Yair Meidan

Orcid: 0000-0003-4865-2334

According to our database1, Yair Meidan authored at least 19 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ImpReSS: Implicit Recommender System for Support Conversations.
CoRR, June, 2025

ProfiLLM: An LLM-Based Framework for Implicit Profiling of Chatbot Users.
CoRR, June, 2025

2024
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation.
CoRR, 2024

2023
CADeSH: Collaborative Anomaly Detection for Smart Homes.
IEEE Internet Things J., May, 2023

D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks.
Comput. Secur., March, 2023

2022
CADeSH Dataset: Collaborative Anomaly Detection for Smart Homes.
Dataset, April, 2022

2021
DeepStream: Autoencoder-based stream temporal clustering and anomaly detection.
Comput. Secur., 2021

DeepStream: autoencoder-based stream temporal clustering.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
Responses to AHP-style questionnaires regarding the publication "D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks".
Dataset, September, 2020

IoT-deNAT: Outbound flow-based network traffic data of IoT and non-IoT devices behind a home NAT.
Dataset, July, 2020

Botnet IND: About Botnets of Botless IoT Devices.
IACR Cryptol. ePrint Arch., 2020

A novel approach for detecting vulnerable IoT devices connected behind a home NAT.
Comput. Secur., 2020

2019
Security Testbed for Internet-of-Things Devices.
IEEE Trans. Reliab., 2019

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup.
CoRR, 2019

2018
detection_of_IoT_botnet_attacks_N_BaIoT.
Dataset, March, 2018

N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders.
IEEE Pervasive Comput., 2018

Piping Botnet - Turning Green Technology into a Water Disaster.
CoRR, 2018

2017
Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017


  Loading...