Rami Puzis

Orcid: 0000-0002-7229-3899

According to our database1, Rami Puzis authored at least 125 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Energy Sector Resilience: Integrating Security by Design Principles.
CoRR, 2024

2023
How Polynomial Regression Improves DeNATing.
IEEE Trans. Netw. Serv. Manag., December, 2023

DISCONA: distributed sample compression for nearest neighbor algorithm.
Appl. Intell., September, 2023

Centrality Learning: Auralization and Route Fitting.
Entropy, August, 2023

It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees.
IEEE Trans. Knowl. Data Eng., 2023

MABAT: A Multi-Armed Bandit Approach for Threat-Hunting.
IEEE Trans. Inf. Forensics Secur., 2023

Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph.
IEEE Trans. Dependable Secur. Comput., 2023

ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network.
CoRR, 2023

A Survey of MulVAL Extensions and Their Attack Scenarios Coverage.
IEEE Access, 2023

Link2speed: VANET speed assessment via link-state analysis.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Large-Scale Shill Bidder Detection in E-commerce.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023

Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment.
Proceedings of the Computer Security - ESORICS 2023, 2023

CDGeB: Cloud Data Geolocation Benchmark.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

2022
MulVAL Interaction Rules Mapped to MITRE ATT&CK.
Dataset, July, 2022

Attack DB OTX-XFORCE-VT.
Dataset, May, 2022

Contextual security awareness: A context-based approach for assessing the security awareness of users.
Knowl. Based Syst., 2022

Iterative query selection for opaque search engines with pseudo relevance feedback.
Expert Syst. Appl., 2022

Prioritizing vulnerability patches in large networks.
Expert Syst. Appl., 2022

How and when to stop the co-training process.
Expert Syst. Appl., 2022

Cross Version Defect Prediction with Class Dependency Embeddings.
CoRR, 2022

Detecting Clickbait in Online Social Media: You Won't Believe How We Did It.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

Can One Hear the Position of Nodes?
Proceedings of the Complex Networks and Their Applications XI, 2022

2021
Spillover Today? Predicting Traffic Overflows on Private Peering of Major Content Providers.
IEEE Trans. Netw. Serv. Manag., 2021

The interplay between vaccination and social distancing strategies affects COVID19 population-level outcomes.
PLoS Comput. Biol., 2021

How does that name sound? Name representation learning using accent-specific speech generation.
Knowl. Based Syst., 2021

Leadership Hijacking in Docker Swarm and Its Consequences.
Entropy, 2021

Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security in Cyber Space.
ACM Comput. Surv., 2021

Android malware detection via an app similarity graph.
Comput. Secur., 2021

Lawful Interception in WebRTC Peer-To-Peer Communication.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Learning Centrality by Learning to Route.
Proceedings of the Complex Networks & Their Applications X - Volume 1, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021

2020
PALE: Time Bounded Practical Agile Leader Election.
IEEE Trans. Parallel Distributed Syst., 2020

Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback.
CoRR, 2020

Cyberbiosecurity: DNA Injection Attack in Synthetic Biology.
CoRR, 2020

Predicting traffic overflows on private peering.
CoRR, 2020

How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning.
CoRR, 2020

ATHAFI: Agile Threat Hunting And Forensic Investigation.
CoRR, 2020

SoK: A Survey of Open Source Threat Emulators.
CoRR, 2020

Sequence Preserving Network Traffic Generation.
CoRR, 2020

The Chameleon Attack: Manipulating Content Display in Online Social Media.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

DANTE: A Framework for Mining and Monitoring Darknet Traffic.
Proceedings of the Computer Security - ESORICS 2020, 2020

Security Ranking of IoT Devices Using an AHP Model.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Evaluating the Information Security Awareness of Smartphone Users.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Target oriented network intelligence collection: effective exploration of social networks.
World Wide Web, 2019

Using malware for the greater good: Mitigating data leakage.
J. Netw. Comput. Appl., 2019

A Genetic Algorithm to Optimize Weighted Gene Co-Expression Network Analysis.
J. Comput. Biol., 2019

It Runs in the Family: Searching for Similar Names using Digitized Family Trees.
CoRR, 2019

Challenges for Security Assessment of Enterprises in the IoT Era.
CoRR, 2019

Deployment optimization of IoT devices through attack graph analysis.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

EEGNAS: Neural Architecture Search for Electroencephalography Data Analysis and Decoding.
Proceedings of the Human Brain and Artificial Intelligence - First International Workshop, 2019

Attack Hypothesis Generation.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

New Goal Recognition Algorithms Using Attack Graphs.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Incentives in Collaborative Applications.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Socialbots.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis.
IEEE Intell. Syst., 2018

EEG-triggered dynamic difficulty adjustment for multiplayer games.
Entertain. Comput., 2018

Generation of Automatic and Realistic Artificial Profiles.
CoRR, 2018

PALE: Partially Asynchronous Agile Leader Election.
CoRR, 2018

Taxonomy of mobile users' security awareness.
Comput. Secur., 2018

Focused SANA: Speeding Up Network Alignment.
Proceedings of the Eleventh International Symposium on Combinatorial Search, 2018

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Analysis of Attack Graph Representations for Ranking Vulnerability Fixes.
Proceedings of the GCAI-2018, 2018

ProfileGen: Generation of Automatic and Realistic Artificial Profiles.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Secur. Comput., 2017

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Soc. Syst., 2017

Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media.
CoRR, 2017

MindDesktop: a general purpose brain computer interface.
CoRR, 2017

Classification of Smartphone Users Using Internet Traffic.
CoRR, 2017

Shortest path tree sampling for landmark selection in large networks.
J. Complex Networks, 2017

DiscOF: Balanced flow discovery in OpenFlow.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

User Feedback Analysis for Mobile Malware Detection.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Application Marketplace Malware Detection by User Feedback Analysis.
Proceedings of the Information Systems Security and Privacy, 2017

The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Attack Graph Obfuscation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Scalable Attack Path Finding for Increased Security.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Measurement of Online Discussion Authenticity within Online Social Media.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Efficient online detection of temporal patterns.
PeerJ Comput. Sci., 2016

A particle swarm model for estimating reliability and scheduling system maintenance.
Enterp. Inf. Syst., 2016

Floware: Balanced Flow Monitoring in Software Defined Networks.
CoRR, 2016

Pinpoint Influential Posts and Authors.
CoRR, 2016

The Security of WebRTC.
CoRR, 2016

Modeling and Reconstruction of Multi-stage Attacks.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Comparative Network Analysis Using KronFit.
Proceedings of the Complex Networks VII, 2016

2015
Active Discovery of Hidden Profiles in Social Networks Using Malware.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Topology manipulations for speeding betweenness centrality computation.
J. Complex Networks, 2015

Solving the Snake in the Box Problem with Heuristic Search: First Results.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

Hunting Organization-Targeted Socialbots.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Leak Sinks: The Threat of Targeted Social Eavesdropping.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Anti-Reconnaissance Tools: Detecting Targeted Socialbots.
IEEE Internet Comput., 2014

Potential-based bounded-cost search and Anytime Non-Parametric A<sup>*</sup>.
Artif. Intell., 2014

Max is More than Min: Solving Maximization Problems with Heuristic Search.
Proceedings of the Seventh Annual Symposium on Combinatorial Search, 2014

Extended Framework for Target Oriented Network Intelligence Collection.
Proceedings of the Seventh Annual Symposium on Combinatorial Search, 2014

2013
Computationally efficient link prediction in a variety of social networks.
ACM Trans. Intell. Syst. Technol., 2013

Betweenness computation in the single graph representation of hypergraphs.
Soc. Networks, 2013

Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks.
J. Intell. Transp. Syst., 2013

Organization Mining Using Online Social Networks
CoRR, 2013

Predictive web automation assistant for people with vision impairments.
Proceedings of the 22nd International World Wide Web Conference, 2013

Bandit Algorithms for Social Network Queries.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

TONIC: Target Oriented Network Intelligence Collection for the Social Web.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

Volatile Multi-Armed Bandits for Guaranteed Targeted Social Crawling.
Proceedings of the Late-Breaking Developments in the Field of Artificial Intelligence, 2013

2012
Detecting Spammers via Aggregated Historical Data Set
CoRR, 2012

Heuristics for Speeding Up Betweenness Centrality Computation.
Proceedings of the 2012 International Conference on Privacy, 2012

Detecting Spammers via Aggregated Historical Data Set.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011

Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011

On-Line Detection and Prediction of Temporal Patterns.
Proceedings of the Hardware and Software: Verification and Testing, 2011

LoOkie - it feels like being there.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Potential Search: A Bounded-Cost Search Algorithm.
Proceedings of the 21st International Conference on Automated Planning and Scheduling, 2011

2010
Optimizing Targeting of Intrusion Detection Systems in Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Routing betweenness centrality.
J. ACM, 2010

Potential Search: A New Greedy Anytime Heuristic Search.
Proceedings of the Third Annual Symposium on Combinatorial Search, 2010

Nanotechnology Based Optical Solution for NP-Hard Problems.
Proceedings of the Optical Supercomputing - Third International Workshop, 2010

Cost Benefit Deployment of DNIPS.
Proceedings of IEEE International Conference on Communications, 2010

2009
Incremental deployment of network monitors based on Group Betweenness Centrality.
Inf. Process. Lett., 2009

Collaborative attack on Internet users' anonymity.
Internet Res., 2009

An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009

2008
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Finding the most prominent group in complex networks.
AI Commun., 2007

Deployment of DNIDS in Social Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Simulating Threats Propagation within the NSP Infrastructure.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007


  Loading...