Chanan Glezer

According to our database1, Chanan Glezer authored at least 31 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Weighted Risk Score Model for IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

2015
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
Comput. Secur., 2015

2012
"Andromaly": a behavioral malware detection framework for android devices.
J. Intell. Inf. Syst., 2012

The Role of Knowledge Sharing in Raising the Task Innovativeness of Systems Analysts.
IJKM, 2012

2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011

A comparative analysis of end-user training methods.
J. Systems and IT, 2011

Personalized Cognitive Passwords: An Exploratory Assessment.
Inf. Manag. Comput. Security, 2011

2010
Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
Journal in Computer Virology, 2010

Google Android: A Comprehensive Security Assessment.
IEEE Security & Privacy, 2010

A contingency model for estimating success of strategic information systems planning.
Inf. Manag., 2010

2009
Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Record, 2009

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Sec. Techn. Report, 2009

Comparison of estimation methods of cost and duration in IT projects.
Inf. Softw. Technol., 2009

An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009

2008
Automation of Facility Management Processes Using Machine-to-Machine Technologies.
Proceedings of the Internet of Things, First International Conference, 2008

2007
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007

M2MGen- An Application Generator for Machine to Machine (M2M) Applications.
Proceedings of the RFID Technology - Concepts, Applications, Challenges, Proceedings of the 1st International Workshop on RFID Technology, 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
User satisfaction from commercial web sites: The effect of design and use.
Inf. Manag., 2006

2005
Enhancing customer privacy while searching for products and services on the world wide web.
Internet Research, 2005

Quality and comprehension of UML interaction diagrams-an experimental comparison.
Inf. Softw. Technol., 2005

Website and organisational characteristics of Israeli firms.
IJEB, 2005

2004
A Reconfiguration Algorithm for Distributed Computer Networks.
Proceedings of the ICEIS 2004, 2004

2003
A conceptual model of an interorganizational intelligent meeting-scheduler (IIMS).
J. Strateg. Inf. Syst., 2003

A conceptual model for increasing utilization of dependable computer networks.
Data Knowl. Eng., 2003

2001
A Conceptual Model of an Intelligent Catalog Search System.
J. Org. Computing and E. Commerce, 2001

2000
Towards Generating a Data Integrity Standard.
Data Knowl. Eng., 2000

The metaknowledge-based intelligent routing system (MIRS).
Data Knowl. Eng., 2000

1999
A Conceptual Model of an Intelligent Meeting-Scheduler.
J. Org. Computing and E. Commerce, 1999

Top Management Toolbox for Managing Corporate IT.
Commun. ACM, 1999


  Loading...