Yuval Elovici

According to our database1, Yuval Elovici authored at least 275 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Xerox Day Vulnerability.
IEEE Trans. Information Forensics and Security, 2019

2018
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback.
IEEE Trans. Information Forensics and Security, 2018

Generic anomalous vertices detection utilizing a link prediction algorithm.
Social Netw. Analys. Mining, 2018

Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining.
Knowl.-Based Syst., 2018

Introduction to the Special Issue on Data Mining for Cybersecurity.
IEEE Intelligent Systems, 2018

Quantifying the resilience of machine learning classifiers used for cyber security.
Expert Syst. Appl., 2018

Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods.
Expert Syst. Appl., 2018

DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN.
CoRR, 2018

Piping Botnet - Turning Green Technology into a Water Disaster.
CoRR, 2018

PIDS - A Behavioral Framework for Analysis and Detection of Network Printer Attacks.
CoRR, 2018

N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders.
CoRR, 2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018

Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines.
CoRR, 2018

CIoTA: Collaborative IoT Anomaly Detection via Blockchain.
CoRR, 2018

MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication.
CoRR, 2018

Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs.
CoRR, 2018

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
CoRR, 2018

ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
CoRR, 2018

MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields.
CoRR, 2018

Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices.
CoRR, 2018

PALE: Partially Asynchronous Agile Leader Election.
CoRR, 2018

Game of Drones - Detecting Streamed POI from Encrypted FPV Channel.
CoRR, 2018

Bridgeware: the air-gap malware.
Commun. ACM, 2018

Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study.
Proceedings of the 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems, 2018

Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn?
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Leaking data from enterprise networks using a compromised smartwatch device.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Ransomware prevention using application authentication-based file access control.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Mining Subgraphs from Propagation Networks through Temporal Dynamic Analysis.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
Proceedings of the Computer Security, 2018

Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs.
Proceedings of the Database Systems for Advanced Applications, 2018

2017
Cyber Security and the Role of Intelligent Systems in Addressing its Challenges.
ACM TIST, 2017

Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack.
ACM TIST, 2017

ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology.
IEEE Trans. Information Forensics and Security, 2017

On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Sec. Comput., 2017

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Social Systems, 2017

Anomaly detection for smartphone data streams.
Pervasive and Mobile Computing, 2017

aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR).
CoRR, 2017

Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017

Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing.
CoRR, 2017

Temporal Pattern Discovery for Accurate Sepsis Diagnosis in ICU Patients.
CoRR, 2017

Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.
CoRR, 2017

Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017

MindDesktop: a general purpose brain computer interface.
CoRR, 2017

Oops!...I think I scanned a malware.
CoRR, 2017

HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System.
CoRR, 2017

DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback.
CoRR, 2017

xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs.
CoRR, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED.
CoRR, 2017

SIPHON: Towards Scalable High-Interaction Physical Honeypots.
CoRR, 2017

Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing.
CoRR, 2017

Network Flow Watermarking: A Survey.
IEEE Communications Surveys and Tutorials, 2017

USB-based attacks.
Computers & Security, 2017

Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods.
Artificial Intelligence in Medicine, 2017

SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

dr0wned - Cyber-Physical Attack with Additive Manufacturing.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Scholarly Digital Libraries as a Platform for Malware Distribution.
Proceedings of the A Systems Approach to Cyber Security, 2017

Cyber security patrol: detecting fake and vulnerable wifi-enabled printers.
Proceedings of the Symposium on Applied Computing, 2017

Enhanced situation space mining for data streams.
Proceedings of the Symposium on Applied Computing, 2017

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017

On packet loss modeling: An empirical assessment.
Proceedings of the 8th International Conference on the Network of the Future, 2017

Evaluation of Additive and Subtractive Manufacturing from the Security Perspective.
Proceedings of the Critical Infrastructure Protection XI, 2017

Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk.
Proceedings of the 13th International Conference on Natural Computation, 2017

Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data.
Proceedings of the 13th International Conference on Natural Computation, 2017

A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

9-1-1 DDoS: Attacks, Analysis and Mitigation.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration').
Proceedings of the Computer Security - ESORICS 2017, 2017

LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

A Lightweight Vulnerability Mitigation Framework for IoT Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2017

How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Advanced Security Testbed Framework for Wearable IoT Devices.
ACM Trans. Internet Techn., 2016

Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016

Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
Security Informatics, 2016

ALDROID: efficient update of Android anti-virus software using designated active learning methods.
Knowl. Inf. Syst., 2016

Improving condition severity classification with an efficient active learning based framework.
Journal of Biomedical Informatics, 2016

XML-AD: Detecting anomalous patterns in XML documents.
Inf. Sci., 2016

Matching entities across online social networks.
Neurocomputing, 2016

SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
Expert Syst. Appl., 2016

A particle swarm model for estimating reliability and scheduling system maintenance.
Enterprise IS, 2016

Security Testbed for the Internet of Things.
CoRR, 2016

Virtual Breathalyzer.
CoRR, 2016

Handwritten Signature Verification Using Hand-Worn Devices.
CoRR, 2016

Unsupervised Anomalous Vertices Detection Utilizing Link Prediction Algorithms.
CoRR, 2016

Personal Information Leakage During Password Recovery of Internet Services.
CoRR, 2016

SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit.
CoRR, 2016

DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise.
CoRR, 2016

Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers.
CoRR, 2016

9-1-1 DDoS: Threat, Analysis and Mitigation.
CoRR, 2016

USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB.
CoRR, 2016

VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap.
CoRR, 2016

dr0wned - Cyber-Physical Attack with Additive Manufacturing.
CoRR, 2016

A model of the information security investment decision-making process.
Computers & Security, 2016

Guided socialbots: Infiltrating the social networks of specific organizations' employees.
AI Commun., 2016

USBee: Air-gap covert-channel via electromagnetic emission from USB.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

An optical covert-channel to leak data through an air-gap.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

Personal Information Leakage During Password Recovery of Internet Services.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

POSTER: Towards Exposing Internet of Things: A Roadmap.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Active Discovery of Hidden Profiles in Social Networks Using Malware.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population.
ACM TIST, 2015

Evaluation of Security Solutions for Android Systems.
CoRR, 2015

JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface.
CoRR, 2015

BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations.
CoRR, 2015

Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
Computers & Security, 2015

Topology manipulations for speeding betweenness centrality computation.
J. Complex Networks, 2015

GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.
Proceedings of the 24th USENIX Security Symposium, 2015

JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Boosting the Detection of Malicious Documents Using Designated Active Learning Methods.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

An Active Learning Framework for Efficient Condition Severity Classification.
Proceedings of the Artificial Intelligence in Medicine, 2015

2014
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage.
IEEE Trans. Knowl. Data Eng., 2014

Friend or foe? Fake profile identification in online social networks.
Social Netw. Analys. Mining, 2014

Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Science and Engineering Ethics, 2014

CoBAn: A context based model for data leakage prevention.
Inf. Sci., 2014

Novel active learning methods for enhanced PC malware detection in windows OS.
Expert Syst. Appl., 2014

Matching Entities Across Online Social Networks.
CoRR, 2014

AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies.
CoRR, 2014

Quantitative Analysis of Genealogy Using Digitised Family Trees.
CoRR, 2014

Reaction to New Security Threat Class.
CoRR, 2014

Online Social Networks: Threats and Solutions.
IEEE Communications Surveys and Tutorials, 2014

Implementing a database encryption solution, design and implementation issues.
Computers & Security, 2014

Mobile malware detection through analysis of deviations in application network behavior.
Computers & Security, 2014

Limiting access to unintentionally leaked sensitive documents using malware signatures.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

POSTER: Misuseablity Analysis for IT Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

OSPF vulnerability to persistent poisoning attacks: a systematic analysis.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Optimizing Data Misuse Detection.
TKDD, 2013

Computationally efficient link prediction in a variety of social networks.
ACM TIST, 2013

Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks.
J. Intellig. Transport. Systems, 2013

Analyzing group E-mail exchange to detect data leakage.
JASIST, 2013

The CASH algorithm-cost-sensitive attribute selection using histograms.
Inf. Sci., 2013

Guest editorial: Special issue on data mining for information security.
Inf. Sci., 2013

Online Social Networks: Threats and Solutions Survey
CoRR, 2013

Friend or Foe? Fake Profile Identification in Online Social Networks
CoRR, 2013

Organization Mining Using Online Social Networks
CoRR, 2013

ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks.
CoRR, 2013

Facebook Applications' Installation and Removal: A Temporal Analysis.
CoRR, 2013

Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population.
CoRR, 2013

Ethical Considerations when Employing Fake Identities in OSN for Research.
CoRR, 2013

Entity Matching in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Detecting Anomalous Behaviors Using Structural Properties of Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Trade-Offs in Social and Behavioral Modeling in Mobile Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Noninvasive detection of anti-forensic malware.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Nesto - Network selection and traffic offloading system for android mobile devices.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Analyzing users' web surfing patterns to trace terrorists and criminals.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Combining one-class classifiers via meta learning.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

ACTIDS: an active strategy for detecting and localizing network attacks.
Proceedings of the AISec'13, 2013

A fast and scalable method for threat detection in large-scale DNS logs.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

IP2User - Identifying the Username of an IP Address in Network-Related Events.
Proceedings of the IEEE International Congress on Big Data, 2013

Homing socialbots: intrusion on a specific organization's employee using Socialbots.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
A Survey of Data Leakage Detection and Prevention Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012

User Authentication Based on Representative Users.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

M-Score: A Misuseability Weight Measure.
IEEE Trans. Dependable Sec. Comput., 2012

Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Security Informatics, 2012

Detecting unknown computer worm activity via support vector machines and active learning.
Pattern Anal. Appl., 2012

A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions.
J. Intell. Inf. Syst., 2012

"Andromaly": a behavioral malware detection framework for android devices.
J. Intell. Inf. Syst., 2012

User identity verification via mouse dynamics.
Inf. Sci., 2012

Securing Your Transactions: Detecting Anomalous Patterns In XML Documents
CoRR, 2012

Detection of Deviations in Mobile Applications Network Behavior
CoRR, 2012

Organizational Intrusion: Organization Mining Using Socialbots.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Heuristics for Speeding Up Betweenness Centrality Computation.
Proceedings of the 2012 International Conference on Privacy, 2012

Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data.
Proceedings of the 2012 International Conference on Privacy, 2012

How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage.
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012

Detecting Spammers via Aggregated Historical Data Set.
Proceedings of the Network and System Security - 6th International Conference, 2012

Network-based intrusion detection systems go active!
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Predicting Student Exam's Scores by Analyzing Social Network Data.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2011
F-Sign: Automatic, Function-Based Signature Generation for Malware.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2011

A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011

Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content.
Security and Communication Networks, 2011

Optimizing Investment Decisions in Selecting Information Security Remedies.
Inf. Manag. Comput. Security, 2011

Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering.
Int. J. Found. Comput. Sci., 2011

Stealing Reality: When Criminals Become Data Scientists (or Vice Versa).
IEEE Intelligent Systems, 2011

Combining One-Class Classifiers via Meta-Learning
CoRR, 2011

Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data
CoRR, 2011

A Method for Detecting Unknown Malicious Executables.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Eliciting domain expert misuseability conceptions.
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011

Analyzing group communication for preventing data leakage via email.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Dynamic Sensitivity-Based Access Control.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

HoneyGen: An automated honeytokens generator.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011

LoOkie - it feels like being there.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Optimizing Targeting of Intrusion Detection Systems in Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
Journal in Computer Virology, 2010

Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.
Journal in Computer Virology, 2010

Efficient Multidimensional Suppression for K-Anonymity.
IEEE Trans. Knowl. Data Eng., 2010

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method.
Journal of Systems and Software, 2010

Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS).
JASIST, 2010

Routing betweenness centrality.
J. ACM, 2010

Google Android: A Comprehensive Security Assessment.
IEEE Security & Privacy, 2010

Securing Android-Powered Mobile Devices Using SELinux.
IEEE Security & Privacy, 2010

Stealing Reality
CoRR, 2010

Efficient Collaborative Application Monitoring Scheme for Mobile Networks
CoRR, 2010

Applying Behavioral Detection on Android-Based Devices.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010

Cost-Sensitive Detection of Malicious Applications in Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Google Android: An Updated Security Review.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Cost Benefit Deployment of DNIPS.
Proceedings of IEEE International Conference on Communications, 2010

Continuous Verification Using Keystroke Dynamics.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Automated Static Code Analysis for Classifying Android Applications Using Machine Learning.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Rendezvous tunnel for anonymous publishing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Unknown malcode detection and the imbalance problem.
Journal in Computer Virology, 2009

Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Record, 2009

A decision theoretic approach to combining information filtering.
Online Information Review, 2009

Using artificial neural networks to detect unknown computer worms.
Neural Computing and Applications, 2009

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Sec. Techn. Report, 2009

Troika - An improved stacking schema for classification tasks.
Inf. Sci., 2009

Incremental deployment of network monitors based on Group Betweenness Centrality.
Inf. Process. Lett., 2009

Collaborative attack on Internet users' anonymity.
Internet Research, 2009

Improving malware detection by applying multi-inducer ensemble.
Computational Statistics & Data Analysis, 2009

Google Android: A State-of-the-Art Review of Security Mechanisms
CoRR, 2009

Incremental Deployment of Network Monitors Based on Group Betweenness Centrality
CoRR, 2009

Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Method for Detecting Unknown Malicious Executables.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Trawling Traffic under Attack, Overcoming DDoS Attacks by Target-Controlled Traffic Filtering.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

A Chronological Evaluation of Unknown Malcode Detection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009

SISR - A New Model for Epidemic Spreading of Electronic Threats.
Proceedings of the Information Security, 12th International Conference, 2009

Identity theft, computers and behavioral biometrics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

An Overview of IDS Using Anomaly Detection.
Proceedings of the Database Technologies: Concepts, 2009

2008
Detection of unknown computer worms based on behavioral classification of the host.
Computational Statistics & Data Analysis, 2008

Malicious Code Detection Using Active Learning.
Proceedings of the Privacy, 2008

kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity.
Proceedings of the Protecting Persons While Protecting the People, 2008

Unknown malcode detection via text categorization and the imbalance problem.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Unknown malcode detection - A chronological evaluation.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Active learning to improve the detection of unknown computer worms activity.
Proceedings of the 11th International Conference on Information Fusion, 2008

A Distributed Framework for the Detection of New Worm-Related Malware.
Proceedings of the Intelligence and Security Informatics, 2008

Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008

Unknown Malcode Detection Using OPCODE Representation.
Proceedings of the Intelligence and Security Informatics, 2008

2007
MarCol: A Market-Based Recommender System.
IEEE Intelligent Systems, 2007

Finding the most prominent group in complex networks.
AI Commun., 2007

Improving the Detection of Unknown Computer Worms Activity Using Active Learning.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007

Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007

Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain.
Proceedings of the 4th International Conference on Knowledge Capture (K-CAP 2007), 2007

Deployment of DNIDS in Social Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Simulating Threats Propagation within the NSP Infrastructure.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Host Based Intrusion Detection using Machine Learning.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Malicious Code Detection and Acquisition Using Active Learning.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
Cluster-analysis attack against a PRivAte Web solution (PRAW).
Online Information Review, 2006

A decision theoretic approach to combining information filters: An analytical and empirical evaluation.
JASIST, 2006

An intelligent, interactive tool for exploration and visualization of time-oriented security data.
Proceedings of the 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 2006

Application of Artificial Neural Networks Techniques to Computer Worm Detection.
Proceedings of the International Joint Conference on Neural Networks, 2006

2005
TDS - An Innovative Terrorist Detection System.
Proceedings of the Fighting Terror in Cyberspace, 2005

PRAW - A PRivAcy model for the Web.
JASIST, 2005

Enhancing customer privacy while searching for products and services on the world wide web.
Internet Research, 2005

Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).
Proceedings of the Intelligence and Security Informatics, 2005

Designing Secure Indexes for Encrypted Databases.
Proceedings of the Data and Applications Security XIX, 2005

2004
A Structure Preserving Database Encryption Scheme.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Terrorist Detection System.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

2003
A decision-theoretic approach to data mining.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2003

Using the Information Structure Model to Compare Profile-Based Information Filtering Systems.
Inf. Retr., 2003

Privacy Preservation Improvement by Learning Optimal Profile Generation Rate.
Proceedings of the User Modeling 2003, 2003

Content-Based Methodology for Anomaly Detection on the Web.
Proceedings of the Web Intelligence, 2003

2002
A new privacy model for hiding group interests while accessing the Web.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

A New Privacy Model for Web Surfing.
Proceedings of the Next Generation Information Technologies and Systems, 2002

1993
Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems.
Parallel Computing, 1993


  Loading...