Improving malware detection by applying multi-inducer ensemble

Eitan Menahem , Asaf Shabtai , Lior Rokach , Yuval Elovici
Computational Statistics & Data Analysis 53 ( 4) 1483 -1494

111
2009
Introduction to the Special Issue on Data Mining for Cybersecurity

Nathalie Japkowicz , Yuval Elovici
IEEE Intelligent Systems 33 ( 2) 3 -4

2
2018
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research

Yuval Elovici , Michael Fire , Amir Herzberg , Haya Shulman
Science and Engineering Ethics 20 ( 4) 1027 -1043

23
2014
Modeling and evaluation of a new message-passing system for parallel multiprocessor systems

Helnye Azaria , Yuval Elovici
parallel computing 19 ( 6) 633 -649

2
1993
Handwritten Signature Verification Using Wrist-Worn Devices

Alona Levy , Ben Nassi , Yuval Elovici , Erez Shmueli
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2 ( 3) 119

11
2018
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks

Rami Puzis , Meytal Tubi , Yuval Elovici , Chanan Glezer
ACM Transactions on Modeling and Computer Simulation 22 ( 1) 1 -26

20
2011
Combining one-class classifiers via meta learning

Eitan Menahem , Lior Rokach , Yuval Elovici
conference on information and knowledge management 2435 -2440

23
2013
An attack scenario and mitigation mechanism for enterprise BYOD environments

Shachar Siboni , Asaf Shabtai , Yuval Elovici
ACM Sigapp Applied Computing Review 18 ( 2) 5 -21

3
2018
Network Flow Watermarking: A Survey

Alfonso Iacovazzi , Yuval Elovici
IEEE Communications Surveys and Tutorials 19 ( 1) 512 -530

52
2017
INTELLIGENT TECHNOLOGY FOR CONTENT MONITORING ON THE WEB

Mark Last , Bracha Shapira , Yuval Elovici , Omer Zaafrany
Series in Machine Perception and Artificial Intelligence 539 -552

2004
Enhanced situation space mining for data streams

Yisroel Mirsky , Tal Halpern , Rishabh Upadhyay , Sivan Toledo
symposium on applied computing 842 -849

1
2017
Cyber security patrol: detecting fake and vulnerable wifi-enabled printers

Jinghui Toh , Muhammad Hatib , Omer Porzecanski , Yuval Elovici
symposium on applied computing 535 -542

3
2017
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis

Yair Meidan , Michael Bohadana , Asaf Shabtai , Juan David Guarnizo
symposium on applied computing 506 -509

373
2017
Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data

TT Teoh , YY Nguwi , Yuval Elovici , Ngai-Man Cheung
international conference on natural computation 2080 -2083

14
2017
2017
Boosting the Detection of Malicious Documents Using Designated Active Learning Methods

Nir Nissim , Aviad Cohen , Yuval Elovici
2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) 760 -765

10
2015
On packet loss modeling: An empirical assessment

Alfonso Iacovazzi , Daniel Frassinelli , Yuval Elovici
international conference on network of future 33 -39

2017
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)

Yuval Elovici , Bracha Shapira , Mark Last , Omer Zaafrany
Intelligence and Security Informatics 244 -255

14
2005
IP2User -- Identifying the Username of an IP Address in Network-Related Events

Asaf Shabtai , Idan Morad , Eyal Kolman , Ereli Eran
international congress on big data 435 -436

2013
POSTER: Towards Exposing Internet of Things: A Roadmap

Asaf Shabtai , Yuval Elovici , Vinay Sachidananda , Jinghui Toh
computer and communications security 1820 -1822

2
2016