Malicious Code Detection and Acquisition Using Active Learning

Robert Moskovitch , Nir Nissim , Yuval Elovici
intelligence and security informatics 371 -371

20
2007
Deployment of DNIDS in Social Networks

Meytal Tubi , Rami Puzis , Yuval Elovici
intelligence and security informatics 59 -65

16
2007
Simulating Threats Propagation within the NSP Infrastructure

Rami Puzis , Meytal Tubi , Gil Tahan , Yuval Elovici
intelligence and security informatics 380 -380

2007
Unknown malcode detection via text categorization and the imbalance problem

Robert Moskovitch , Dima Stopel , Clint Feher , Nir Nissim
intelligence and security informatics 156 -161

80
2008
Unknown malcode detection — A chronological evaluation

Robert Moskovitch , Clint Feher , Yuval Elovici
intelligence and security informatics 267 -268

8
2008
Identity theft, computers and behavioral biometrics

Robert Moskovitch , Clint Feher , Arik Messerman , Niklas Kirschnick
intelligence and security informatics 155 -160

134
2009
Dynamic Sensitivity-Based Access Control

Amir Harel , Asaf Shabtai , Lior Rokach , Yuval Elovici
intelligence and security informatics 201 -203

3
2011
HoneyGen: An automated honeytokens generator

Maya Bercovitch , Meir Renford , Lior Hasson , Asaf Shabtai
intelligence and security informatics 131 -136

58
2011
Analyzing users' web surfing patterns to trace terrorists and criminals

Gabi Kedma , Mordehai Guri , Tom Sela , Yuval Elovici
intelligence and security informatics 143 -145

7
2013
A Weighted Risk Score Model for IoT Devices.

Shachar Siboni , Chanan Glezer , Asaf Shabtai , Yuval Elovici
International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage 20 -34

2
2019
Detecting Android Kernel Rootkits via JTAG Memory Introspection

Mordechai Guri , Yuri Poliak , Bracha Shapira , Yuval Elovici
CRC Press 165 -186

2017
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service

Vinay Sachidananda , Suhas Bhairav , Yuval Elovici
EAI Endorsed Transactions on Security and Safety 6 ( 20) 159803

2
2019
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks

Abigail Paradise , Asaf Shabtai , Rami Puzis , Aviad Elyashar
IEEE Transactions on Computational Social Systems 4 ( 3) 65 -79

27
2017
Detecting Spammers via Aggregated Historical Data Set

Eitan Menahem , Rami Pusiz , Yuval Elovici
Network and System Security 248 -262

4
2012
Detecting unknown malicious code by applying classification techniques on OpCode patterns

Asaf Shabtai , Robert Moskovitch , Clint Feher , Shlomi Dolev
Security Informatics 1 ( 1) 1 -22

279
2012
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack

Mordechai Guri , Matan Monitz , Yuval Elovici
ACM Transactions on Intelligent Systems and Technology 8 ( 4) 50

47
2017
Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

Mordechai Guri , Dima Bykhovsky , Yuval Elovici
2019 12th CMI Conference on Cybersecurity and Privacy (CMI)

23
2019
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

Orly Stan , Ron Bitton , Michal Ezrets , Moran Dadon
IEEE Transactions on Dependable and Secure Computing 1 -1

2020
Detection of unknown computer worms based on behavioral classification of the host

Robert Moskovitch , Yuval Elovici , Lior Rokach
Computational Statistics & Data Analysis 52 ( 9) 4544 -4566

88
2008