Chanan Glezer

According to our database1, Chanan Glezer authored at least 32 papers between 1999 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



Security Ranking of IoT Devices Using an AHP Model.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

A Weighted Risk Score Model for IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
Comput. Secur., 2015

"Andromaly": a behavioral malware detection framework for android devices.
J. Intell. Inf. Syst., 2012

The Role of Knowledge Sharing in Raising the Task Innovativeness of Systems Analysts.
Int. J. Knowl. Manag., 2012

A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011

A comparative analysis of end-user training methods.
J. Syst. Inf. Technol., 2011

Personalized Cognitive Passwords: An Exploratory Assessment.
Inf. Manag. Comput. Secur., 2011

Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
J. Comput. Virol., 2010

Google Android: A Comprehensive Security Assessment.
IEEE Secur. Priv., 2010

A contingency model for estimating success of strategic information systems planning.
Inf. Manag., 2010

Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Rec., 2009

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Secur. Tech. Rep., 2009

Comparison of estimation methods of cost and duration in IT projects.
Inf. Softw. Technol., 2009

An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009

Automation of Facility Management Processes Using Machine-to-Machine Technologies.
Proceedings of the Internet of Things, First International Conference, 2008

Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007

M2MGen- An Application Generator for Machine to Machine (M2M) Applications.
Proceedings of the RFID Technology - Concepts, Applications, Challenges, Proceedings of the 1st International Workshop on RFID Technology, 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

User satisfaction from commercial web sites: The effect of design and use.
Inf. Manag., 2006

Enhancing customer privacy while searching for products and services on the world wide web.
Internet Res., 2005

Quality and comprehension of UML interaction diagrams-an experimental comparison.
Inf. Softw. Technol., 2005

Website and organisational characteristics of Israeli firms.
Int. J. Electron. Bus., 2005

A Reconfiguration Algorithm for Distributed Computer Networks.
Proceedings of the ICEIS 2004, 2004

A conceptual model of an interorganizational intelligent meeting-scheduler (IIMS).
J. Strateg. Inf. Syst., 2003

A conceptual model for increasing utilization of dependable computer networks.
Data Knowl. Eng., 2003

A Conceptual Model of an Intelligent Catalog Search System.
J. Organ. Comput. Electron. Commer., 2001

Towards Generating a Data Integrity Standard.
Data Knowl. Eng., 2000

The metaknowledge-based intelligent routing system (MIRS).
Data Knowl. Eng., 2000

A Conceptual Model of an Intelligent Meeting-Scheduler.
J. Organ. Comput. Electron. Commer., 1999

Top Management Toolbox for Managing Corporate IT.
Commun. ACM, 1999