2007 |
17 | EE | Ido Green,
Tzvi Raz,
Moshe Zviran:
Analysis of active intrusion prevention data for predicting hostile activity in computer networks.
Commun. ACM 50(4): 63-68 (2007) |
16 | EE | Aviv Segev,
Moshe Leshno,
Moshe Zviran:
Internet as a knowledge base for medical diagnostic assistance.
Expert Syst. Appl. 33(1): 251-255 (2007) |
15 | EE | Aviv Segev,
Moshe Leshno,
Moshe Zviran:
Context recognition using internet as a knowledge base.
J. Intell. Inf. Syst. 29(3): 305-327 (2007) |
2006 |
14 | EE | Moshe Zviran,
Dov Te'eni,
Yuval Gross:
Does color in email make a difference?
Commun. ACM 49(4): 94-99 (2006) |
2005 |
13 | EE | Moshe Zviran,
Chanan Glezer:
Website and organisational characteristics of Israeli firms.
IJEB 3(5): 411-426 (2005) |
2004 |
12 | | Chanan Glezer,
Moshe Zviran:
A Reconfiguration Algorithm for Distributed Computer Networks.
ICEIS (1) 2004: 491-494 |
11 | | Moshe Zviran,
Seev Neumann,
Diego Hocksman:
Privacy Concerns in Internet Applications.
ICEIS (3) 2004: 592-595 |
2003 |
10 | EE | Moshe Zviran,
Niv Ahituv,
Chanan Glezer:
A conceptual model for increasing utilization of dependable computer networks.
Data Knowl. Eng. 46(3): 247-269 (2003) |
2002 |
9 | EE | Moshe Zviran:
Securing PC applications: the relay race approach.
Commun. ACM 45(4): 219-227 (2002) |
2000 |
8 | EE | Moshe Zviran,
Chanan Glezer:
Towards Generating a Data Integrity Standard.
Data Knowl. Eng. 32(3): 291-313 (2000) |
1999 |
7 | EE | Niv Ahituv,
Moshe Zviran,
Chanan Glezer:
Top Management Toolbox for Managing Corporate IT.
Commun. ACM 42(4): 93-99 (1999) |
1993 |
6 | | Moshe Zviran,
William J. Haga:
A Comparison of Password Techniques for Multilevel Authentication Mechanisms.
Comput. J. 36(3): 227-237 (1993) |
5 | EE | Moshe Zviran:
A comprehensive methodology for computer family selection.
Journal of Systems and Software 22(1): 17-26 (1993) |
1991 |
4 | | William J. Haga,
Moshe Zviran:
Question-and-answer passwords: an empirical evaluation.
Inf. Syst. 16(3): 335-343 (1991) |
3 | EE | Magdi N. Kamel,
Moshe Zviran:
A methodology for integrating heterogeneous data bases in a hospital environment.
Journal of Systems and Software 15(3): 251-260 (1991) |
1990 |
2 | EE | Moshe Zviran,
James C. Hoge,
Val A. Micucci:
SPAN - a DSS for security plan analysis.
Computers & Security 9(2): 153-160 (1990) |
1 | EE | Moshe Zviran,
William J. Haga:
Cognitive passwords: The key to easy access control.
Computers & Security 9(8): 723-736 (1990) |