IP2User -- Identifying the Username of an IP Address in Network-Related Events

Asaf Shabtai , Idan Morad , Eyal Kolman , Ereli Eran
international congress on big data 435 -436

2013
POSTER: Towards Exposing Internet of Things: A Roadmap

Asaf Shabtai , Yuval Elovici , Vinay Sachidananda , Jinghui Toh
computer and communications security 1820 -1822

2
2016
PUA Detection Based on Bundle Installer Characteristics.

Amir Lukach , Ehud Gudes , Asaf Shabtai
IFIP Annual Conference on Data and Applications Security and Privacy 261 -273

2020
Security Ranking of IoT Devices Using an AHP Model

Shachar Siboni , Chanan Glezer , Rami Puzis , Asaf Shabtai
International Symposium on Cyber Security Cryptography and Machine Learning 29 -44

2020
ConfDTree: Improving Decision Trees Using Confidence Intervals

Gilad Katz , Asaf Shabtai , Lior Rokach , Nir Ofek
2012 IEEE 12th International Conference on Data Mining 339 -348

9
2012
Applying Behavioral Detection on Android-Based Devices

Asaf Shabtai , Yuval Elovici
mobile wireless middleware operating systems and applications 235 -249

59
2010
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning

Asaf Shabtai , Yuval Fledel , Yuval Elovici
computational intelligence and security 329 -333

132
2010
POSTER: Misuseablity Analysis for IT Infrastructure

Asaf Shabtai , Yuval Elovici
computer and communications security 1496 -1498

2014
Towards Security of Native DRM Execution in HTML5

David Livshits , Alexandra Mikityuk , Stefan Pham , Asaf Shabtai
international symposium on multimedia 411 -416

1
2015
Leaking data from enterprise networks using a compromised smartwatch device

Shachar Siboni , Asaf Shabtai , Yuval Elovici
acm symposium on applied computing 741 -750

4
2018
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.

Yisroel Mirsky , Tomer Doitshman , Yuval Elovici , Asaf Shabtai
network and distributed system security symposium

731
2018
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers

Ishai Rosenberg , Asaf Shabtai , Yuval Elovici , Lior Rokach
annual computer security applications conference 611 -626

2020
An intelligent, interactive tool for exploration and visualization of time-oriented security data

Asaf Shabtai , Denis Klimov , Yuval Shahar , Yuval Elovici
Proceedings of the 3rd international workshop on Visualization for computer security - VizSEC '06 15 -22

24
2006
Malware Detection on Mobile Devices

Asaf Shabtai
mobile data management 289 -290

36
2010
Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain

Asaf Shabtai , Maor Atlas , Yuval Shahar , Yuval Elovici
Proceedings of the 4th international conference on Knowledge capture - K-CAP '07 7 -14

4
2007
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets

Lior Sidi , Yisroel Mirsky , Asaf Nadler , Yuval Elovici
conference on information and knowledge management 2741 -2748

2020
Security Analysis of Radar Systems

Shai Cohen , Tomer Gluck , Yuval Elovici , Asaf Shabtai
workshop on cyber physical systems 3 -14

14
2019
Cost-Effective Malware Detection as a Service Over Serverless Cloud Using Deep Reinforcement Learning

Yoni Birman , Shaked Hindi , Gilad Katz , Asaf Shabtai
2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID) 420 -429

9
2020
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution

Oded Leiba , Yechiav Yitzchak , Ron Bitton , Asaf Nadler
ieee european symposium on security and privacy 29 -39

15
2018
Behavioral Study of Users When Interacting with Active Honeytokens

Asaf Shabtai , Maya Bercovitch , Lior Rokach , Ya'akov (Kobi) Gal
ACM Transactions on Information and System Security 18 ( 3) 9

11
2016