2009 |
33 | EE | Robert Moskovitch,
Clint Feher,
Yuval Elovici:
A Chronological Evaluation of Unknown Malcode Detection.
PAISI 2009: 112-117 |
32 | EE | Shlomi Dolev,
Yuval Elovici,
Rami Puzis,
Polina Zilberman:
Incremental Deployment of Network Monitors Based on Group Betweenness Centrality
CoRR abs/0904.0352: (2009) |
2008 |
31 | EE | Boris Rozenberg,
Ehud Gudes,
Yuval Elovici:
A Distributed Framework for the Detection of New Worm-Related Malware.
EuroISI 2008: 179-190 |
30 | EE | Rami Puzis,
Marius David Klippel,
Yuval Elovici,
Shlomi Dolev:
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
EuroISI 2008: 191-203 |
29 | EE | Robert Moskovitch,
Clint Feher,
Nir Tzachar,
Eugene Berger,
Marina Gitelman,
Shlomi Dolev,
Yuval Elovici:
Unknown Malcode Detection Using OPCODE Representation.
EuroISI 2008: 204-215 |
28 | EE | Robert Moskovitch,
Dima Stopel,
Clint Feher,
Nir Nissim,
Yuval Elovici:
Unknown malcode detection via text categorization and the imbalance problem.
ISI 2008: 156-161 |
27 | EE | Robert Moskovitch,
Clint Feher,
Yuval Elovici:
Unknown malcode detection - A chronological evaluation.
ISI 2008: 267-268 |
26 | EE | Robert Moskovitch,
Yuval Elovici,
Lior Rokach:
Detection of unknown computer worms based on behavioral classification of the host.
Computational Statistics & Data Analysis 52(9): 4544-4566 (2008) |
2007 |
25 | EE | Robert Moskovitch,
Ido Gus,
Shay Pluderman,
Dima Stopel,
Clint Feher,
Chanan Glezer,
Yuval Shahar,
Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
CIDM 2007: 202-209 |
24 | EE | Robert Moskovitch,
Shay Pluderman,
Ido Gus,
Dima Stopel,
Clint Feher,
Yisrael Parmet,
Yuval Shahar,
Yuval Elovici:
Host Based Intrusion Detection using Machine Learning.
ISI 2007: 107-114 |
23 | EE | Robert Moskovitch,
Nir Nissim,
Yuval Elovici:
Malicious Code Detection and Acquisition Using Active Learning.
ISI 2007: 371 |
22 | EE | Rami Puzis,
Meytal Tubi,
Gil Tahan,
Yuval Elovici:
Simulating Threats Propagation within the NSP Infrastructure.
ISI 2007: 380 |
21 | EE | Meytal Tubi,
Rami Puzis,
Yuval Elovici:
Deployment of DNIDS in Social Networks.
ISI 2007: 59-65 |
20 | EE | Asaf Shabtai,
Maor Atlas,
Yuval Shahar,
Yuval Elovici:
Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain.
K-CAP 2007: 7-14 |
19 | EE | Yuval Elovici,
Asaf Shabtai,
Robert Moskovitch,
Gil Tahan,
Chanan Glezer:
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
KI 2007: 44-50 |
18 | EE | Robert Moskovitch,
Nir Nissim,
Dima Stopel,
Clint Feher,
Roman Englert,
Yuval Elovici:
Improving the Detection of Unknown Computer Worms Activity Using Active Learning.
KI 2007: 489-493 |
17 | EE | Rami Puzis,
Yuval Elovici,
Shlomi Dolev:
Finding the most prominent group in complex networks.
AI Commun. 20(4): 287-296 (2007) |
16 | EE | Dan Melamed,
Bracha Shapira,
Yuval Elovici:
MarCol: A Market-Based Recommender System.
IEEE Intelligent Systems 22(3): 74-78 (2007) |
2006 |
15 | EE | Dima Stopel,
Zvi Boger,
Robert Moskovitch,
Yuval Shahar,
Yuval Elovici:
Application of Artificial Neural Networks Techniques to Computer Worm Detection.
IJCNN 2006: 2362-2369 |
14 | EE | Asaf Shabtai,
Denis Klimov,
Yuval Shahar,
Yuval Elovici:
An intelligent, interactive tool for exploration and visualization of time-oriented security data.
VizSEC 2006: 15-22 |
13 | EE | Yuval Elovici,
Bracha Shapira,
Paul B. Kantor:
A decision theoretic approach to combining information filters: An analytical and empirical evaluation.
JASIST 57(3): 306-320 (2006) |
2005 |
12 | EE | Erez Shmueli,
Ronen Waisenberg,
Yuval Elovici,
Ehud Gudes:
Designing Secure Indexes for Encrypted Databases.
DBSec 2005: 54-68 |
11 | EE | Yuval Elovici,
Bracha Shapira,
Mark Last,
Omer Zaafrany,
Menahem Friedman,
Moti Schneider,
Abraham Kandel:
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).
ISI 2005: 244-255 |
10 | EE | Bracha Shapira,
Yuval Elovici,
Adlay Meshiach,
Tsvi Kuflik:
PRAW - A PRivAcy model for the Web.
JASIST 56(2): 159-172 (2005) |
2004 |
9 | EE | Yuval Elovici,
Abraham Kandel,
Mark Last,
Bracha Shapira,
Omer Zaafrany,
Moti Schneider,
Menahem Friedman:
Terrorist Detection System.
PKDD 2004: 540-542 |
8 | EE | Yuval Elovici,
Ronen Waisenberg,
Erez Shmueli,
Ehud Gudes:
A Structure Preserving Database Encryption Scheme.
Secure Data Management 2004: 28-40 |
2003 |
7 | EE | Mark Last,
Bracha Shapira,
Yuval Elovici,
Omer Zaafrany,
Abraham Kandel:
Content-Based Methodology for Anomaly Detection on the Web.
AWIC 2003: 113-123 |
6 | EE | Tsvi Kuflik,
Bracha Shapira,
Yuval Elovici,
Adlai Maschiach:
Privacy Preservation Improvement by Learning Optimal Profile Generation Rate.
User Modeling 2003: 168-177 |
5 | | Yuval Elovici,
Dan Braha:
A decision-theoretic approach to data mining.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 33(1): 42-51 (2003) |
4 | | Yuval Elovici,
Bracha Shapira,
Paul B. Kantor:
Using the Information Structure Model to Compare Profile-Based Information Filtering Systems.
Inf. Retr. 6(1): 75-97 (2003) |
2002 |
3 | EE | Yuval Elovici,
Bracha Shapira,
Adlai Maschiach:
A New Privacy Model for Web Surfing.
NGITS 2002: 45-57 |
2 | EE | Yuval Elovici,
Bracha Shapira,
Adlai Maschiach:
A new privacy model for hiding group interests while accessing the Web.
WPES 2002: 63-70 |
1993 |
1 | | Helnye Azaria,
Yuval Elovici:
Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems.
Parallel Computing 19(6): 633-649 (1993) |