Asaf Shabtai

According to our database1, Asaf Shabtai authored at least 103 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Vertical Ensemble Co-Training for Text Classification.
ACM TIST, 2018

Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis.
IEEE Intelligent Systems, 2018

Piping Botnet - Turning Green Technology into a Water Disaster.
CoRR, 2018

Generation of Automatic and Realistic Artificial Profiles.
CoRR, 2018

Anomaly detection; Industrial control systems; convolutional neural networks.
CoRR, 2018

Shattered Trust: When Replacement Smartphone Components Attack.
CoRR, 2018

Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution.
CoRR, 2018

N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders.
CoRR, 2018

Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018

Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs.
CoRR, 2018

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
CoRR, 2018

Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages.
Computers & Security, 2018

Taxonomy of mobile users' security awareness.
Computers & Security, 2018

Leaking data from enterprise networks using a compromised smartwatch device.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
Proceedings of the Computer Security, 2018

Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

11th International Workshop on Artificial Intelligence and Security (AISec 2018).
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks.
IEEE Trans. Mob. Comput., 2017

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Social Systems, 2017

Anomaly detection for smartphone data streams.
Pervasive and Mobile Computing, 2017

Dynamic radius and confidence prediction in grid-based location prediction algorithms.
Pervasive and Mobile Computing, 2017

Personal-discount sensitivity prediction for mobile coupon conversion optimization.
JASIST, 2017

Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem.
Neurocomputing, 2017

Using LSTM Encoder-Decoder Algorithm for Detecting Anomalous ADS-B Messages.
CoRR, 2017

Detection of Malicious and Low Throughput Data Exfiltration Over the DNS Protocol.
CoRR, 2017

Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017

Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.
CoRR, 2017

Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017

SIPHON: Towards Scalable High-Interaction Physical Honeypots.
CoRR, 2017

Classification of Smartphone Users Using Internet Traffic.
CoRR, 2017

Shattered Trust: When Replacement Smartphone Components Attack.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017

A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Advanced Security Testbed Framework for Wearable IoT Devices.
ACM Trans. Internet Techn., 2016

Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes.
IEEE Trans. Mob. Comput., 2016

Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016

Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
Security Informatics, 2016

Security Testbed for the Internet of Things.
CoRR, 2016

Anomaly Detection Using the Knowledge-based Temporal Abstraction Method.
CoRR, 2016

The Security of WebRTC.
CoRR, 2016

Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis.
Cognitive Computation, 2016

Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Neighbor Contamination to Achieve Complete Bottleneck Control.
Proceedings of the 19th ACM International Conference on Modeling, 2016

POSTER: Towards Exposing Internet of Things: A Roadmap.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Evaluation of Security Solutions for Android Systems.
CoRR, 2015

Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Up-High to Down-Low: Applying Machine Learning to an Exploit Database.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Towards Security of Native DRM Execution in HTML5.
Proceedings of the 2015 IEEE International Symposium on Multimedia, 2015

Noise Reduction of Mobile Sensors Data in the Prediction of Demographic Attributes.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

Sensor-Based Approach for Predicting Departure Time of Smartphone Users.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

Hunting Organization-Targeted Socialbots.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Leak Sinks: The Threat of Targeted Social Eavesdropping.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Adapted Features and Instance Selection for Improving Co-training.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage.
IEEE Trans. Knowl. Data Eng., 2014

TM-Score: A Misuseability Weight Measure for Textual Content.
IEEE Trans. Information Forensics and Security, 2014

ConfDTree: A Statistical Method for Improving Decision Trees.
J. Comput. Sci. Technol., 2014

Anti-Reconnaissance Tools: Detecting Targeted Socialbots.
IEEE Internet Computing, 2014

Dynamic Latent Expertise Mining in Social Networks.
IEEE Internet Computing, 2014

Mobile malware detection through analysis of deviations in application network behavior.
Computers & Security, 2014

ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

POSTER: Misuseablity Analysis for IT Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Optimizing Data Misuse Detection.
TKDD, 2013

Analyzing group E-mail exchange to detect data leakage.
JASIST, 2013

Content-based data leakage detection using extended fingerprinting
CoRR, 2013

Detecting malware through temporal function-based features.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

IP2User - Identifying the Username of an IP Address in Network-Related Events.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
A Survey of Data Leakage Detection and Prevention Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012

M-Score: A Misuseability Weight Measure.
IEEE Trans. Dependable Sec. Comput., 2012

Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Security Informatics, 2012

A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions.
J. Intell. Inf. Syst., 2012

"Andromaly": a behavioral malware detection framework for android devices.
J. Intell. Inf. Syst., 2012

ConfDTree: Improving Decision Trees Using Confidence Intervals.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

2011
F-Sign: Automatic, Function-Based Signature Generation for Malware.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2011

Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content.
Security and Communication Networks, 2011

Eliciting domain expert misuseability conceptions.
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011

Analyzing group communication for preventing data leakage via email.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Dynamic Sensitivity-Based Access Control.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

HoneyGen: An automated honeytokens generator.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.
Journal in Computer Virology, 2010

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method.
Journal of Systems and Software, 2010

Google Android: A Comprehensive Security Assessment.
IEEE Security & Privacy, 2010

Securing Android-Powered Mobile Devices Using SELinux.
IEEE Security & Privacy, 2010

Analyzing Group Communication for Preventing Accidental Data Leakage via Email.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

Applying Behavioral Detection on Android-Based Devices.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010

Google Android: An Updated Security Review.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Malware Detection on Mobile Devices.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Automated Static Code Analysis for Classifying Android Applications Using Machine Learning.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Sec. Techn. Report, 2009

Improving malware detection by applying multi-inducer ensemble.
Computational Statistics & Data Analysis, 2009

Google Android: A State-of-the-Art Review of Security Mechanisms
CoRR, 2009

Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

2007
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007

Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain.
Proceedings of the 4th International Conference on Knowledge Capture (K-CAP 2007), 2007

2006
An intelligent, interactive tool for exploration and visualization of time-oriented security data.
Proceedings of the 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 2006


  Loading...