Rami Puzis

According to our database1, Rami Puzis authored at least 98 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
How does that name sound? Name representation learning using accent-specific speech generation.
Knowl. Based Syst., 2021

Leadership Hijacking in Docker Swarm and Its Consequences.
Entropy, 2021

Lawful Interception in WebRTC Peer-To-Peer Communication.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
PALE: Time Bounded Practical Agile Leader Election.
IEEE Trans. Parallel Distributed Syst., 2020

Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security in Cyber Space.
ACM Comput. Surv., 2020

Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback.
CoRR, 2020

Cyberbiosecurity: DNA Injection Attack in Synthetic Biology.
CoRR, 2020

Predicting traffic overflows on private peering.
CoRR, 2020

How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning.
CoRR, 2020

ATHAFI: Agile Threat Hunting And Forensic Investigation.
CoRR, 2020

SoK: A Survey of Open Source Threat Emulators.
CoRR, 2020

Sequence Preserving Network Traffic Generation.
CoRR, 2020

The Chameleon Attack: Manipulating Content Display in Online Social Media.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

DANTE: A Framework for Mining and Monitoring Darknet Traffic.
Proceedings of the Computer Security - ESORICS 2020, 2020

Security Ranking of IoT Devices Using an AHP Model.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Evaluating the Information Security Awareness of Smartphone Users.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Target oriented network intelligence collection: effective exploration of social networks.
World Wide Web, 2019

Using malware for the greater good: Mitigating data leakage.
J. Netw. Comput. Appl., 2019

A Genetic Algorithm to Optimize Weighted Gene Co-Expression Network Analysis.
J. Comput. Biol., 2019

It Runs in the Family: Searching for Similar Names using Digitized Family Trees.
CoRR, 2019

Challenges for Security Assessment of Enterprises in the IoT Era.
CoRR, 2019

Deployment optimization of IoT devices through attack graph analysis.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

EEGNAS: Neural Architecture Search for Electroencephalography Data Analysis and Decoding.
Proceedings of the Human Brain and Artificial Intelligence - First International Workshop, 2019

Attack Hypothesis Generation.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

New Goal Recognition Algorithms Using Attack Graphs.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Incentives in Collaborative Applications.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Socialbots.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis.
IEEE Intell. Syst., 2018

EEG-triggered dynamic difficulty adjustment for multiplayer games.
Entertain. Comput., 2018

Generation of Automatic and Realistic Artificial Profiles.
CoRR, 2018

PALE: Partially Asynchronous Agile Leader Election.
CoRR, 2018

Taxonomy of mobile users' security awareness.
Comput. Secur., 2018

Focused SANA: Speeding Up Network Alignment.
Proceedings of the Eleventh International Symposium on Combinatorial Search, 2018

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Analysis of Attack Graph Representations for Ranking Vulnerability Fixes.
Proceedings of the GCAI-2018, 2018

ProfileGen: Generation of Automatic and Realistic Artificial Profiles.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Secur. Comput., 2017

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Soc. Syst., 2017

Detecting Clickbait in Online Social Media: You Won't Believe How We Did It.
CoRR, 2017

Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media.
CoRR, 2017

MindDesktop: a general purpose brain computer interface.
CoRR, 2017

Classification of Smartphone Users Using Internet Traffic.
CoRR, 2017

Shortest path tree sampling for landmark selection in large networks.
J. Complex Networks, 2017

DiscOF: Balanced flow discovery in OpenFlow.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

User Feedback Analysis for Mobile Malware Detection.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Application Marketplace Malware Detection by User Feedback Analysis.
Proceedings of the Information Systems Security and Privacy, 2017

The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Attack Graph Obfuscation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Scalable Attack Path Finding for Increased Security.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Measurement of Online Discussion Authenticity within Online Social Media.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Efficient online detection of temporal patterns.
PeerJ Comput. Sci., 2016

A particle swarm model for estimating reliability and scheduling system maintenance.
Enterp. Inf. Syst., 2016

Floware: Balanced Flow Monitoring in Software Defined Networks.
CoRR, 2016

Pinpoint Influential Posts and Authors.
CoRR, 2016

The Security of WebRTC.
CoRR, 2016

Modeling and Reconstruction of Multi-stage Attacks.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Comparative Network Analysis Using KronFit.
Proceedings of the Complex Networks VII, 2016

2015
Active Discovery of Hidden Profiles in Social Networks Using Malware.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Topology manipulations for speeding betweenness centrality computation.
J. Complex Networks, 2015

Solving the Snake in the Box Problem with Heuristic Search: First Results.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

Hunting Organization-Targeted Socialbots.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Leak Sinks: The Threat of Targeted Social Eavesdropping.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Anti-Reconnaissance Tools: Detecting Targeted Socialbots.
IEEE Internet Comput., 2014

Potential-based bounded-cost search and Anytime Non-Parametric A<sup>*</sup>.
Artif. Intell., 2014

Max is More than Min: Solving Maximization Problems with Heuristic Search.
Proceedings of the Seventh Annual Symposium on Combinatorial Search, 2014

Extended Framework for Target Oriented Network Intelligence Collection.
Proceedings of the Seventh Annual Symposium on Combinatorial Search, 2014

2013
Computationally efficient link prediction in a variety of social networks.
ACM Trans. Intell. Syst. Technol., 2013

Betweenness computation in the single graph representation of hypergraphs.
Soc. Networks, 2013

Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks.
J. Intell. Transp. Syst., 2013

Organization Mining Using Online Social Networks
CoRR, 2013

Predictive web automation assistant for people with vision impairments.
Proceedings of the 22nd International World Wide Web Conference, 2013

Bandit Algorithms for Social Network Queries.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

TONIC: Target Oriented Network Intelligence Collection for the Social Web.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

Volatile Multi-Armed Bandits for Guaranteed Targeted Social Crawling.
Proceedings of the Late-Breaking Developments in the Field of Artificial Intelligence, 2013

2012
Detecting Spammers via Aggregated Historical Data Set
CoRR, 2012

Heuristics for Speeding Up Betweenness Centrality Computation.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011

Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011

On-Line Detection and Prediction of Temporal Patterns.
Proceedings of the Hardware and Software: Verification and Testing, 2011

LoOkie - it feels like being there.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Potential Search: A Bounded-Cost Search Algorithm.
Proceedings of the 21st International Conference on Automated Planning and Scheduling, 2011

2010
Optimizing Targeting of Intrusion Detection Systems in Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Routing betweenness centrality.
J. ACM, 2010

Potential Search: A New Greedy Anytime Heuristic Search.
Proceedings of the Third Annual Symposium on Combinatorial Search, 2010

Nanotechnology Based Optical Solution for NP-Hard Problems.
Proceedings of the Optical Supercomputing - Third International Workshop, 2010

Cost Benefit Deployment of DNIPS.
Proceedings of IEEE International Conference on Communications, 2010

2009
Incremental deployment of network monitors based on Group Betweenness Centrality.
Inf. Process. Lett., 2009

Collaborative attack on Internet users' anonymity.
Internet Res., 2009

An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009

2008
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Finding the most prominent group in complex networks.
AI Commun., 2007

Deployment of DNIDS in Social Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Simulating Threats Propagation within the NSP Infrastructure.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007


  Loading...