Rami Puzis

According to our database1, Rami Puzis authored at least 83 papers between 2007 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
PALE: Time Bounded Practical Agile Leader Election.
IEEE Trans. Parallel Distrib. Syst., 2020

The Chameleon Attack: Manipulating Content Display in Online Social Media.
CoRR, 2020

2019
Target oriented network intelligence collection: effective exploration of social networks.
World Wide Web, 2019

Using malware for the greater good: Mitigating data leakage.
J. Netw. Comput. Appl., 2019

It Runs in the Family: Searching for Similar Names using Digitized Family Trees.
CoRR, 2019

Challenges for Security Assessment of Enterprises in the IoT Era.
CoRR, 2019

Evaluating the Information Security Awareness of Smartphone Users.
CoRR, 2019

Deployment optimization of IoT devices through attack graph analysis.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

EEGNAS: Neural Architecture Search for Electroencephalography Data Analysis and Decoding.
Proceedings of the Human Brain and Artificial Intelligence - First International Workshop, 2019

Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

New Goal Recognition Algorithms Using Attack Graphs.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Incentives in Collaborative Applications.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Socialbots.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis.
IEEE Intelligent Systems, 2018

EEG-triggered dynamic difficulty adjustment for multiplayer games.
Entertain. Comput., 2018

Generation of Automatic and Realistic Artificial Profiles.
CoRR, 2018

PALE: Partially Asynchronous Agile Leader Election.
CoRR, 2018

Taxonomy of mobile users' security awareness.
Comput. Secur., 2018

Focused SANA: Speeding Up Network Alignment.
Proceedings of the Eleventh International Symposium on Combinatorial Search, 2018

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Analysis of Attack Graph Representations for Ranking Vulnerability Fixes.
Proceedings of the GCAI-2018, 2018

ProfileGen: Generation of Automatic and Realistic Artificial Profiles.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Sec. Comput., 2017

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Social Systems, 2017

Detecting Clickbait in Online Social Media: You Won't Believe How We Did It.
CoRR, 2017

Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media.
CoRR, 2017

MindDesktop: a general purpose brain computer interface.
CoRR, 2017

Classification of Smartphone Users Using Internet Traffic.
CoRR, 2017

Shortest path tree sampling for landmark selection in large networks.
J. Complex Networks, 2017

DiscOF: Balanced flow discovery in OpenFlow.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

User Feedback Analysis for Mobile Malware Detection.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Application Marketplace Malware Detection by User Feedback Analysis.
Proceedings of the Information Systems Security and Privacy, 2017

The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Attack Graph Obfuscation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Scalable Attack Path Finding for Increased Security.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Measurement of Online Discussion Authenticity within Online Social Media.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Efficient online detection of temporal patterns.
PeerJ Computer Science, 2016

A particle swarm model for estimating reliability and scheduling system maintenance.
Enterprise IS, 2016

Floware: Balanced Flow Monitoring in Software Defined Networks.
CoRR, 2016

Pinpoint Influential Posts and Authors.
CoRR, 2016

The Security of WebRTC.
CoRR, 2016

Modeling and Reconstruction of Multi-stage Attacks.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Comparative Network Analysis Using KronFit.
Proceedings of the Complex Networks VII, 2016

2015
Active Discovery of Hidden Profiles in Social Networks Using Malware.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Topology manipulations for speeding betweenness centrality computation.
J. Complex Networks, 2015

Solving the Snake in the Box Problem with Heuristic Search: First Results.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

Hunting Organization-Targeted Socialbots.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Leak Sinks: The Threat of Targeted Social Eavesdropping.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Anti-Reconnaissance Tools: Detecting Targeted Socialbots.
IEEE Internet Computing, 2014

Potential-based bounded-cost search and Anytime Non-Parametric A*.
Artif. Intell., 2014

Max is More than Min: Solving Maximization Problems with Heuristic Search.
Proceedings of the Seventh Annual Symposium on Combinatorial Search, 2014

Extended Framework for Target Oriented Network Intelligence Collection.
Proceedings of the Seventh Annual Symposium on Combinatorial Search, 2014

2013
Computationally efficient link prediction in a variety of social networks.
ACM TIST, 2013

Betweenness computation in the single graph representation of hypergraphs.
Soc. Networks, 2013

Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks.
J. Intellig. Transport. Systems, 2013

Organization Mining Using Online Social Networks
CoRR, 2013

Predictive web automation assistant for people with vision impairments.
Proceedings of the 22nd International World Wide Web Conference, 2013

Bandit Algorithms for Social Network Queries.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

TONIC: Target Oriented Network Intelligence Collection for the Social Web.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

Volatile Multi-Armed Bandits for Guaranteed Targeted Social Crawling.
Proceedings of the Late-Breaking Developments in the Field of Artificial Intelligence, 2013

2012
Detecting Spammers via Aggregated Historical Data Set
CoRR, 2012

Heuristics for Speeding Up Betweenness Centrality Computation.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011

Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011

On-Line Detection and Prediction of Temporal Patterns.
Proceedings of the Hardware and Software: Verification and Testing, 2011

LoOkie - it feels like being there.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Potential Search: A Bounded-Cost Search Algorithm.
Proceedings of the 21st International Conference on Automated Planning and Scheduling, 2011

2010
Optimizing Targeting of Intrusion Detection Systems in Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Routing betweenness centrality.
J. ACM, 2010

Potential Search: A New Greedy Anytime Heuristic Search.
Proceedings of the Third Annual Symposium on Combinatorial Search, 2010

Nanotechnology Based Optical Solution for NP-Hard Problems.
Proceedings of the Optical Supercomputing - Third International Workshop, 2010

Cost Benefit Deployment of DNIPS.
Proceedings of IEEE International Conference on Communications, 2010

2009
Incremental deployment of network monitors based on Group Betweenness Centrality.
Inf. Process. Lett., 2009

Collaborative attack on Internet users' anonymity.
Internet Research, 2009

An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009

2008
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Finding the most prominent group in complex networks.
AI Commun., 2007

Deployment of DNIDS in Social Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Simulating Threats Propagation within the NSP Infrastructure.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007


  Loading...