TRAWLING TRAFFIC UNDER ATTACK OVERCOMING DDoS ATTACKS BY TARGET-CONTROLLED TRAFFIC FILTERING

SHLOMI DOLEV , YUVAL ELOVICI , ALEX KESSELMAN , POLINA ZILBERMAN
International Journal of Foundations of Computer Science 22 ( 05) 1073 -1098

2011
Generic Anomalous Vertices Detection Utilizing a Link Prediction Algorithm

Dima Kagan , Yuval Elovichi , Michael Fire
Social Network Analysis and Mining 8 ( 1) 27

8
2018
O, and Kandel

M Elovici Last , Y Shapira , B Zaafrany
A.: Using Data Mining for Detecting Terror-Related Activities on the Web, ECIW Proceedings 271 -280

5
2003
Improving condition severity classification learning using support vector machine-based active learning methodology

N Nissim , MR Boland , R Moskovitch , NTY Elovici
Journal of Biomedical Informatics 10

3
2016
Methods and devices related to camera connectors

Yuval Elovici , Elazar Sonnenschein , Gregory Bakos , Gary Long

47
2005
An Attentive Digital Signage System

Chanan Glezer , Yuval Elovici , Rami Puzis , Alexander Kruglov
Mensch & Computer Workshopband 10 -15

2009
GSMem: data exfiltration from air-gapped computers over GSM frequencies

Yuval Elovici , Assaf Kachlon , Gabi Kedma , Yisroel Mirsky
usenix security symposium 849 -864

86
2015
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.

Yuval Elovici , Ariel Felner , Bracha Shapira , Yisroel Mirsky
annual symposium on combinatorial search 70 -77

2
2015
Finding the most prominent group in complex networks

Yuval Elovici , Shlomi Dolev , Rami Puzis
Ai Communications 20 ( 4) 287 -296

51
2007
A decision theoretic approach to combining information filters: An analytical and empirical evaluation

Yuval Elovici , Paul B. Kantor , Bracha Shapira
Journal of the Association for Information Science and Technology 57 ( 3) 306 -320

6
2006
2
2015
Device employing camera connector

Yuval Elovici , Elazar Sonnenschein , Gregory J Bakos , Gary L Long

15
2005
MINDDESKTOP - Computer Accessibility for Severely Handicapped

Yuval Elovici , Ori Ossmy , Rami Puzis , Lior Rokach
international conference on enterprise information systems 316 -320

6
2011
Scholarly digital libraries as a platform for malware distribution

Yuval Elovici , Lior Rokach , Aviad Cohen , C. Lee Giles
2nd Singapore Cyber-Security R and D Conference, SG-CRC 2017 15 107 -128

2
2017
Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.

Yuval Elovici , Asaf Shabtai , Raz Tikochinski , Gaby Shugol
arXiv: Cryptography and Security

29
2017
47
2017
Temporal Pattern Discovery for Accurate Sepsis Diagnosis in ICU Patients

Yuval Elovici , Yuval Shahar , Eitam Sheetrit , Denis Klimov
arXiv: Learning

8
2017
LoOkie - It Feels Like Being There, proposing a social mobile application

Yuval Elovici , Rami Puzis , Talya Porat , Inbal Rief

2011
Defense Methods Against Adversarial Examples for Recurrent Neural Networks

Yuval Elovici , Asaf Shabtai , Lior Rokach , Ishai Rosenberg
arXiv: Cryptography and Security

40
2019