Prof.
Yuval Elovici
Ben-Gurion University of the Negev -
Faculty of Engineering Sciences
WWW
RPW BGU
BGU
General Information
Name
Prof.
Yuval Elovici
Department
Department of Software and Information Systems Engineering
Email
elovici@inter.net.il
Personal Web Site
Personal Web Site
Academic Rank
Professor
General
Publications
Contact Me
Publications
Books
Book Chapters
Journal Articles
Conference Proceedings
Technical Report
misc
Poster
misc
incollection
Books
[1]
Altshuler
,
Elovici Y.
,
Yaniv
,
Aharony
,
Nadav
,
Pentland
,
Alex
,
Security and privacy in social networks, Springer, (2013).
[2]
Elovici Y.
,
A survey of data leakage detection and prevention solutions, Springer, (2012).
Show All
To the top
Book Chapters
[1]
Elovici Y.
,
Links Reconstruction Attack Using Link Prediction Algorithms to Compromise Social Networks Privacy, Springer, (2012).
[2]
Elovici Y.
,
Link Prediction in Highly Fractional Data Sets, Handbook of Computational Approaches to Counterterrorism. Springer, (2012).
[3]
Elovici Y.
,
Protecting Critical Infrastructures from Cyber Attacks Involving Malware, IOS Press NATO Series, 140-150, (2009).
[4]
Elovici Y.
,
Zaafrany O
,
Friedman M
,
Schneider M
,
Kandel A
,
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS), Springer, 365-385, (2008).
[5]
Kandel A.
,
Elovici Y.
,
Enhancement to the Advanced Terrorists Detection System (ATDS), IOS Press NATO Series, 71-81, (2008).
[6]
Elovici Y.
,
How to Protect Critical Infrastructure from Cyber-Terrorist Attacks, IOS Press NATO Series, 224-232, (2008).
[7]
Zaafrani O
,
Elovici Y.
,
Friedman M
,
Schneider M
,
Kandel A
,
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). in Terrorism Informatics, Knowledge Management and Data Mining for Homeland Security, Chen, H. Reid, E. Sinai, J. Silke, A. Ganor, B (Eds), Springer Integrated Series in Information Systems. Vol. 18, pp. 365-385, (2008).
[8]
Elovici Y.
,
An overview of IDS Using Anomaly Detection, IGI Global, 327-337, (2007).
[9]
Shpanglat Y
,
Elovici Y.
,
Hidden-Web Privacy Preservation Surfing (Hi-WePPS) Model”, In Privacy and Technologies of Identity, A Cross-Disciplinary Conversation. Strandburg, D. and Stan Raicu, D. (Eds.), Chapter 19, pp. 335-348, Springer, (2006).
[10]
Elovici Y.
,
TDS - an Innovative Terrorist Detection System, World Scientific, 75-87, (2005).
[11]
Zaafrany O
,
Kandel M
,
Elovici Y.
,
Intelligent Technology for Content Monitoring on The Web, World Scientific, 539-552, (2004).
Show All
To the top
Journal Articles
[1]
Elovici Y.
,
An active learning framework for efficient condition severity classification,
15th Conference on Artificial Intelligence in Medicine, AIME 2015 Proceedings: LNCS 9105
, 9105, 13 - 24, (2015).
[2]
Elovici Y.
,
pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts,
Advances in Knowledge Discovery and Data Mining.19th Pacific-Asia Conference, PAKDD 2015. Proceedings: LNCS 9078
, pt. II, 119 - 33, (2015).
[3]
Elovici Y.
,
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface,
2015 IEEE Trustcom/BigDataSE/ISPA
, vol.1, 65 - 73, (2015).
[4]
Elovici Y.
,
Topology manipulations for speeding betweenness centrality computation,
Journal of Complex Networks
, 3, 1, 84 - 112, (2015).
[5]
Elovici Y.
,
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations,
2015 IEEE 28th Computer Security Foundations Symposium (CSF)
, 276 - 89, (2015).
[6]
Elovici Y.
,
Detection of malicious PDF files and directions for enhancements: a state-of-the art survey,
Comput. Secur. (Netherlands)
, 48, 246 - 66, (2015).
[7]
Elovici Y.
,
Optimizing Data Misuse Detection,
ACM Trans. Knowl. Discov. Data (USA)
, 8, 3, 16 (23 pp.) -, (2014).
[8]
Elovici Y.
,
Mobile malware detection through analysis of deviations in application network behavior,
Computers and Security
, 43, 1 - 18, (2014).
[9]
Elovici Y.
,
Novel active learning methods for enhanced PC malware detection in windows OS,
Expert Syst. Appl. (UK)
, 41, 13, 5843 - 57, (2014).
[10]
Elovici Y.
,
Resilience of anti-malware programs to naive modifications of malicious binaries,
2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC)
, 152 - 9, (2014).
[11]
Elovici Y.
,
Implementing a database encryption solution, design and implementation issues,
Comput. Secur. (UK)
, 44, 33 - 50, (2014).
[12]
Elovici Y.
,
Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements,
2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC)
, 145 - 51, (2014).
[13]
Elovici Y.
,
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies,
2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE). Proceedings
, 58 - 67, (2014).
[14]
Elovici Y.
,
CoBAn: a context based model for data leakage prevention,
Inf. Sci. (USA)
, 262, 137 - 58, (2014).
[15]
Elovici Y.
,
ALPD: active learning framework for enhancing the detection of malicious PDF files,
2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC)
, 91 - 8, (2014).
[16]
Elovici Y.
,
Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator,
2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC)
, 264 - 7, (2014).
[17]
Fire
,
Michael
,
Elovici Y.
,
Organization Mining Using Online Social Networks,
, (2013).
[18]
Elovici Y.
,
Albayrak
,
Sahin
,
Editorial: Guest editorial: Special issue on data mining for information security,
, 231, 1--3, (2013).
[19]
Fire
,
Michael
,
Kagan
,
Elovici Y.
,
Dima
,
Elyashar
,
Aviad
,
Friend or Foe? Fake Profile Identification in Online Social Networks,
, (2013).
[20]
Fire
,
Michael
,
Elovici Y.
,
Goldschmidt
,
Roy
,
Online Social Networks: Threats and Solutions Survey,
, (2013).
[21]
Dror M.
,
Shabtai .
,
Elovici Y.
,
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage,
, 1, (2013).
[22]
Elovici Y.
,
IP2User - Identifying the Username of an IP Address in Network-related Events,
2013 IEEE International Congress on Big Data
, 435 - 6, (2013).
[23]
Elovici Y.
,
Entity Matching in Online Social Networks,
2013 International Conference on Social Computing (SocialCom)
, 339 - 44, (2013).
[24]
Elovici Y.
,
A fast and scalable method for threat detection in large-scale DNS logs,
2013 IEEE International Conference on Big Data
, 738 - 41, (2013).
[25]
Elovici Y.
,
Detecting application update attack on mobile devices through network features,
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
, 91 - 2, (2013).
[26]
Elovici Y.
,
Analyzing group E-mail exchange to detect data leakage,
J. Am. Soc. Inf. Sci. Technol. (USA)
, 64, 9, 1780 - 90, (2013).
[27]
Elovici Y.
,
Analyzing Users' Web Surfing Patterns to Trace Terrorists and Criminals,
2013 IEEE International Conference on Intelligence and Security Informatics (ISI)
, 143 - 5, (2013).
[28]
Elovici Y.
,
Exploiting simultaneous usage of different wireless interfaces for security and mobility,
2013 Second International Conference on Future Generation Communication Technologies (FGCT)
, 21 - 6, (2013).
[29]
Elovici Y.
,
Noninvasive detection of anti-forensic malware,
2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)
, 1 - 10, (2013).
[30]
Elovici Y.
,
Nesto - Network selection and traffic off-loading system for Android mobile devices,
2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)
, 337 - 42, (2013).
[31]
Elovici Y.
,
Homing Socialbots: Intrusion on a Specific Organization's Employee Using Socialbots,
2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
, 1358 - 65, (2013).
[32]
Tubi
,
M
,
Elovici Y.
,
Dolev
,
S
,
Article 5 (26 pages)-A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks,
, 22, (2012).
[33]
Altshuler
,
Yaniv
,
Elovici Y.
,
Bekhor
,
Shlomo
,
Shiftan
,
Yoram
,
Pentland
,
Alex
,
Augmented betweenness centrality for environmentally-aware traffic monitoring in transportation networks,
, (2012).
[34]
Elovici Y.
,
User identity verification via mouse dynamics,
Inf. Sci. (USA)
, 201, 19-36, (2012).
[35]
Fire
,
Michael
,
Elovici Y.
,
Katz
,
Gilad
,
Strangers Intrusion Detection-Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies,
, 1, 26--39, (2012).
[36]
Harel
,
Amir
,
Elovici Y.
,
M-Score: A Misuseability Weight Measure,
, 9, 414--428, (2012).
[37]
Menahem
,
Eitan
,
Schclar
,
Elovici Y.
,
Alon
,
Securing Your Transactions: Detecting Anomalous Patterns In XML Documents,
, abs/1209.1797, (2012).
[38]
Elovici Y.
,
Detecting unknown computer worm activity via support vector machines and active learning,
Pattern Anal. Appl. (UK)
, 15, 4, 459--475, (2012).
[39]
Schclar
,
Alon
,
Abramson
,
Elovici Y.
,
Adi
,
User Authentication Based on Representative Users,
, 42, 1669--1678, (2012).
[40]
Kanonov
,
Uri
,
Elovici Y.
,
Weiss
,
Yael
,
“Andromaly”: a behavioral malware detection framework for android devices,
, 38, 161--190, (2012).
[41]
Moskovitch
,
Robert
,
Feher
,
Clint
,
Elovici Y.
,
Dolev
,
Shlomi
,
Detecting unknown malicious code by applying classification techniques on OpCode patterns,
, 1, 1--22, (2012).
[42]
Elovici Y.
,
A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions,
, 39, 249--286, (2012).
[43]
Elovici Y.
,
Organizational intrusion: organization mining using Socialbots,
2012 International Conference on Social Informatics (SocialInformatics)
, 7 - 12, (2012).
[44]
Elovici Y.
,
Optimizing Investment Decisions in Selecting Information Security Remedies,
Information Management & Computer Security
, 19, 2, 95-112, (2011).
[45]
Shabtai Asaf
,
Elovici Y.
,
F-Sign: Automatic, Function-based Signature Generation for Malware,
IEEE Transactions on Systems, Man and Cybernetics: Part C
, 41, 4, 494-508, (2011).
[46]
Tubi
,
Meytal
,
Elovici Y.
,
Dolev
,
Shlomi
,
A decision support system for placement of intrusion detection and prevention devices in large-scale networks,
, 22, 5, (2011).
[47]
Dolev
,
Elovici Y.
,
Shlomi
,
Kesselman
,
Alex
,
Zilberman
,
Polina
,
Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering,
, 22, 1073--1098, (2011).
[48]
Menahem
,
Eitan
,
Elovici Y.
,
Combining One-Class Classifiers via Meta-Learning,
, abs/1112.5246, (2011).
[49]
Elovici Y.
,
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content,
Secur. Commun. Netw. (USA)
, 4, 8, 947--965, (2011).
[50]
Rokach
,
Elovici Y.
,
Lior .
,
Combining One-Class Classifiers via Meta-Learning,
, (2011).
[51]
Menahem
,
Eitan
,
Elovici Y.
,
F-sign: Automatic, function-based signature generation for malware,
, 41, 494--508, (2011).
[52]
Shirtz
,
Elovici Y.
,
Dov
,
Optimizing investment decisions in selecting information security remedies,
, 19, 95--112, (2011).
[53]
Weiss
,
Elovici Y.
,
Yael
,
The CASH algorithm-cost-sensitive attribute selection using histograms,
, (2011).
[54]
Elovici Y.
,
Zaafrany Omer
,
Friedman Menahem
,
Schneider Moti
,
Kandel Abraham
,
Detection of Access to Terror-Related Web Sites Using an Advanced Terror Detection System (ATDS),
Journal of the American Society for Information Science and Technology (JASIST)
, 61, 2, 405-418, (2010).
[55]
Elovici Y.
,
Efficient Multi Dimensional Suppression for k-Anonymity,
IEEE Transactions on Data and Knowledge Engineering
, 22, 3, 334-347, (2010).
[56]
Glezer Chanan
,
Elovici Y.
,
Auto-Sign: An Automatic Signature Generator for High-Speed Malware Filtering Devices,
Computer Virology
, 6, 91-103, (2010).
[57]
Dolev
,
Elovici Y.
,
Shlomi
,
Routing betweenness centrality,
, 57, 25, (2010).
[58]
Kisilevich
,
Slava
,
Elovici Y.
,
Efficient multidimensional suppression for k-anonymity,
, 22, 334--347, (2010).
[59]
Altshuler
,
Yaniv
,
Elovici Y.
,
Dolev
,
Shlomi
,
Efficient Collaborative Application Monitoring Scheme for Mobile Networks,
, abs/1009.1132, (2010).
[60]
Altshuler
,
Yaniv
,
Elovici Y.
,
Aharony
,
Nadav
,
Pentland
,
Alex
,
Cebrian
,
Manuel
,
Stealing reality,
, (2010).
[61]
Fledel
,
Yuval
,
Kanonov
,
Elovici Y.
,
Uri
,
Dolev
,
Shlomi
,
Google android: A comprehensive security assessment,
, 8, 35--44, (2010).
[62]
Kanonov
,
Uri
,
Elovici Y.
,
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method,
, 83, 1524--1537, (2010).
[63]
Fledel
,
Yuval
,
Elovici Y.
,
Securing Android-powered mobile devices using SELinux,
, 8, 36--44, (2010).
[64]
Fledel
,
Yuval
,
Elovici Y.
,
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics,
, 6, 239--259, (2010).
[65]
Shmueli
,
Erez
,
Elovici Y.
,
Vaisenberg
,
Ronen
,
Database encryption: an overview of contemporary challenges and design considerations,
, 38, 29--34, (2010).
[66]
Menahem Eitan
,
Elovici Y.
,
Improving Malware Detection by Applying Multi-Inducer Ensemble,
Computational Statistics and Data Analysis
, 53, 4, 1483-1494, (2009).
[67]
Puzis Rami
,
Yagil D
,
Elovici Y.
,
Braha D
,
Collaborative Attack on Internet Users’ Anonymity,
Internet Research
, 19, 1, 60-77, (2009).
[68]
Stopel Dima
,
Elovici Y.
,
Using artificial neural networks to detect unknown computer worms,
Neural Computing and Applications
, 18, 7, 663-674, (2009).
[69]
Dolev Shlomi
,
Elovici Y.
,
Puzis Rami
,
Zilberman Polina
,
Incremental Deployment of Network Monitors Based on Group Betweenness Centrality,
Information Processing Letters
, 109, 20, 1172-1176, (2009).
[70]
Ben-Nun A
,
Elovici Y.
,
A Decision Theoretic Approach to Combining Information Filters: Analysis and Empirical Results,
Online Information Review
, 33, 5, 920-942, (2009).
[71]
Elovici Y.
,
Detection of Malicious Code by Applying Machine Learning Classifiers on Static Features – a State-of-the-Art Survey,
Information Security Technical Report
, 14, 1, 16-29, (2009).
[72]
Stopel Dima
,
Feher Clint
,
Nissim Nir
,
Japkowicz N
,
Elovici Y.
,
Unknown Malcode Detection and the Imbalance Problem,
Journal in Computer Virology
, 5, 4, 295-308, (2009).
[73]
Elovici Y.
,
Troika – An Improved Stacking Schema for Classification Tasks,
Information Sciences
, 179, 24, 4097-4122, (2009).
[74]
Vaisenberg R
,
Elovici Y.
,
Database Encryption: An Overview of Contemporary Challenges and Design Considerations,
SIGMOD Record
, 38, 3, 29-34, (2009).
[75]
Elovici Y.
,
Improving malware detection by applying multi-inducer ensemble,
Computational Statistics & Data Analysis (CSDA)
, 53, 1483-1494, (2009).
[76]
Dolev
,
Elovici Y.
,
Shlomi
,
Zilberman
,
Polina
,
Incremental deployment of network monitors based on group betweenness centrality,
, 109, 1172--1176, (2009).
[77]
Shmueli
,
Erez
,
Kruglov
,
Elovici Y.
,
Alexander
,
Englert
,
Roman
,
An Attentive Digital Signage System,
, 10-15, (2009).
[78]
Binun
,
Alexander
,
Elovici Y.
,
A decision theoretic approach to combining information filtering,
, 33, 920--942, (2009).
[79]
Menahem
,
Eitan
,
Elovici Y.
,
Troika--An improved stacking schema for classification tasks,
, 179, 4097--4122, (2009).
[80]
Fledel
,
Yuval
,
Kanonov
,
Elovici Y.
,
Uri
,
Dolev
,
Shlomi
,
Google Android: A state-of-the-art review of security mechanisms,
, (2009).
[81]
Elovici Y.
,
Detection of unknown computer worms based on behavioral classification of the host,
Computational Statistics and Data Analysis
, 52, 9, 4544 - 4566, (2008).
[82]
Elovici Y.
,
Alon G
,
Evasive Routing: Achieving Anonymity Using Multiple ISPs,
Journal of Internet Technology
, 8, 1, 83-96, (2007).
[83]
Melamed Dan
,
Elovici Y.
,
MarCol: A Market-Based Recommender System,
IEEE Intelligent Systems
, 22, 3, 74-78, (2007).
[84]
Elovici Y.
,
Theory of Actionable Data Mining with Application to Semiconductor Manufacturing Control,
International Journal of Production Research
, 45, 13, 3059–3084, (2007).
[85]
Puzis Rami
,
Elovici Y.
,
Dolev Shlomi
,
Finding the Most Prominent Group in Complex Networks,
AI Communications
, 20, 4, 287 - 296, (2007).
[86]
Puzis Rami
,
Elovici Y.
,
Dolev Shlomi
,
Fast Algorithm for Successive Group Betweenness Centrality Computation,
Physical Review
, E 76, 056709, 1-9, (2007).
[87]
Braha
,
Elovici Y.
,
Dan
,
Theory of actionable data mining with application to semiconductor manufacturing control,
, 45, 3059--3084, (2007).
[88]
Dolev
,
Elovici Y.
,
Shlomi
,
Fast algorithm for successive computation of group betweenness centrality,
, 76, 056709, (2007).
[89]
Melamed
,
Dan
,
Elovici Y.
,
MarCol: A market-based recommender system,
, 22, 74--78, (2007).
[90]
Zakin
,
Ori
,
Elovici Y.
,
Levi
,
Metal
,
Rockach
,
Lior
,
Shafrir
,
Nir
,
Sinter
,
Guy
,
Pen
,
Ofer
,
Identifying computers hidden behind a nat using machine learning techniques,
, 335--340, (2007).
[91]
Elovici Y.
,
Kantor P.B.
,
A Decision Theoretic Approach to Combining Information Filters: An Analytical and Empirical Evaluation,
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY (JASIST)
, 57, 3, 306-320, (2006).
[92]
Elovici Y.
,
Meshiach A.
,
Cluster-analysis attack against a PRivAte Web solution (PRAW),
Online Information Review
, 30, 6, 624 - 643, (2006).
[93]
Elovici Y.
,
Using the knowledge-based temporal-abstraction (KBTA) method for detection of electronic threats,
, (2006).
[94]
Stopel
,
Dima
,
Boger
,
Zvi
,
Elovici Y.
,
Moskovitch
,
Robert
,
Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques,
, 15, 202--208, (2006).
[95]
Elovici Y.
,
Enhancing costumer privacy while searching for products and services on the World Wide Web,
Internet Research
, 15, 4, 378-399, (2005).
[96]
Meshiach A.
,
Elovici Y.
,
Kuflik T.
,
PRAW – A new Model for PrivAte Web Navigation,
Journal of the American Society for Information Science and Technology
, 56, 2, 159 - 172, (2005).
[97]
Meshiach
,
Elovici Y.
,
Adlay
,
Kuflik
,
Tzvika
,
PRAW--the model for PRivAte Web,
, 56, 159--172, (2005).
[98]
Elovici Y.
,
TDS-An Innovative Terrorist Detection System,
, 65, 75, (2005).
[99]
Elovici Y.
,
Anonymity Enhancing Technologies (AET): Opportunities and Threats,
Journal of Information Warfare
, 3, 3, 49-62, (2004).
[100]
Elovici Y.
,
Kandel A
,
Zaafrany O
,
Using Data Mining Techniques for Detecting Terror-Related Activities on the Web,
Journal of Information Warfare
, 3, 1, 17-28, (2004).
[101]
Elovici Y.
,
Anonymity Enhancing Technologies (AET): Opportunities and Threats,
Journal of Information Warfare
, 3, 3, 48-64, (2004).
[102]
Elovici Y.
,
Kandel
,
A
,
Zaafrany
,
O
,
Using data mining techniques for detecting terror-related activities on the web,
, 3, 17--29, (2004).
[103]
OmerZaafrany
,
Elovici Y.
,
Shapira .
,
Kandel
,
Abraham
,
Schneider
,
Moti
,
OHT-Online-HTML Tracer for Detecting Terrorist Activities on the Web,
, 371, (2004).
[104]
Zaafrany
,
Elovici Y.
,
O
,
Kandel
,
A
,
INTELLIGENT TECHNOLOGY FOR CONTENT MONITORING ON THE WEB,
, 58, 539--559, (2004).
[105]
Elovici Y.
,
A new protocol for anonymous Web transactions,
WSEAS Trans. Comput. (Greece)
, 3, 2, 499 - 506, (2004).
[106]
Elovici Y.
,
Braha D.
,
A Decision-Theoretic Approach to Data Mining,
IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans
, 33, 1, 42-51, (2003).
[107]
Elovici Y.
,
Kantor Paul
,
Using the Information Structure Model to Compare Profile-Based Information Filtering Systems,
Information Retrieval Journal
, 6, 1, 75-97, (2003).
[108]
Elovici Y.
,
Braha D.
,
A Decision-Theoretic Approach to Data Mining,
IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans
, 33, 1, 42-51, (2003).
[109]
Elovici Y.
,
Kantor P.
,
Using the Information Structure Model to Compare Profile-Based Information Filtering Systems,
Information Retrieval Journal
, 6, 1, 75-97, (2003).
[110]
Zaafrany
,
Elovici Y.
,
Omer
,
Kandel
,
Abraham
,
Using Data Mining for Detecting Terror-Related Activities on the Web,
, 271--280, (2003).
[111]
Elovici Y.
,
Kantor
,
B .
,
Using the information structure model to compare profile-based information filtering systems,
, 6, 75--97, (2003).
[112]
Elovici Y.
,
A bounded local adaptive packet pricing(BLAPP) scheme for IP networks.
, 2, 282--288, (2003).
[113]
Ahituv A.
,
Elovici Y.
,
Performance Evaluation of a Distributed Application,
Journal of the Operational Research Society
, 52, 8, 916-927, (2001).
[114]
Ahituv
,
Elovici Y.
,
N
,
Performance evaluation of a distributed application,
, 916--927, (2001).
[115]
Azaria H.
,
Elovici Y.
,
Modeling and Evaluation of A New Message-passing System for Parallel Multiprocessor Systems,
parallel computing
, 19, 6, 633-649, (1993).
[116]
Azaria H.
,
Elovici Y.
,
Hersch R.
,
Multiple Interfaces Message Passing System for Transputer Network,
Microprocessing and Microprogramming (continued as Journal of Systems Architecture)
, 34, 1-5, 237-242, (1992).
[117]
Ossmy
,
Ori
,
Tam
,
Ofir
,
Inbar
,
Elovici Y.
,
Ohad
,
MINDDESKTOP: COMPUTER ACCESSIBILITY FOR SEVERELY HANDICAPPED,
, (0).
[118]
Altshuler
,
Yaniv
,
Elovici Y.
,
Bekhor
,
Shlomo
,
Shiftan
,
Yoram
,
Pentland
,
Sandy .
,
Augmented Betweenness Centrality,
, (0).
[119]
Dolev
,
Shlomi
,
Elovici Y.
,
Routing Betweenness Centrality,
, (0).
[120]
Elovici Y.
,
Kantor
,
B .
,
Comparing Information Filtering Systems Using the Information Structure Model,
, (0).
[121]
Elovici Y.
,
Altshuler
,
Yaniv
,
Telekom Innovation Laboratories at BGU Telekom Innovation Laboratories at BGU,
, (0).
[122]
Mobasher
,
Bamshad
,
Ardissono
,
Liliana
,
Aimeur
,
Esma
,
Berendt
,
Bettina
,
Elovici Y.
,
Brusilovsky
,
Peter
,
Burke
,
Robin
,
Canny
,
John
,
Dumais
,
Susan
,
Felfernig
,
Alexander
,
others
,
Workshop on Intelligent Techniques for Web Personalization (ITWP),
, (0).
Show All
To the top
Conference Proceedings
[1]
Tenenboim Lena
,
Elovici Y.
,
Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks, SBP, Springer, (2013).
[2]
Pentland Alex
,
Bruckstein Alfred
,
Lazer David
,
Elovici Y.
,
Real World Anomalous Events Detection Based on Social Signals in Mobile Networks Traffic, The International School and Conference on Complex Networks(NetSci), (2012).
[3]
Aharony Nadav
,
Elovici Y.
,
How Many Makes a Crowd? On the Correlation between Groups'' Size and the Accuracy of Modeling, Computing Behavioral Modeling and Prediction(SBP), (2012).
[4]
Fire
,
Michael
,
Kagan
,
Dima
,
Elovici Y.
,
Data mining opportunities in geosocial networks for improving road safety, IEEE, 1--4, (2012).
[5]
Zilberman
,
Polina
,
Elovici Y.
,
Dolev
,
Shlomi
,
Brandes
,
Ulrik
,
Heuristics for Speeding Up Betweenness Centrality Computation, IEEE Computer Society, 302--311, (2012).
[6]
Chekina
,
L
,
Mimran
,
Elovici Y.
,
D
,
Detection of Deviations in Mobile Applications Network Behavior, (2012).
[7]
Altshuler
,
Yaniv
,
Aharony
,
Elovici Y.
,
Nadav
,
Fire
,
Micky
,
Pentland
,
Sandy .
,
Incremental learning with accuracy prediction of social and individual properties from mobile-phone data, IEEE Computer Society, 969--974, (2012).
[8]
Fire
,
Michael
,
Kagan
,
Elovici Y.
,
Dima
,
Elishar
,
Aviad
,
Social Privacy Protector-Protecting Users' Privacy in Social Networks, 46--50, (2012).
[9]
Menahem
,
Eitan
,
Elovici Y.
,
Nakibly
,
Gabi
,
Network-based intrusion detection systems go active!, 1004--1006, (2012).
[10]
Fire Micky
,
Elovici Y.
,
Link Prediction in Social Networks using Computationally Efficient Topological Features, IEEE International Conference on Social Computing, (2011).
[11]
Rami Puzis
,
Elovici Y.
,
Link Prediction in Social Networks using Computationally Efficient Topological Features, (2011).
[12]
Fire
,
Michael
,
Tenenboim
,
Lena
,
Lesser
,
Elovici Y.
,
Ofrit
,
Link prediction in social networks using computationally efficient topological features, IEEE Computer Society, 73--80, (2011).
[13]
Porat
,
Talya
,
Rief
,
Elovici Y.
,
Inbal
,
LoOkie-it feels like being there, 1873--1878, (2011).
[14]
Bercovitch
,
M
,
Renford
,
M
,
Hasson
,
Elovici Y.
,
L
,
HoneyGen: An automated honeytokens generator, IEEE, 131--136, (2011).
[15]
Gafny
,
Ma'ayan
,
Elovici Y.
,
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure, 765--768, (2011).
[16]
Harel
,
Amir
,
Elovici Y.
,
Dynamic Sensitivity-Based Access Control, IEEE, 201--203, (2011).
[17]
Harel
,
Amir
,
Elovici Y.
,
Eliciting domain expert misuseability conceptions, 193--194, (2011).
[18]
Rozenberg
,
Boris
,
Elovici Y.
,
Gudes
,
Ehud
,
Fledel
,
Yuval
,
A method for detecting unknown malicious executables, IEEE Computer Society, 190--196, (2011).
[19]
Elovici Y.
,
Cost Benefit Deployment of DNIPS, IEEE International Conference on Communication (ICC),ICC 2010 - 2010 IEEE International Conference on Communications, IEEE, 5 pp. -, (2010).
[20]
Zilberman Polina
,
Elovici Y.
,
Analyzing group communication for preventing data leakage via email, Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, IEEE, (2010).
[21]
Altshuler
,
Yaniv
,
Elovici Y.
,
Dolev
,
Shlomi
,
Aharony
,
Nadav
,
Ttled random walks for collaborative monitoring, IEEE, 1--6, (2010).
[22]
Gafny
,
Ma'ayan
,
Elovici Y.
,
Detecting data misuse by applying context-based data linkage, 3--12, (2010).
[23]
Harel
,
Amir
,
Elovici Y.
,
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight, 13--20, (2010).
[24]
Hermoni
,
Ofer
,
Dolev
,
Elovici Y.
,
Shlomi
,
Rendezvous tunnel for anonymous publishing, 690--692, (2010).
[25]
Fledel
,
Yuval
,
Elovici Y.
,
Automated static code analysis for classifying android applications using machine learning, IEEE Computer Society, 329--333, (2010).
[26]
Elovici Y.
,
Clustering di-graphs for continuously verifying users according to their typing patterns,2010 IEEE 26th Convention of Electrical & Electronics Engineers in Israel (IEEEI 2010), IEEE, 000445--000449, (2010).
[27]
Elovici Y.
,
Continuous verification using keystroke dynamics,Proceedings 2010 International Conference on Computational Intelligence and Security (CIS 2010), IEEE Computer Society, 411--415, (2010).
[28]
Elovici Y.
,
Identity Theft, Computers and Behavioral Biometrics, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2009),2009 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, 155 - 60, (2009).
[29]
Kruglov Alexander
,
Puzis Rami
,
Elovici Y.
,
Attentive Digital Signage System, Digital Signage mit Interaktiven Displays Workshop, (2009).
[30]
Dolev Shlomi
,
Elovici Y.
,
Kesselman Arik
,
Zilberman Polina
,
Trawling Traffic under Attack, Second International Workshop on Reliability, Availability, and Security (WRAS 2009), (2009).
[31]
Rozenberg Boris
,
Gudes Ehud
,
Elovici Y.
,
SISR - a New Model for Epidemic Spreading of Electronic Threats, 12th Information Security Conference (ISC''09) Pisa, Italy, September 7-9, 2009, (2009).
[32]
Moskovitch Robert
,
Feher Clint
,
Elovici Y.
,
A Chronological Evaluation of Unknown Malcode Detection, Pacific Asia Workshop on Intelligence and Security Informatics Bangkok, Thailand, April 27, 2009, (2009).
[33]
Elovici Y.
,
kACTUS 2.0: Privacy Preserving in Classification Tasks using k-Anonymity, ISIPS 2008: Interdisciplinary Studies in Information Privacy and Security, New Brunswick, New Jersey, May 12, 2008, (2008).
[34]
Elovici Y.
,
Unknown Malicious Code Detection – Practical Issues, ECIW 2008. The 7th European Conference on Information Warfare and Security, University of Plymouth, UK, June 30– July 1st, 2008, (2008).
[35]
Stopel D.
,
Feher C.
,
Nissim N.
,
Elovici Y.
,
Unknown Malcode Detection via Text Categorization and the Imbalance Problem, ”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2008), Taipei, Taiwan, June 17-20, 2008, IEEE, (2008).
[36]
Elovici Y.
,
Unknown Malcode Detection – A Chronological Evaluation, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2008), Taipei, Taiwan, June 17-20, 2008, (2008).
[37]
Feher Clint
,
Tzahar Nir
,
Berger E
,
Gitelman M
,
Dolev Shlomi
,
Elovici Y.
,
Unknown Malcode Detection Using OPCODE Representation, European Conference on Intelligence and Security Informatics 2008 (EuroISI08) Esbjerg, Denmark, December 3-5, 2008, (2008).
[38]
Puzis Rami
,
Klippel M
,
Elovici Y.
,
Dolev Shlomi
,
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures, European Conference on Intelligence and Security Informatics 2008 (EuroISI08), (2008).
[39]
Rozenberg B
,
Gudes E
,
Elovici Y.
,
A Distributed Framework for the Detection of new worm-related Malware, European Conference on Intelligence and Security Informatics 2008 (EuroISI08), (2008).
[40]
Moskovitch
,
Robert
,
Nissim
,
Elovici Y.
,
Nir
,
Englert
,
Roman
,
Active learning to improve the detection of unknown computer worms activity, IEEE, 1--8, (2008).
[41]
Zakin Ori
,
Levi M.
,
Elovici Y.
,
Shafrir N.
,
Sinter G.
,
Pen O.
,
Identifying Computers Hidden Behind a NAT using Machine Learning Techniques, ECIW 2007. The 6th European Conference on Information Warfare and Security, Defence College of Management and Technology, Shrivenham, UK, July 2-3, 2007, (2007).
[42]
Shabtai Asaf
,
Atlas Maor
,
Elovici Y.
,
Evaluation of a Temporal Abstraction Knowledge Acquisition Tool in the Network Security Domain, 4th international conference on knowledge capture (K-CAP2007), Oct 28-31, 2007, Canada, (2007).
[43]
Nissim Nir
,
Stopel Dima
,
Feher Clint
,
Englert Roman
,
Elovici Y.
,
Improving the Detection of Unknown Computer Worms Activity using Active Learning, 30th Annual German Conference on Artificial Intelligence (KI-2007), Springer, (2007).
[44]
Gus Ido
,
Pluderman Shay
,
Stopel Dima
,
Parmet Y.
,
Elovici Y.
,
Detection of Unknown Computer Worms Activity Based on Computer Behaviour Using Data Mining, ", IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007, Honolulu, Hawaii, USA, 1-5 April 2007, (2007).
[45]
Elovici Y.
,
Simulating Threats Propagation Within the NSP Infrastructure, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007),2007 IEEE Intelligence and Security Informatics, IEEE, 380 -, (2007).
[46]
Tubi Meytal
,
Puzis Rami
,
Elovici Y.
,
Deployment of DNIDS in Social Networks, ", IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007), (2007).
[47]
Nissim N.
,
Elovici Y.
,
Malicious Code Detection and Acquisition Using Active Learning, ", IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007), Rutgers University, New Jersey, USA, May 23-24, 2007, IEEE, (2007).
[48]
Shirtz D.
,
Bluvband Z.
,
Elovici Y.
,
Computer Systems & Information SSR: a Unified Approach for Decision Making, 53nd Annual Reliability & Maintainability Symposium (RAMS). Orlando, Florida USA, January 22-25, 2007, (2007).
[49]
Gus Ido
,
Pluderman Shay
,
Stopel Dima
,
Feher Clint
,
Elovici Y.
,
Host Based Intrusion Detection using Machine Learning, IEEE Information and Security Informatics Rutgers University, New Jersey, US, May 2007, (2007).
[50]
Elovici Y.
,
Applying machine learning techniques for detection of malicious code in network traffic,Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 44 - 50, (2007).
[51]
Tubi
,
Meytal
,
Elovici Y.
,
Deployment of DNIDS in social networks, IEEE, 59--65, (2007).
[52]
Moskovitch
,
Robert
,
Gus
,
Ido
,
Pluderman
,
Shay
,
Elovici Y.
,
Stopel
,
Dima
,
Detection of unknown computer worms activity based on computer behavior using data mining, IEEE, 169--177, (2007).
[53]
Moskovitch
,
Robert
,
Pluderman
,
S
,
Gus
,
I
,
Stopel
,
Elovici Y.
,
Dima
,
Feher
,
C
,
Host based intrusion detection using machine learning, IEEE, 107--114, (2007).
[54]
Elovici Y.
,
An Intelligent, Interactive Tool for Exploration and Visualization of Time-Oriented Security Data, ACM Workshop on Visualization for Computer Security (VizSEC2006), Virginia, USA, November 3 2006,Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06, 15 - 22, (2006).
[55]
Shabtai Asaf
,
Elovici Y.
,
Monitoring for Malware Using a Temporal-Abstraction Knowledge Base, 8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006, (2006).
[56]
Stoppel Dima
,
Boger Zvi
,
Moskovitch Robert
,
Elovici Y.
,
Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques, International Conference on Neural Networks ICNN 2006, (2006).
[57]
Elovici Y.
,
Application of Artificial Neural Networks Techniques to Computer Worm Detection, IEEE World Congress on Computational Intelligence (IEEE WCCI 2006), Vancouver, BC, Canada, July 16-21, 2006,IEEE International Conference on Neural Networks - Conference Proceedings, 2362 - 2369, (2006).
[58]
Shabtai Asaf
,
Elovici Y.
,
Using the Knowledge-Based Temporal Abstraction (KBTA) Method for Detection of Electronic Threats, 5th European Conference on Information Warfare and Security, National Defence College, Helsinki, Finland, June1-2, 2006, (2006).
[59]
Stopel
,
Dima
,
Boger
,
Zvi
,
Elovici Y.
,
Moskovitch
,
Robert
,
Application of artificial neural networks techniques to computer worm detection, IEEE, 2362--2369, (2006).
[60]
Elovici Y.
,
Zaafrany O.
,
Schneider M.
,
Friedman M.
,
Kandel M.
,
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS), IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005),Intelligence and Security Informatics, Proceedings, Springer-Verlag, 244-255, (2005).
[61]
Shmueli Erez
,
Waisenberg R
,
Elovici Y.
,
Gudes Ehud
,
Designing Secure Indexes for Encrypted Databases, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, University of Connecticut, (2005).
[62]
Elovici Y.
,
Waisenberg R.
,
Shmueli E.
,
Gudes E.
,
A Structure Preserving Database Encryption Scheme, VLDB 2004 Workshop, SDM 2004,Secure Data Management, Proceedings, Springer-Verlag, 28-40, (2004).
[63]
Uziyahu G.B.
,
Elovici Y.
,
Illusive Browsing: Achieving Privacy on the Web using a P2P network, 5th WSEAS Int. Conf. on Automation & Information (ICAI’04),WSEAS Trans. Inf. Sci. Applic. (Greece), 1734 - 42, (2004).
[64]
Elovici Y.
,
Shpanglat Yael
,
Hidden Web Privacy Preservation Surfing (Hi-WePPS) Model, CIPLIT’s 2004, 5th Annual Symposium on Privacy and Identity, (2004).
[65]
Zaafrany O
,
Kandel A
,
Elovici Y.
,
OHT- Online-HTML Tracer for Detecting Terrorist Activities on the Web, ECIW 2004. The 3rd European Conference on Information Warfare and Security, (2004).
[66]
Friedman M
,
Schneider M
,
Zaafrany O
,
Kandel A
,
Elovici Y.
,
A fuzzy-Based Algorithm for Web Document Clustering, Nafips 2004 – North American Fuzzy Information Processing Society, (2004).
[67]
Elovici Y.
,
Kandel A.
,
Zaafrany O.
,
Schneider M.
,
Friedman M.
,
Terrorist Detection System, The 15th European Conference on Machine Learning (ECML) and the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2004), Springer-Verlag, Lectures Notes in Artificial Intelligence 3202, 540-542, Pisa, Italy, September 20-24, 2004, Springer, (2004).
[68]
Ben-Uziyahu G.
,
Elovici Y.
,
Illusive Browsing: Achieving Privacy on the Web using a P2P network, 5th WSEAS Int. Conf. on Automation & Information (ICAI’04), (2004).
[69]
Kandel
,
Abraham
,
Schneider
,
Moti
,
Zaafrany
,
Elovici Y.
,
Omer
,
A fuzzy-based algorithm for web document clustering, IEEE, 524--527, (2004).
[70]
Zaafrany O.
,
Kandel A.
,
Elovici Y.
,
Using Data Mining Techniques for Detecting Terror-Related Activities on the Web, ECIW 2003. The 2nd European Conference on Information Warfare and Security, 271-280, University of Reading, UK, June 30 – July 1, 2003, 271-280, (2003).
[71]
Zaafrany O.
,
Kandel A.
,
Elovici Y.
,
Content-Based Methodology for Anomaly Detection onthe Web, Atlantic Web Intelligence Conference (AWIC'03), Springer-Verlag, 113 – 123, (2003).
[72]
Kuflik T.
,
Maschiach A.
,
Elovici Y.
,
Privacy Preservation Improvement by Learning Optimal Profile Generation Rate, UM’03 - 9th International Conference on User Modeling, Springer-Verlag, Lecture Notes in Computer Science 2702, 168-177, University of Pittsburgh, USA, June 22-25, 2003,User Modeling 2003, Proceedings, Springer-Verlag, 168-177, (2003).
[73]
Elovici Y.
,
Per-packet Pricing Scheme for IP Networks, 10th International Conference on Telecommunications, ICT’2003, 1494-1500, Papeete, Tahiti, French Polynesia, February 23-March 1, 2003,10th International Conference on Telecommunications. ICT'2003 (Cat. No.03EX628), 1494 - 500, (2003).
[74]
Elovici Y.
,
A Bounded Local Adaptive Packet Pricing (BLAPP) Scheme for IP Networks, 3rd WSEAS Int. Conf. on Applied Informatics and Communications (AIC’03), Rhodes Island, Greece, November 15-17, 2003, (2003).
[75]
Elovici Y.
,
Illusive Routing: Achieving Anonymity Using Multiple Cellular Network Providers, 2nd WSEAS Intern. Conf. on Electronics, Hardware, Wireless & Optical Communications (EHAC 2003), Mykonos Island, Greece, August 11-13, 2003, (2003).
[76]
Elovici Y.
,
Per-packet pricing scheme for IP networks, IEEE, 1494--1500, (2003).
[77]
Elovici Y.
,
Maschiach A.
,
A New Privacy Model for Web Surfing, NGITS 2002, Springer-Verlag,(Lecture Notes), 45-57, (2002).
[78]
Elovici Y.
,
Maschiach A.
,
A New Privacy Model for Hiding Group Interests while Accessing the Web, Workshop on Privacy in the Electronic Society, 63-70, (in association with 9th ACM Conference on Computer and Communications Security). Washington, DC, USA, November 21, 2002 - Sponsored by ACM SIGSAC,Proceedings of the ACM Conference on Computer and Communications Security, 63 - 70, (2002).
[79]
Elovici Y.
,
Hersh R.D.
,
Azaria H.
,
Message Passing System for Closely Coupled Multiprocessor System, 17th Convention of Electrical and Electronics Engineers in Israel. Proceedings (Cat. No.90TH0360-8),17th Convention of Electrical and Electronics Engineers in Israel. Proceedings (Cat. No.90TH0360-8), 275 - 8, (1991).
[80]
Elovici Y.
,
Azaria H.
,
Message passing system for transputer network MTT implementation, Proceedings of the Third International Conference on Applications of Transputers,Applications of Transputers 3. Proceedings of the Third International Conference on Applications of Transputers, 650 - 5, (1991).
[81]
Nissim Nir
,
Elovici Y.
,
Improving the Detection of Unknown Computer Worms Activity using Active Learning, The 11th International Conference on Information Fusion, ().
[82]
Nissim N.
,
Elovici Y.
,
Malicious Code Detection Using Active Learning, 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD, PinKDD08, ().
Show All
To the top
Technical Report
[1]
Aharony Nadav
,
Pentland Alex ("Sandy")
,
Elovici Y.
,
(23415/2012), Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data, (2012).
[2]
Puzis Rami
,
Elovici Y.
,
(23416/2012), Organization Mining using Online Social Networks, (2012).
[3]
Puzis Rami
,
Elovici Y.
,
(23417/2012), Computationally Efficient Link Prediction in Variety of Social Networks, (2012).
[4]
Elovici Y.
,
(23418/2012), Strangers Intrusion Detection - Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies, (2012).
[5]
Elovici Y.
,
(23419/2012), Predicting Student Exam''s Scores by Analyzing Social Network Data, (2012).
Show All
To the top
misc
[1]
Ossmy
,
Ory
,
Tam
,
Ofir
,
Elovici Y.
,
Rozen
,
Ariel
,
Apparatus for operating a computer using thoughts or facial impressions, (2012).
[2]
Elovici Y.
,
Tachan
,
Gil
,
System that provides early detection, alert, and response to electronic threats, (2012).
[3]
Feher
,
Clint
,
Moskovitch
,
Elovici Y.
,
Rober
,
System for verifying user identity via mouse dynamics, (2012).
[4]
Menahem
,
Eitan
,
Elovici Y.
,
Stacking schema for classification tasks, (2012).
[5]
Moskovitch
,
Elovici Y.
,
Robert
,
Unknown malcode detection using classifiers with optimal training sets, (2012).
[6]
Shimshon
,
Tomer
,
Moskovitch
,
Elovici Y.
,
Robert
,
Method for continuously verifying user identity via keystroke dynamics, (2012).
[7]
Altshuler
,
Elovici Y.
,
Yaniv
,
Dolev
,
Shiomi
,
Shabtal
,
Asaf
,
Fledel
,
Yuval
,
A collaborative system for protecting against the propagation of malwares in a network, (2011).
[8]
Rozenberg
,
Boris
,
Elovici Y.
,
Gudes
,
Ehud
,
Distributed system and method for the detection of eThreats, (2011).
[9]
Tahan
,
Gil
,
Elovici Y.
,
Architecture for identifying electronic threat patterns, (2011).
[10]
Altshuler
,
Elovici Y.
,
Yaniv
,
Dolev
,
Shlomi
,
Fledel
,
Yuval
,
COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK, (2010).
[11]
Rozenberg
,
Boris
,
Elovici Y.
,
Gudes
,
Ehud
,
Method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences, (2010).
[12]
Rozenberg
,
Boris
,
Elovici Y.
,
Gudes
,
Ehud
,
System and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences, (2010).
[13]
Sonnenschein
,
Elazar
,
Govrin
,
Elovici Y.
,
Amir
,
Avidor
,
Yoav
,
Sonnenschein
,
Minelu
,
Endoscopic device comprising linear staplers and a video camera on its distal end, (2010).
Show All
To the top
Poster
[1]
Rozenberg Boris
,
Gudes Ehud
,
Elovici Y.
,
Fledel Yuval
,
Method for Detecting Unknown Malicious Executables, OMICS Publishing Group USA, (2009).
[2]
Kanonov U.
,
Elovici Y.
,
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach”, (2009).
[3]
Elovici Y.
,
Detecting Malicious Applications on Android Using Anomaly Detection, (2009).
[4]
Fledel Y.
,
Elovici Y.
,
Detecting Malicious Applications on Android by Applying Machine Learning Classifiers to Static Features, (2009).
Show All
To the top
misc
[1]
Menahem
,
Eitan
,
Elovici Y.
,
An improved stacking schema for classification tasks, (2009).
[2]
Shmueli
,
Erez
,
Elovici Y.
,
Kruglov
,
Alexander
,
Englert
,
Roman
,
Comprehensive computer implemented system and method for adapting the content of digital signage displays, (2009).
[3]
Dolev
,
Elovici Y.
,
Shlomo
,
Process for finding the most prominent group of vertices in complex networks, (2008).
[4]
Tubi
,
Meital
,
Elovici Y.
,
Deployment of distributed network intrusion detection systems in social networks, (2008).
[5]
Moskovitch
,
Robert
,
Stopel
,
Dima
,
Elovici Y.
,
Boger
,
Zvi
,
METHOD AND SYSTEM FOR DETECTING MALICIOUS BEHAVIORAL PATTERNS IN A COMPUTER, USING MACHINE LEARNING, (2008).
[6]
Tahan
,
Gil
,
Elovici Y.
,
Automatic extraction of signatures for Malware, (2008).
[7]
Elovici Y.
,
Waisenberg
,
Ronen
,
Shmueli
,
Erez
,
STRUCTURE PRESERVING DATABASE ENCRYPTION METHOD AND SYSTEM, (2007).
[8]
Englert
,
Elovici Y.
,
Roman
,
Kurze
,
Martin
,
Henke
,
Katja
,
Method and System for Providing and Reconstructing a Photorealistic Three-Dimensional Environment, (2007).
[9]
Levi
,
Tamir
,
Spehr
,
Paul
,
Glasberg
,
Offer
,
Harel
,
Elovici Y.
,
Tami
,
Milman
,
Lena
,
Rousso
,
Benny
,
Sonnenschein
,
Elazar
,
Sonnenschein
,
Minelu
,
Govrin
,
Amir
,
Electrode Assemblies, Tools, And Methods For Gastric Wall Implantation, (2007).
[10]
Moskovitch
,
Robert
,
Stopel
,
Dima
,
Elovici Y.
,
Boger
,
Zvi
,
Improved method and system for detecting malicious behavioral patterns in a computer, using machine learning, (2007).
[11]
Moskovitch
,
Robert
,
Stopel
,
Dima
,
Elovici Y.
,
Boger
,
Zvi
,
Method and system for detecting malicious behavioral patterns in a computer, using machine learning, (2007).
[12]
Sonnenschein
,
Elovici Y.
,
Elazar
,
Sonnenschein
,
Minelu
,
MULTIPURPOSE ENDOSCOPY SUITE, (2007).
[13]
Elovici Y.
,
Vaisenberg
,
Ronen
,
Shmueli
,
Erez
,
Structure Preserving Database Encryption Method and System, (2006).
[14]
Elovici Y.
,
WAISENBERG
,
Ronen
,
SHMUELI
,
Erez
,
others
,
STRUCTURE PRESERVING DATABASE ENCRYPTION METHOD AND SYSTEM, (2005).
[15]
Sonnenschein
,
Elovici Y.
,
Elazar
,
Long
,
L .
,
Bakos
,
J .
,
Swain
,
Paul .
,
Device employing camera connector, (2005).
[16]
Sonnenschein
,
Elovici Y.
,
Elazar
,
Long
,
L .
,
Bakos
,
J .
,
Swain
,
Paul .
,
Methods and devices related to camera connectors, (2005).
[17]
Sonnenschein
,
Elovici Y.
,
Elazar
,
Sonnenschein
,
Minelu
,
Multipurpose Endoscopy Suite, (2005).
[18]
Sonnenschein
,
Elazar
,
Govrin
,
Elovici Y.
,
Amir
,
Avidor
,
Yoav
,
Sonnenschein
,
Minelu
,
Endoscopic device comprising linear staplers and a video camera on its distal end, (0).
Show All
To the top
incollection
[1]
Fire
,
Michael
,
Elovici Y.
,
Link Prediction in Highly Fractional Data Sets, Springer, (2013).
[2]
Altshuler
,
Yaniv
,
Fire
,
Elovici Y.
,
Michael
,
Shmueli
,
Erez
,
Bruckstein
,
Alfred
,
Pentland
,
Sandy .
,
Lazer
,
David
,
Detecting Anomalous Behaviors Using Structural Properties of Social Networks, Springer, (2013).
[3]
Altshuler
,
Yaniv
,
Elovici Y.
,
Aharony
,
Nadav
,
Pentland
,
Alex
,
Cebrian
,
Manuel
,
Stealing reality: when criminals become data scientists (or vice versa), Springer, (2013).
[4]
Altshuler
,
Yaniv
,
Fire
,
Michael
,
Elovici Y.
,
Aharony
,
Nadav
,
Volkovich
,
Zeev
,
Pentland
,
Sandy .
,
Trade-Offs in Social and Behavioral Modeling in Mobile Networks, Springer, (2013).
[5]
Elovici Y.
,
Altshuler
,
Yaniv
,
Introduction to Security and Privacy in Social Networks, Springer, (2013).
[6]
Fire
,
Michael
,
Katz
,
Elovici Y.
,
Gilad
,
Links Reconstruction Attack, Springer, (2013).
[7]
Fire
,
Michael
,
Elovici Y.
,
Katz
,
Gilad
,
Predicting student exam’s scores by analyzing social network data, Springer, (2012).
[8]
Altshuler
,
Yaniv
,
Fire
,
Elovici Y.
,
Michael
,
Aharony
,
Nadav
,
Pentland
,
Sandy .
,
How many makes a crowd? On the evolution of learning as a factor of community coverage, Springer, (2012).
[9]
Altshuler
,
Yaniv
,
Elovici Y.
,
Dolev
,
Shlomi
,
TTLed Random Walks for Collaborative Monitoring in Mobile and Social Networks, Springer, (2012).
[10]
Fledel
,
Yuval
,
Potashnik
,
Elovici Y.
,
Dennis
,
Google Android: An Updated Security Review, Springer, (2012).
[11]
Menahem
,
Eitan
,
Elovici Y.
,
Pusiz
,
Rami
,
Detecting spammers via aggregated historical data set, Springer, (2012).
[12]
Elovici Y.
,
Data Leakage/Misuse Scenarios, Springer, (2012).
[13]
Elovici Y.
,
Future Trends in Data Leakage, Springer, (2012).
[14]
Elovici Y.
,
Introduction to Information Security, Springer, (2012).
[15]
Elovici Y.
,
Privacy, Data Anonymization, and Secure Data Publishing, Springer, (2012).
[16]
Elovici Y.
,
A Taxonomy of Data Leakage Prevention Solutions, Springer, (2012).
[17]
Weiss
,
Yael
,
Elovici Y.
,
Fledel
,
Yuval
,
Cost-Sensitive Detection of Malicious Applications in Mobile Devices, Springer, (2012).
[18]
Hermoni
,
Ofer
,
Dolev
,
Elovici Y.
,
Shlomi
,
Rendezvous tunnel for anonymous publishing: clean slate and tor based designs, Springer, (2011).
[19]
Tubi
,
Meytal
,
Elovici Y.
,
Optimizing Targeting of Intrusion Detection Systems in Social Networks, Springer, (2010).
[20]
Elovici Y.
,
Applying behavioral detection on android-based devices, Springer, (2010).
[21]
Kisilevich
,
Elovici Y.
,
Slava
,
kACTUS 2: Privacy preserving in classification tasks using k-Anonymity, Springer, (2009).
[22]
Moskovitch
,
Robert
,
Elovici Y.
,
Feher
,
Clint
,
A chronological evaluation of unknown malcode detection, Springer, (2009).
[23]
Moskovitch
,
Robert
,
Elovici Y.
,
Nissim
,
Nir
,
Malicious code detection using active learning, Springer, (2009).
[24]
Rozenberg
,
Boris
,
Elovici Y.
,
Gudes
,
Ehud
,
SISR--A New Model for Epidemic Spreading of Electronic Threats, Springer, (2009).
[25]
Klippel
,
David .
,
Elovici Y.
,
Dolev
,
Shlomi
,
Optimization of NIDS placement for protection of intercommunicating critical infrastructures, Springer, (2008).
[26]
Rozenberg
,
Boris
,
Elovici Y.
,
Gudes
,
Ehud
,
A distributed framework for the detection of new worm-related malware, Springer, (2008).
[27]
Moskovitch
,
Robert
,
Nissim
,
Nir
,
Stopel
,
Elovici Y.
,
Dima
,
Feher
,
Clint
,
Englert
,
Roman
,
Improving the detection of unknown computer worms activity using active learning, Springer, (2007).
[28]
Elovici Y.
,
Spanglet
,
Yael
,
Hidden-Web Privacy Preservation Surfing (Hi-Wepps) Model, Springer, (2006).
[29]
Shmueli
,
Erez
,
Elovici Y.
,
Waisenberg
,
Ronen
,
Gudes
,
Ehud
,
Designing secure indexes for encrypted databases, Springer, (2005).
[30]
Elovici Y.
,
Waisenberg
,
Ronen
,
Shmueli
,
Erez
,
Gudes
,
Ehud
,
A structure preserving database encryption scheme, Springer, (2004).
[31]
Kuflik
,
Tsvi
,
Elovici Y.
,
Maschiach
,
Adlai
,
Privacy preservation improvement by learning optimal profile generation rate, Springer, (2003).
Show All
To the top
BGU
|
Faculty
|
Department
נכתב במסגרת שיפור השירות באונב"ג