Yuval Elovici
According to our database1,
Yuval Elovici
authored at least 309 papers
between 1993 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepages:
On csauthors.net:
Bibliography
2019
Security Testbed for Internet-of-Things Devices.
IEEE Trans. Reliability, 2019
Xerox Day Vulnerability.
IEEE Trans. Information Forensics and Security, 2019
Digital Audio Signature for 3D Printing Integrity.
IEEE Trans. Information Forensics and Security, 2019
Improving the effectiveness of intrusion detection systems for hierarchical data.
Knowl.-Based Syst., 2019
Using malware for the greater good: Mitigating data leakage.
J. Network and Computer Applications, 2019
Dynamic Malware Analysis in the Modern Era - A State of the Art Survey.
ACM Comput. Surv., 2019
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
ACM Comput. Surv., 2019
The Security of IP-based Video Surveillance Systems.
CoRR, 2019
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain.
CoRR, 2019
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs.
CoRR, 2019
Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn.
CoRR, 2019
TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs.
CoRR, 2019
Heuristic Approach Towards Countermeasure Selection using Attack Graphs.
CoRR, 2019
Challenges for Security Assessment of Enterprises in the IoT Era.
CoRR, 2019
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks.
CoRR, 2019
MobilBye: Attacking ADAS with Camera Spoofing.
CoRR, 2019
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup.
CoRR, 2019
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics.
CoRR, 2019
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version).
CoRR, 2019
SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps.
CoRR, 2019
Defense Methods Against Adversarial Examples for Recurrent Neural Networks.
CoRR, 2019
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning.
CoRR, 2019
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud.
Computers & Security, 2019
Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis.
Computers & Security, 2019
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework.
IEEE Access, 2019
Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures.
IEEE Access, 2019
PIT: A Probe Into Internet of Things by Comprehensive Security Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A Weighted Risk Score Model for IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Drones' Cryptanalysis - Smashing Cryptography with a Flicker.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning.
Proceedings of the International Joint Conference on Neural Networks, 2019
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Design Procedure of Knowledge Base for Practical Attack Graph Generation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Security Analysis of Radar Systems.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Incentives in Collaborative Applications.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
Generic anomalous vertices detection utilizing a link prediction algorithm.
Social Netw. Analys. Mining, 2018
N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders.
IEEE Pervasive Computing, 2018
Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining.
Knowl.-Based Syst., 2018
Reverse Engineering IoT Devices: Effective Techniques and Methods.
IEEE Internet of Things Journal, 2018
Handwritten Signature Verification Using Wrist-Worn Devices.
IMWUT, 2018
Introduction to the Special Issue on Data Mining for Cybersecurity.
IEEE Intelligent Systems, 2018
Quantifying the resilience of machine learning classifiers used for cyber security.
Expert Syst. Appl., 2018
Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods.
Expert Syst. Appl., 2018
Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces.
CoRR, 2018
DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN.
CoRR, 2018
Piping Botnet - Turning Green Technology into a Water Disaster.
CoRR, 2018
PIDS - A Behavioral Framework for Analysis and Detection of Network Printer Attacks.
CoRR, 2018
Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018
Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines.
CoRR, 2018
CIoTA: Collaborative IoT Anomaly Detection via Blockchain.
CoRR, 2018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication.
CoRR, 2018
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs.
CoRR, 2018
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
CoRR, 2018
ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
CoRR, 2018
MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields.
CoRR, 2018
Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices.
CoRR, 2018
PALE: Partially Asynchronous Agile Leader Election.
CoRR, 2018
Game of Drones - Detecting Streamed POI from Encrypted FPV Channel.
CoRR, 2018
Bridgeware: the air-gap malware.
Commun. ACM, 2018
Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study.
Proceedings of the 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems, 2018
Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn?
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2018
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Leaking data from enterprise networks using a compromised smartwatch device.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Ransomware prevention using application authentication-based file access control.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Mining Subgraphs from Propagation Networks through Temporal Dynamic Analysis.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018
Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Liability Exposure when 3D-Printed Parts Fall from the Sky.
Proceedings of the Critical Infrastructure Protection XII, 2018
On the Security of MIL-STD-1553 Communication Bus.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
Proceedings of the Computer Security, 2018
MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs.
Proceedings of the Database Systems for Advanced Applications, 2018
SMuF: State Machine Based Mutational Fuzzing Framework for Internet of Things.
Proceedings of the Critical Information Infrastructures Security, 2018
Session details: AI for Forensics.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
11th International Workshop on Artificial Intelligence and Security (AISec 2018).
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Cyber Security and the Role of Intelligent Systems in Addressing its Challenges.
ACM TIST, 2017
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack.
ACM TIST, 2017
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology.
IEEE Trans. Information Forensics and Security, 2017
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Sec. Comput., 2017
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Social Systems, 2017
Anomaly detection for smartphone data streams.
Pervasive and Mobile Computing, 2017
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR).
CoRR, 2017
Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017
Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing.
CoRR, 2017
Temporal Pattern Discovery for Accurate Sepsis Diagnosis in ICU Patients.
CoRR, 2017
Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.
CoRR, 2017
Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017
MindDesktop: a general purpose brain computer interface.
CoRR, 2017
Oops!...I think I scanned a malware.
CoRR, 2017
HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System.
CoRR, 2017
DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback.
CoRR, 2017
xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs.
CoRR, 2017
LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED.
CoRR, 2017
SIPHON: Towards Scalable High-Interaction Physical Honeypots.
CoRR, 2017
Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing.
CoRR, 2017
Network Flow Watermarking: A Survey.
IEEE Communications Surveys and Tutorials, 2017
USB-based attacks.
Computers & Security, 2017
Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods.
Artificial Intelligence in Medicine, 2017
dr0wned - Cyber-Physical Attack with Additive Manufacturing.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Scholarly Digital Libraries as a Platform for Malware Distribution.
Proceedings of the A Systems Approach to Cyber Security, 2017
Cyber security patrol: detecting fake and vulnerable wifi-enabled printers.
Proceedings of the Symposium on Applied Computing, 2017
Enhanced situation space mining for data streams.
Proceedings of the Symposium on Applied Computing, 2017
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017
On packet loss modeling: An empirical assessment.
Proceedings of the 8th International Conference on the Network of the Future, 2017
Evaluation of Additive and Subtractive Manufacturing from the Security Perspective.
Proceedings of the Critical Infrastructure Protection XI, 2017
Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk.
Proceedings of the 13th International Conference on Natural Computation, 2017
Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data.
Proceedings of the 13th International Conference on Natural Computation, 2017
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
9-1-1 DDoS: Attacks, Analysis and Mitigation.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration').
Proceedings of the Computer Security - ESORICS 2017, 2017
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017
A Lightweight Vulnerability Mitigation Framework for IoT Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2017
How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Advanced Security Testbed Framework for Wearable IoT Devices.
ACM Trans. Internet Techn., 2016
Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
Security Informatics, 2016
ALDROID: efficient update of Android anti-virus software using designated active learning methods.
Knowl. Inf. Syst., 2016
Improving condition severity classification with an efficient active learning based framework.
Journal of Biomedical Informatics, 2016
XML-AD: Detecting anomalous patterns in XML documents.
Inf. Sci., 2016
Matching entities across online social networks.
Neurocomputing, 2016
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
Expert Syst. Appl., 2016
A particle swarm model for estimating reliability and scheduling system maintenance.
Enterprise IS, 2016
Security Testbed for the Internet of Things.
CoRR, 2016
Virtual Breathalyzer.
CoRR, 2016
Handwritten Signature Verification Using Hand-Worn Devices.
CoRR, 2016
Unsupervised Anomalous Vertices Detection Utilizing Link Prediction Algorithms.
CoRR, 2016
Personal Information Leakage During Password Recovery of Internet Services.
CoRR, 2016
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit.
CoRR, 2016
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise.
CoRR, 2016
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers.
CoRR, 2016
9-1-1 DDoS: Threat, Analysis and Mitigation.
CoRR, 2016
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB.
CoRR, 2016
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap.
CoRR, 2016
dr0wned - Cyber-Physical Attack with Additive Manufacturing.
CoRR, 2016
A model of the information security investment decision-making process.
Computers & Security, 2016
Guided socialbots: Infiltrating the social networks of specific organizations' employees.
AI Commun., 2016
An optical covert-channel to leak data through an air-gap.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016
POSTER: Towards Exposing Internet of Things: A Roadmap.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
2015
Active Discovery of Hidden Profiles in Social Networks Using Malware.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population.
ACM TIST, 2015
Evaluation of Security Solutions for Android Systems.
CoRR, 2015
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface.
CoRR, 2015
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations.
CoRR, 2015
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
Computers & Security, 2015
Topology manipulations for speeding betweenness centrality computation.
J. Complex Networks, 2015
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.
Proceedings of the 24th USENIX Security Symposium, 2015
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015
pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Boosting the Detection of Malicious Documents Using Designated Active Learning Methods.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
An Active Learning Framework for Efficient Condition Severity Classification.
Proceedings of the Artificial Intelligence in Medicine, 2015
2014
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage.
IEEE Trans. Knowl. Data Eng., 2014
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Science and Engineering Ethics, 2014
CoBAn: A context based model for data leakage prevention.
Inf. Sci., 2014
Novel active learning methods for enhanced PC malware detection in windows OS.
Expert Syst. Appl., 2014
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies.
CoRR, 2014
Quantitative Analysis of Genealogy Using Digitised Family Trees.
CoRR, 2014
Reaction to New Security Threat Class.
CoRR, 2014
Online Social Networks: Threats and Solutions.
IEEE Communications Surveys and Tutorials, 2014
Implementing a database encryption solution, design and implementation issues.
Computers & Security, 2014
Mobile malware detection through analysis of deviations in application network behavior.
Computers & Security, 2014
Limiting access to unintentionally leaked sensitive documents using malware signatures.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Peers-Based Location of Mobile Devices.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
POSTER: Misuseablity Analysis for IT Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
OSPF vulnerability to persistent poisoning attacks: a systematic analysis.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Optimizing Data Misuse Detection.
TKDD, 2013
Computationally efficient link prediction in a variety of social networks.
ACM TIST, 2013
Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks.
J. Intellig. Transport. Systems, 2013
Analyzing group E-mail exchange to detect data leakage.
JASIST, 2013
The CASH algorithm-cost-sensitive attribute selection using histograms.
Inf. Sci., 2013
Guest editorial: Special issue on data mining for information security.
Inf. Sci., 2013
Online Social Networks: Threats and Solutions Survey
CoRR, 2013
Friend or Foe? Fake Profile Identification in Online Social Networks
CoRR, 2013
Organization Mining Using Online Social Networks
CoRR, 2013
ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks.
CoRR, 2013
Facebook Applications' Installation and Removal: A Temporal Analysis.
CoRR, 2013
Ethical Considerations when Employing Fake Identities in OSN for Research.
CoRR, 2013
Entity Matching in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
Detecting Anomalous Behaviors Using Structural Properties of Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
Trade-Offs in Social and Behavioral Modeling in Mobile Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
Noninvasive detection of anti-forensic malware.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013
Nesto - Network selection and traffic offloading system for android mobile devices.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Analyzing users' web surfing patterns to trace terrorists and criminals.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
ACTIDS: an active strategy for detecting and localizing network attacks.
Proceedings of the AISec'13, 2013
A fast and scalable method for threat detection in large-scale DNS logs.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013
IP2User - Identifying the Username of an IP Address in Network-Related Events.
Proceedings of the IEEE International Congress on Big Data, 2013
Homing socialbots: intrusion on a specific organization's employee using Socialbots.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
A Survey of Data Leakage Detection and Prevention Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012
User Authentication Based on Representative Users.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012
M-Score: A Misuseability Weight Measure.
IEEE Trans. Dependable Sec. Comput., 2012
Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Security Informatics, 2012
Detecting unknown computer worm activity via support vector machines and active learning.
Pattern Anal. Appl., 2012
A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions.
J. Intell. Inf. Syst., 2012
"Andromaly": a behavioral malware detection framework for android devices.
J. Intell. Inf. Syst., 2012
User identity verification via mouse dynamics.
Inf. Sci., 2012
Securing Your Transactions: Detecting Anomalous Patterns In XML Documents
CoRR, 2012
Detection of Deviations in Mobile Applications Network Behavior
CoRR, 2012
Organizational Intrusion: Organization Mining Using Socialbots.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012
Heuristics for Speeding Up Betweenness Centrality Computation.
Proceedings of the 2012 International Conference on Privacy, 2012
How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage.
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012
Detecting Spammers via Aggregated Historical Data Set.
Proceedings of the Network and System Security - 6th International Conference, 2012
Network-based intrusion detection systems go active!
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Predicting Student Exam's Scores by Analyzing Social Network Data.
Proceedings of the Active Media Technology - 8th International Conference, 2012
2011
F-Sign: Automatic, Function-Based Signature Generation for Malware.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content.
Security and Communication Networks, 2011
Optimizing Investment Decisions in Selecting Information Security Remedies.
Inf. Manag. Comput. Security, 2011
Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering.
Int. J. Found. Comput. Sci., 2011
Stealing Reality: When Criminals Become Data Scientists (or Vice Versa).
IEEE Intelligent Systems, 2011
Combining One-Class Classifiers via Meta-Learning
CoRR, 2011
Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data
CoRR, 2011
A Method for Detecting Unknown Malicious Executables.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Eliciting domain expert misuseability conceptions.
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011
Analyzing group communication for preventing data leakage via email.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Dynamic Sensitivity-Based Access Control.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
HoneyGen: An automated honeytokens generator.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011
LoOkie - it feels like being there.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Optimizing Targeting of Intrusion Detection Systems in Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
Journal in Computer Virology, 2010
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.
Journal in Computer Virology, 2010
Efficient Multidimensional Suppression for K-Anonymity.
IEEE Trans. Knowl. Data Eng., 2010
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method.
Journal of Systems and Software, 2010
Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS).
JASIST, 2010
Routing betweenness centrality.
J. ACM, 2010
Google Android: A Comprehensive Security Assessment.
IEEE Security & Privacy, 2010
Securing Android-Powered Mobile Devices Using SELinux.
IEEE Security & Privacy, 2010
Stealing Reality
CoRR, 2010
Efficient Collaborative Application Monitoring Scheme for Mobile Networks
CoRR, 2010
Applying Behavioral Detection on Android-Based Devices.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010
Cost-Sensitive Detection of Malicious Applications in Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010
Google Android: An Updated Security Review.
Proceedings of the Mobile Computing, Applications, and Services, 2010
Cost Benefit Deployment of DNIPS.
Proceedings of IEEE International Conference on Communications, 2010
Continuous Verification Using Keystroke Dynamics.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Rendezvous tunnel for anonymous publishing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Unknown malcode detection and the imbalance problem.
Journal in Computer Virology, 2009
Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Record, 2009
A decision theoretic approach to combining information filtering.
Online Information Review, 2009
Using artificial neural networks to detect unknown computer worms.
Neural Computing and Applications, 2009
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Sec. Techn. Report, 2009
Troika - An improved stacking schema for classification tasks.
Inf. Sci., 2009
Incremental deployment of network monitors based on Group Betweenness Centrality.
Inf. Process. Lett., 2009
Collaborative attack on Internet users' anonymity.
Internet Research, 2009
Improving malware detection by applying multi-inducer ensemble.
Computational Statistics & Data Analysis, 2009
Google Android: A State-of-the-Art Review of Security Mechanisms
CoRR, 2009
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Method for Detecting Unknown Malicious Executables.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
A Chronological Evaluation of Unknown Malcode Detection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009
An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009
SISR - A New Model for Epidemic Spreading of Electronic Threats.
Proceedings of the Information Security, 12th International Conference, 2009
Identity theft, computers and behavioral biometrics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
An Overview of IDS Using Anomaly Detection.
Proceedings of the Database Technologies: Concepts, 2009
2008
Detection of unknown computer worms based on behavioral classification of the host.
Computational Statistics & Data Analysis, 2008
Malicious Code Detection Using Active Learning.
Proceedings of the Privacy, 2008
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity.
Proceedings of the Protecting Persons While Protecting the People, 2008
Unknown malcode detection via text categorization and the imbalance problem.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Unknown malcode detection - A chronological evaluation.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Active learning to improve the detection of unknown computer worms activity.
Proceedings of the 11th International Conference on Information Fusion, 2008
A Distributed Framework for the Detection of New Worm-Related Malware.
Proceedings of the Intelligence and Security Informatics, 2008
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008
Unknown Malcode Detection Using OPCODE Representation.
Proceedings of the Intelligence and Security Informatics, 2008
2007
MarCol: A Market-Based Recommender System.
IEEE Intelligent Systems, 2007
Finding the most prominent group in complex networks.
AI Commun., 2007
Improving the Detection of Unknown Computer Worms Activity Using Active Learning.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007
Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain.
Proceedings of the 4th International Conference on Knowledge Capture (K-CAP 2007), 2007
Deployment of DNIDS in Social Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Simulating Threats Propagation within the NSP Infrastructure.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Host Based Intrusion Detection using Machine Learning.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Malicious Code Detection and Acquisition Using Active Learning.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007
2006
Cluster-analysis attack against a PRivAte Web solution (PRAW).
Online Information Review, 2006
A decision theoretic approach to combining information filters: An analytical and empirical evaluation.
JASIST, 2006
An intelligent, interactive tool for exploration and visualization of time-oriented security data.
Proceedings of the 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 2006
Application of Artificial Neural Networks Techniques to Computer Worm Detection.
Proceedings of the International Joint Conference on Neural Networks, 2006
2005
TDS - An Innovative Terrorist Detection System.
Proceedings of the Fighting Terror in Cyberspace, 2005
PRAW - A PRivAcy model for the Web.
JASIST, 2005
Enhancing customer privacy while searching for products and services on the world wide web.
Internet Research, 2005
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).
Proceedings of the Intelligence and Security Informatics, 2005
Designing Secure Indexes for Encrypted Databases.
Proceedings of the Data and Applications Security XIX, 2005
2004
A Structure Preserving Database Encryption Scheme.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
Terrorist Detection System.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004
2003
A decision-theoretic approach to data mining.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2003
Using the Information Structure Model to Compare Profile-Based Information Filtering Systems.
Inf. Retr., 2003
Privacy Preservation Improvement by Learning Optimal Profile Generation Rate.
Proceedings of the User Modeling 2003, 2003
Content-Based Methodology for Anomaly Detection on the Web.
Proceedings of the Web Intelligence, 2003
2002
A new privacy model for hiding group interests while accessing the Web.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
A New Privacy Model for Web Surfing.
Proceedings of the Next Generation Information Technologies and Systems, 2002
1993
Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems.
Parallel Computing, 1993