monitoring. INFOCOM IEEE Conference on Computer Communications Workshops, 2010. 1-6. 2010
- An Attentive Digital Signage System.. Mensch & Computer Workshopband. 10-15. 2009
- Detection, alert and response to malicious behavior in mobile devices: knowledge-based approach. International Workshop on Recent Advances in Intrusion Detection. 357-358. 2009
- Identity theft, computers and behavioral biometrics. Intelligence and Security Informatics, 2009. ISI'09. IEEE International Conference on. 155-160. 2009
- Active learning to improve the detection of unknown computer worms activity. Information Fusion, 2008 11th International Conference on. 1-8. 2008
- Unknown malcode detection-a chronological evaluation. Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on. 267-268. 2008
- Unknown malcode detection via text categorization and the imbalance problem. Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on. 156-161. 2008
- Detection of unknown computer worms activity based on computer behavior using data mining. Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposium on. 169-177. 2007
- Computer Systems & Information SSR: a Unified Approach for Decision Making. Reliability and Maintainability Symposium, 2007. RAMS'07. Annual. 427-433. 2007
- Applying machine learning techniques for detection of malicious code in network traffic. Annual Conference on Artificial Intelligence. 44-50. 2007
- Deployment of DNIDS in social networks. ISI 2007: 2007 IEEE Intelligence and Security Informatics. 59-65. 2007
- Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain. K-CAP'07: Proceedings of the Fourth International Conference on Knowledge Capture. 7-14. 2007
- Host based intrusion detection using machine learning. Intelligence and Security Informatics, 2007 IEEE. 107-114. 2007
- Malicious code detection and acquisition using active learning. Intelligence and Security Informatics, 2007 IEEE. 371-371. 2007
- Simulating Threats Propagation within the NSP Infrastructure. Intelligence and Security Informatics, 2007 IEEE. 380-380. 2007
- An intelligent, interactive tool for exploration and visualization of time-oriented security data. Proceedings of the 3rd international workshop on Visualization for computer security. 15-22. 2006
- Application of artificial neural networks techniques to computer worm detection. IEEE International Conference on Neural Networks - Conference Proceedings. 2362-2369. 2006
- Content-based detection of terrorists browsing the web using an advanced terror detection system (ATDS). International Conference on Intelligence and Security Informatics. 244-255. 2005
- Designing secure indexes for encrypted databases. DBSec. 54-68. 2005
- A fuzzy-based algorithm for web document clustering. Fuzzy Information, 2004. Processing NAFIPS'04. IEEE Annual Meeting of the. 524-527 Vol.2. 2004
- A structure preserving database encryption scheme. Workshop on Secure Data Management. 28-40. 2004
- Terrorist detection system. European Conference on Principles of Data Mining and Knowledge Discovery. 540-542. 2004
- Per-packet pricing scheme for IP networks. Telecommunications, 2003. ICT 2003. 10th International Conference on. 1494-1500. 2003
- A new privacy model for hiding group interests while accessing the web. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society. 63-70. 2002
- Message passing system for closely coupled multiprocessor system. Electrical and Electronics Engineers in Israel, 1991. Proceedings., 17th Convention of. 275-278. 1991