Method and system for classifying data objects based on their network footprint

Puzis Rami , Levi Dror , Shabtai Assaf , Israeli Elad

4
2019
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content

Asaf shabtai , Dennis Potashnik , Yuval Fledel , Robert Moskovitch
Security and Communication Networks 4 ( 8) 947 -965

17
2011
White Paper-Cybersecurity Technologies for Cloud Access

David Tayouri , Snir Hassidim , Eitan Bremier , Alex Smirnov
Cybersecurity Technologies for Cloud Access 1 -30

2
2022
White Paper-CyberSecurity Standards for Cloud Access-Version 2

David Tayouri , Snir Hassidim , Eitan Bremier , Alex Smirnov
CyberSecurity Standards for Cloud Access 1 -18

1
2022
Advanced Security Testbed Framework for Wearable IoT Devices

ASAF SHABTAI , NILS O TIPPENHAUER , JEMIN LEE

2015
Noise reduction of mobile sensors data in the prediction of demographic attributes

Asaf Shabtai , Itay Hazan
Proceedings of the Second ACM International Conference on Mobile Software Engineering and Systems 117 -120

7
2015
Sensor-based approach for predicting departure time of smartphone users

Asaf Shabtai , Gilad Katz , Ron Biton
Proceedings of the Second ACM International Conference on Mobile Software Engineering and Systems 146 -147

6
2015
Coupon recommendation for mobile devices

Hamed Ketabdar , Gilad Katz , Matthias Prohl , Asaf Shabtai

3
2015
Analyzing Group Communication for Preventing Accidental Data Leakage via Email.

Asaf Shabtai , Polina Zilberman , Lior Rokach
CollSec

3
2010
Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.

Yuval Elovici , Asaf Shabtai , Raz Tikochinski , Gaby Shugol
arXiv: Cryptography and Security

29
2017
47
2017
Defense Methods Against Adversarial Examples for Recurrent Neural Networks

Yuval Elovici , Asaf Shabtai , Lior Rokach , Ishai Rosenberg
arXiv: Cryptography and Security

40
2019
MaskDGA: A Black-box Evasion Technique Against DGA Classifiers and Adversarial Defenses

Asaf Shabtai , Lior Sidi , Asaf Nadler
arXiv: Cryptography and Security

23
2019
Detecting Cyberattacks in Industrial Control Systems Using Convolutional Neural Networks

Asaf Shabtai , Moshe Kravchik
arXiv: Cryptography and Security

234
2018
24
2019
Shattered Trust: When Replacement Smartphone Components Attack.

Asaf Shabtai , Yossi Oren , Omer Shwartz , Amir Cohen
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17)

22
2017
SIPHON: Towards Scalable High-Interaction Physical Honeypots

Yuval Elovici , Asaf Shabtai , Martín Ochoa , Juan Guarnizo
arXiv: Cryptography and Security

2017
The Security of IP-based Video Surveillance Systems

Yuval Elovici , Asaf Shabtai , Yisroel Mirsky , Yisroel Mirsky
arXiv: Cryptography and Security

31
2019