General Information
NameDr. Asaf Shabtai
DepartmentDepartment of Software and Information Systems Engineering
Emailshabtaia@bgumail.bgu.ac.il
Academic RankSenior lecturer
FunctionCyber ​​Program Coordinator, Department of Software and Information Systems Engineering


Books

 
[1] Shabtai A., A survey of data leakage detection and prevention solutions, Springer, (2012).

Show All
   

To the top

Book Chapters

 
[1] Shabtai A., Protecting Critical Infrastructures from Cyber Attacks Involving Malware, IOS Press NATO Series, 140-150, (2009).

Show All
   

To the top

Journal Articles

 
[1] Shabtai A., Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes, IEEE Trans. Mob. Comput. (USA), 15, 1, 163 - 72, (2016).
[2] Shabtai A., Noise Reduction of Mobile Sensors Data in the Prediction of Demographic Attributes, 2015 2nd ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), 117 - 20, (2015).
[3] Shabtai A., Sensor-based approach for predicting departure time of smartphone users, 2015 2nd ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), 146 - 7, (2015).
[4] Shabtai A., Optimizing Data Misuse Detection, ACM Trans. Knowl. Discov. Data (USA), 8, 3, 16 (23 pp.) -, (2014).
[5] Shabtai A., Mobile malware detection through analysis of deviations in application network behavior, Computers and Security, 43, 1 - 18, (2014).
[6] Shabtai A., Adapted Features and Instance Selection for Improving Co-training, Mach. Learn. (Netherlands), 91, 1, 81 - 100, (2014).
[7] Shabtai A., ConfDTree: a statistical method for improving decision trees, J. Comput. Sci. Technol. (USA), 29, 3, 392 - 407, (2014).
[8] Shabtai A., ALPD: active learning framework for enhancing the detection of malicious PDF files, 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC), 91 - 8, (2014).
[9] Shabtai A., Anti-Reconnaissance Tools: Detecting Targeted Socialbots, IEEE Internet Comput. (USA), 18, 5, 11 - 19, (2014).
[10] Shabtai A., TM-score: a misuseability weight measure for textual content, IEEE Trans. Inf. Forensics Secur. (USA), 9, 12, 2205 - 19, (2014).
[11] Shabtai A., Dynamic Latent Expertise Mining in Social Networks, IEEE Internet Comput. (USA), 18, 5, 20 - 7, (2014).
[12] Shabtai A., Detecting bottlenecks on-the-fly in OLSR based MANETs, 2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel (IEEEI). Proceedings, 5 pp. -, (2014).
[13] Shabtai A., IP2User - Identifying the Username of an IP Address in Network-related Events, 2013 IEEE International Congress on Big Data, 435 - 6, (2013).
[14] Shabtai A., Detecting application update attack on mobile devices through network features, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 91 - 2, (2013).
[15] Shabtai A., Analyzing group E-mail exchange to detect data leakage, J. Am. Soc. Inf. Sci. Technol. (USA), 64, 9, 1780 - 90, (2013).
[16] Harel, Shabtai A., Amir, M-Score: A Misuseability Weight Measure, , 9, 414--428, (2012).
[17] Shabtai A., Kanonov, Uri, Weiss, Yael, “Andromaly”: a behavioral malware detection framework for android devices, , 38, 161--190, (2012).
[18] Shabtai A., Moskovitch, Robert, Feher, Clint, Dolev, Shlomi, Detecting unknown malicious code by applying classification techniques on OpCode patterns, , 1, 1--22, (2012).
[19] Shabtai A., A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions, , 39, 249--286, (2012).
[20] Shabtai A., ConfDTree: improving decision trees using confidence intervals, 2012 IEEE 12th International Conference on Data Mining (ICDM 2012), 339 - 48, (2012).
[21] Shabtai A., Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content, Secur. Commun. Netw. (USA), 4, 8, 947--965, (2011).
[22] Shabtai A., Menahem, Eitan, F-sign: Automatic, function-based signature generation for malware, , 41, 494--508, (2011).
[23] Shabtai A., Fledel, Yuval, Kanonov, Uri, Dolev, Shlomi, Google android: A comprehensive security assessment, , 8, 35--44, (2010).
[24] Shabtai A., Kanonov, Uri, Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method, , 83, 1524--1537, (2010).
[25] Shabtai A., Fledel, Yuval, Securing Android-powered mobile devices using SELinux, , 8, 36--44, (2010).
[26] Shabtai A., Fledel, Yuval, Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics, , 6, 239--259, (2010).
[27] Shabtai A., Malware Detection on Mobile Devices, Proceedings 11th International Conference on Mobile Data Management (MDM 2010), 289 - 90, (2010).
[28] Menahem Eitan, Shabtai A., Improving Malware Detection by Applying Multi-Inducer Ensemble, Computational Statistics and Data Analysis, 53, 4, 1483-1494, (2009).
[29] Shabtai A., Detection of Malicious Code by Applying Machine Learning Classifiers on Static Features – a State-of-the-Art Survey, Information Security Technical Report, 14, 1, 16-29, (2009).
[30] Shabtai A., Improving malware detection by applying multi-inducer ensemble, Computational Statistics & Data Analysis (CSDA), 53, 1483-1494, (2009).
[31] Shabtai A., Fledel, Yuval, Kanonov, Uri, Dolev, Shlomi, Google Android: A state-of-the-art review of security mechanisms, , (2009).
[32] Shabtai A., Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain, K-CAP'07: Proceedings of the Fourth International Conference on Knowledge Capture, 7 - 14, (2007).
[33] Shabtai A., Using the knowledge-based temporal-abstraction (KBTA) method for detection of electronic threats, , (2006).

Show All
   

To the top

Conference Proceedings

 
[1] Bercovitch, M, Renford, Shabtai A., M, Hasson, L, HoneyGen: An automated honeytokens generator, IEEE, 131--136, (2011).
[2] Gafny, Shabtai A., Ma'ayan, Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure, 765--768, (2011).
[3] Harel, Shabtai A., Amir, Dynamic Sensitivity-Based Access Control, IEEE, 201--203, (2011).
[4] Harel, Shabtai A., Amir, Eliciting domain expert misuseability conceptions, 193--194, (2011).
[5] Zilberman Polina, Shabtai A., Analyzing group communication for preventing data leakage via email, Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, IEEE, (2010).
[6] Gafny, Shabtai A., Ma'ayan, Detecting data misuse by applying context-based data linkage, 3--12, (2010).
[7] Harel, Shabtai A., Amir, M-score: estimating the potential damage of data leakage incident by assigning misuseability weight, 13--20, (2010).
[8] Shabtai A., Fledel, Yuval, Automated static code analysis for classifying android applications using machine learning, IEEE Computer Society, 329--333, (2010).
[9] Shabtai A., Applying machine learning techniques for detection of malicious code in network traffic,Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 44 - 50, (2007).
[10] Shabtai A., An Intelligent, Interactive Tool for Exploration and Visualization of Time-Oriented Security Data, ACM Workshop on Visualization for Computer Security (VizSEC2006), Virginia, USA, November 3 2006,Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06, 15 - 22, (2006).
[11] Shabtai A., Per-packet Pricing Scheme for IP Networks, 10th International Conference on Telecommunications, ICT’2003, 1494-1500, Papeete, Tahiti, French Polynesia, February 23-March 1, 2003,10th International Conference on Telecommunications. ICT'2003 (Cat. No.03EX628), 1494 - 500, (2003).
[12] Shabtai A., Per-packet pricing scheme for IP networks, IEEE, 1494--1500, (2003).

Show All
   

To the top

misc

 
[1] Shapira, Yuri, Shabtai A., Content-based data leakage detection using extended fingerprinting, (2013).
[2] Tachan, Gil, Shabtai A., System that provides early detection, alert, and response to electronic threats, (2012).
[3] Tahan, Shabtai A., Gil, Architecture for identifying electronic threat patterns, (2011).
[4] Altshuler, Yaniv, Dolev, Shabtai A., Shlomi, Fledel, Yuval, COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK, (2010).

Show All
   

To the top

Poster

 
[1] Shabtai A., Kanonov U., Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach”, (2009).
[2] Shabtai A., Detecting Malicious Applications on Android Using Anomaly Detection, (2009).
[3] Shabtai A., Fledel Y., Detecting Malicious Applications on Android by Applying Machine Learning Classifiers to Static Features, (2009).

Show All
   

To the top

misc

 
[1] Tahan, Shabtai A., Gil, Automatic extraction of signatures for Malware, (2008).

Show All
   

To the top

incollection

 
[1] Fledel, Shabtai A., Yuval, Potashnik, Dennis, Google Android: An Updated Security Review, Springer, (2012).
[2] Shabtai A., Data Leakage/Misuse Scenarios, Springer, (2012).
[3] Shabtai A., Future Trends in Data Leakage, Springer, (2012).
[4] Shabtai A., Introduction to Information Security, Springer, (2012).
[5] Shabtai A., Privacy, Data Anonymization, and Secure Data Publishing, Springer, (2012).
[6] Shabtai A., A Taxonomy of Data Leakage Prevention Solutions, Springer, (2012).
[7] Shabtai A., Applying behavioral detection on android-based devices, Springer, (2010).

Show All