Yuval Elovici
Orcid: 0000-0002-9641-128XAffiliations:
- Telekom Innovation Laboratories at Ben-Gurion University of the Negev, Beer-Sheva, Israel
According to our database1,
Yuval Elovici
authored at least 465 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Mach. Learn., September, 2024
IEEE Trans. Neural Networks Learn. Syst., January, 2024
DOMBA: Double Model Balancing for Access-Controlled Language Models via Minimum-Bounded Aggregation.
CoRR, 2024
Visual Riddles: a Commonsense and World Knowledge Challenge for Large Vision and Language Models.
CoRR, 2024
CoRR, 2024
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI.
CoRR, 2024
CoRR, 2024
GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation.
CoRR, 2024
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring.
CoRR, 2024
CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants.
CoRR, 2024
CoRR, 2024
DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers.
CoRR, 2024
Comput. Secur., 2024
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
STFL: Utilizing a Semi-Supervised, Transfer-Learning, Federated-Learning Approach to Detect Phishing URL Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
IEEE Trans. Netw. Serv. Manag., December, 2023
IoT device identification based on network communication analysis using deep learning.
J. Ambient Intell. Humaniz. Comput., July, 2023
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics.
IEEE Trans. Mob. Comput., April, 2023
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions.
Sensors, 2023
IEEE Internet Things J., 2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
IACR Cryptol. ePrint Arch., 2023
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED.
IACR Cryptol. ePrint Arch., 2023
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems.
ACM Comput. Surv., 2023
CoRR, 2023
FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning.
CoRR, 2023
Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks.
CoRR, 2023
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response.
CoRR, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the International Database Engineered Applications Symposium Conference, 2023
Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
IEEE Trans. Image Process., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices.
Sensors, 2022
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream.
Sensors, 2022
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples.
Knowl. Based Syst., 2022
A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective.
J. Digit. Imaging, 2022
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version).
IEEE Internet Things J., 2022
Enhancing real-world adversarial patches through 3D modeling of complex target scenes.
Neurocomputing, 2022
IACR Cryptol. ePrint Arch., 2022
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.
ACM Comput. Surv., 2022
CoRR, 2022
CoRR, 2022
CoRR, 2022
AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus.
CoRR, 2022
CoRR, 2022
VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream.
CoRR, 2022
Comput. Secur., 2022
A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices.
Artif. Intell. Medicine, 2022
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings.
IEEE Access, 2022
Fair and accurate age prediction using distribution aware data curation and augmentation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter.
Proceedings of the UMAP '22: 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4, 2022
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
2021
Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks.
IEEE Trans. Neural Networks Learn. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples.
CoRR, 2021
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems.
CoRR, 2021
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants.
Proceedings of the International Joint Conference on Neural Networks, 2021
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Parallel Distributed Syst., 2020
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Aerosp. Electron. Syst., 2020
Sensors, 2020
Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
Neural Networks, 2020
J. Parallel Distributed Comput., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity.
CoRR, 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems.
CoRR, 2020
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions.
CoRR, 2020
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities.
CoRR, 2020
A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation.
CoRR, 2020
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization.
CoRR, 2020
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness.
CoRR, 2020
Comput. Secur., 2020
Comput. Secur., 2020
CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices.
IEEE Access, 2020
IEEE Access, 2020
OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis framework.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Adaptive Noise Injection for Training Stochastic Student Networks from Deterministic Teachers.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions.
Proceedings of the Artificial Intelligence in Medicine, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service.
EAI Endorsed Trans. Security Safety, 2019
Knowl. Based Syst., 2019
J. Netw. Comput. Appl., 2019
IEEE Internet Things J., 2019
ACM Comput. Surv., 2019
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
ACM Comput. Surv., 2019
Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks.
CoRR, 2019
CoRR, 2019
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR, 2019
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup.
CoRR, 2019
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version).
CoRR, 2019
SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps.
CoRR, 2019
CoRR, 2019
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud.
Comput. Secur., 2019
Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis.
Comput. Secur., 2019
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework.
IEEE Access, 2019
Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures.
IEEE Access, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning.
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
IEEE Trans. Inf. Forensics Secur., 2018
Soc. Netw. Anal. Min., 2018
IEEE Pervasive Comput., 2018
Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining.
Knowl. Based Syst., 2018
IEEE Internet Things J., 2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
IEEE Intell. Syst., 2018
Expert Syst. Appl., 2018
Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods.
Expert Syst. Appl., 2018
Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018
Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication.
CoRR, 2018
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
CoRR, 2018
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields.
CoRR, 2018
CoRR, 2018
Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study.
Proceedings of the 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the Critical Infrastructure Protection XII, 2018
Proceedings of the IEEE International Conference on Data Mining, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Proceedings of the Computer Security, 2018
MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the Database Systems for Advanced Applications, 2018
Proceedings of the Critical Information Infrastructures Security, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
ACM Trans. Intell. Syst. Technol., 2017
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack.
ACM Trans. Intell. Syst. Technol., 2017
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology.
IEEE Trans. Inf. Forensics Secur., 2017
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Secur. Comput., 2017
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Soc. Syst., 2017
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR).
CoRR, 2017
CoRR, 2017
Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.
CoRR, 2017
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED.
CoRR, 2017
Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing.
CoRR, 2017
Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods.
Artif. Intell. Medicine, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Symposium on Applied Computing, 2017
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 8th International Conference on the Network of the Future, 2017
Proceedings of the Critical Infrastructure Protection XI, 2017
Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk.
Proceedings of the 13th International Conference on Natural Computation, 2017
Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data.
Proceedings of the 13th International Conference on Natural Computation, 2017
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration').
Proceedings of the Computer Security - ESORICS 2017, 2017
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
ACM Trans. Internet Techn., 2016
ACM Trans. Inf. Syst. Secur., 2016
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
Secur. Informatics, 2016
ALDROID: efficient update of Android anti-virus software using designated active learning methods.
Knowl. Inf. Syst., 2016
Improving condition severity classification with an efficient active learning based framework.
J. Biomed. Informatics, 2016
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
Expert Syst. Appl., 2016
Enterp. Inf. Syst., 2016
CoRR, 2016
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise.
CoRR, 2016
CoRR, 2016
Comput. Secur., 2016
Guided socialbots: Infiltrating the social networks of specific organizations' employees.
AI Commun., 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Future Network Systems and Security - Second International Conference, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
2015
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population.
ACM Trans. Intell. Syst. Technol., 2015
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
Comput. Secur., 2015
J. Complex Networks, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015
pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Boosting the Detection of Malicious Documents Using Designated Active Learning Methods.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the Artificial Intelligence in Medicine, 2015
2014
IEEE Trans. Knowl. Data Eng., 2014
Soc. Netw. Anal. Min., 2014
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Sci. Eng. Ethics, 2014
Expert Syst. Appl., 2014
Comput. Secur., 2014
Mobile malware detection through analysis of deviations in application network behavior.
Comput. Secur., 2014
Limiting access to unintentionally leaked sensitive documents using malware signatures.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
ACM Trans. Intell. Syst. Technol., 2013
Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks.
J. Intell. Transp. Syst., 2013
J. Assoc. Inf. Sci. Technol., 2013
Inf. Sci., 2013
Inf. Sci., 2013
CoRR, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
Proceedings of the AISec'13, 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
Proceedings of the IEEE International Congress on Big Data, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012
IEEE Trans. Syst. Man Cybern. Part C, 2012
Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Secur. Informatics, 2012
Detecting unknown computer worm activity via support vector machines and active learning.
Pattern Anal. Appl., 2012
A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions.
J. Intell. Inf. Syst., 2012
J. Intell. Inf. Syst., 2012
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data.
Proceedings of the 2012 International Conference on Privacy, 2012
How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage.
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Active Media Technology - 8th International Conference, 2012
2011
IEEE Trans. Syst. Man Cybern. Part C, 2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content.
Secur. Commun. Networks, 2011
Inf. Manag. Comput. Secur., 2011
Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering.
Int. J. Found. Comput. Sci., 2011
IEEE Intell. Syst., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
J. Comput. Virol., 2010
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.
J. Comput. Virol., 2010
IEEE Trans. Knowl. Data Eng., 2010
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method.
J. Syst. Softw., 2010
Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS).
J. Assoc. Inf. Sci. Technol., 2010
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
2009
Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Rec., 2009
Online Inf. Rev., 2009
Neural Comput. Appl., 2009
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Secur. Tech. Rep., 2009
Inf. Process. Lett., 2009
Comput. Stat. Data Anal., 2009
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the Database Technologies: Concepts, 2009
2008
Comput. Stat. Data Anal., 2008
Proceedings of the Protecting Persons While Protecting the People, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the 11th International Conference on Information Fusion, 2008
Proceedings of the Intelligence and Security Informatics, 2008
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Intelligence and Security Informatics, 2008
2007
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007
Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain.
Proceedings of the 4th International Conference on Knowledge Capture (K-CAP 2007), 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007
2006
Online Inf. Rev., 2006
A decision theoretic approach to combining information filters: An analytical and empirical evaluation.
J. Assoc. Inf. Sci. Technol., 2006
An intelligent, interactive tool for exploration and visualization of time-oriented security data.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
Proceedings of the International Joint Conference on Neural Networks, 2006
2005
Proceedings of the Fighting Terror in Cyberspace, 2005
Enhancing customer privacy while searching for products and services on the world wide web.
Internet Res., 2005
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004
2003
IEEE Trans. Syst. Man Cybern. Part A, 2003
Using the Information Structure Model to Compare Profile-Based Information Filtering Systems.
Inf. Retr., 2003
Proceedings of the User Modeling 2003, 2003
Proceedings of the Web Intelligence, 2003
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
Proceedings of the Next Generation Information Technologies and Systems, 2002
2001
1993
Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems.
Parallel Comput., 1993
1992
Microprocess. Microprogramming, 1992