2009 | ||
---|---|---|
33 | EE | Robert Moskovitch, Clint Feher, Yuval Elovici: A Chronological Evaluation of Unknown Malcode Detection. PAISI 2009: 112-117 |
32 | EE | Shlomi Dolev, Yuval Elovici, Rami Puzis, Polina Zilberman: Incremental Deployment of Network Monitors Based on Group Betweenness Centrality CoRR abs/0904.0352: (2009) |
2008 | ||
31 | EE | Boris Rozenberg, Ehud Gudes, Yuval Elovici: A Distributed Framework for the Detection of New Worm-Related Malware. EuroISI 2008: 179-190 |
30 | EE | Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev: Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. EuroISI 2008: 191-203 |
29 | EE | Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici: Unknown Malcode Detection Using OPCODE Representation. EuroISI 2008: 204-215 |
28 | EE | Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici: Unknown malcode detection via text categorization and the imbalance problem. ISI 2008: 156-161 |
27 | EE | Robert Moskovitch, Clint Feher, Yuval Elovici: Unknown malcode detection - A chronological evaluation. ISI 2008: 267-268 |
26 | EE | Robert Moskovitch, Yuval Elovici, Lior Rokach: Detection of unknown computer worms based on behavioral classification of the host. Computational Statistics & Data Analysis 52(9): 4544-4566 (2008) |
2007 | ||
25 | EE | Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici: Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. CIDM 2007: 202-209 |
24 | EE | Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici: Host Based Intrusion Detection using Machine Learning. ISI 2007: 107-114 |
23 | EE | Robert Moskovitch, Nir Nissim, Yuval Elovici: Malicious Code Detection and Acquisition Using Active Learning. ISI 2007: 371 |
22 | EE | Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici: Simulating Threats Propagation within the NSP Infrastructure. ISI 2007: 380 |
21 | EE | Meytal Tubi, Rami Puzis, Yuval Elovici: Deployment of DNIDS in Social Networks. ISI 2007: 59-65 |
20 | EE | Asaf Shabtai, Maor Atlas, Yuval Shahar, Yuval Elovici: Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain. K-CAP 2007: 7-14 |
19 | EE | Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, Chanan Glezer: Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. KI 2007: 44-50 |
18 | EE | Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici: Improving the Detection of Unknown Computer Worms Activity Using Active Learning. KI 2007: 489-493 |
17 | EE | Rami Puzis, Yuval Elovici, Shlomi Dolev: Finding the most prominent group in complex networks. AI Commun. 20(4): 287-296 (2007) |
16 | EE | Dan Melamed, Bracha Shapira, Yuval Elovici: MarCol: A Market-Based Recommender System. IEEE Intelligent Systems 22(3): 74-78 (2007) |
2006 | ||
15 | EE | Dima Stopel, Zvi Boger, Robert Moskovitch, Yuval Shahar, Yuval Elovici: Application of Artificial Neural Networks Techniques to Computer Worm Detection. IJCNN 2006: 2362-2369 |
14 | EE | Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici: An intelligent, interactive tool for exploration and visualization of time-oriented security data. VizSEC 2006: 15-22 |
13 | EE | Yuval Elovici, Bracha Shapira, Paul B. Kantor: A decision theoretic approach to combining information filters: An analytical and empirical evaluation. JASIST 57(3): 306-320 (2006) |
2005 | ||
12 | EE | Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes: Designing Secure Indexes for Encrypted Databases. DBSec 2005: 54-68 |
11 | EE | Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel: Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). ISI 2005: 244-255 |
10 | EE | Bracha Shapira, Yuval Elovici, Adlay Meshiach, Tsvi Kuflik: PRAW - A PRivAcy model for the Web. JASIST 56(2): 159-172 (2005) |
2004 | ||
9 | EE | Yuval Elovici, Abraham Kandel, Mark Last, Bracha Shapira, Omer Zaafrany, Moti Schneider, Menahem Friedman: Terrorist Detection System. PKDD 2004: 540-542 |
8 | EE | Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes: A Structure Preserving Database Encryption Scheme. Secure Data Management 2004: 28-40 |
2003 | ||
7 | EE | Mark Last, Bracha Shapira, Yuval Elovici, Omer Zaafrany, Abraham Kandel: Content-Based Methodology for Anomaly Detection on the Web. AWIC 2003: 113-123 |
6 | EE | Tsvi Kuflik, Bracha Shapira, Yuval Elovici, Adlai Maschiach: Privacy Preservation Improvement by Learning Optimal Profile Generation Rate. User Modeling 2003: 168-177 |
5 | Yuval Elovici, Dan Braha: A decision-theoretic approach to data mining. IEEE Transactions on Systems, Man, and Cybernetics, Part A 33(1): 42-51 (2003) | |
4 | Yuval Elovici, Bracha Shapira, Paul B. Kantor: Using the Information Structure Model to Compare Profile-Based Information Filtering Systems. Inf. Retr. 6(1): 75-97 (2003) | |
2002 | ||
3 | EE | Yuval Elovici, Bracha Shapira, Adlai Maschiach: A New Privacy Model for Web Surfing. NGITS 2002: 45-57 |
2 | EE | Yuval Elovici, Bracha Shapira, Adlai Maschiach: A new privacy model for hiding group interests while accessing the Web. WPES 2002: 63-70 |
1993 | ||
1 | Helnye Azaria, Yuval Elovici: Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems. Parallel Computing 19(6): 633-649 (1993) |