Yuval Elovici
Computer scientist
Yuval Elovici's AcademicInfluence.com Rankings

Download Badge
Computer Science
Yuval Elovici's Degrees
- Bachelors Computer Science Tel Aviv University
- Masters Computer Science Tel Aviv University
- PhD Computer Science Tel Aviv University
Similar Degrees You Can Earn
Why Is Yuval Elovici Influential?
(Suggest an Edit or Addition)According to Wikipedia, Yuval Elovici is a computer scientist. He is a professor in the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev , where he is the incumbent of the Davide and Irene Sala Chair in Homeland Security Research. He is the director of the Cyber Security Research Center at BGU and the founder and director of the Telekom Innovation Laboratories at Ben-Gurion University. In addition to his roles at BGU, he also serves as the lab director of Singapore University of Technology and Design’s ST Electronics-SUTD Cyber Security Laboratory, as well as the research director of iTrust. In 2014 he co-founded Morphisec, a start-up company, that develops cyber security mechanisms related to moving target defense.
Yuval Elovici's Published Works
Published Works
- “Andromaly”: a behavioral malware detection framework for android devices (2012) (785)
- N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders (2018) (618)
- Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection (2018) (594)
- Google Android: A Comprehensive Security Assessment (2010) (421)
- Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey (2009) (294)
- ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis (2017) (286)
- Online Social Networks: Threats and Solutions (2013) (251)
- Detecting unknown malicious code by applying classification techniques on OpCode patterns (2012) (241)
- A Survey of Data Leakage Detection and Prevention Solutions (2012) (202)
- Link Prediction in Social Networks Using Computationally Efficient Topological Features (2011) (189)
- Unknown Malcode Detection Using OPCODE Representation (2008) (188)
- Detection of Unauthorized IoT Devices Using Machine Learning Techniques (2017) (180)
- Automated Static Code Analysis for Classifying Android Applications Using Machine Learning (2010) (177)
- Securing Android-Powered Mobile Devices Using SELinux (2010) (166)
- Mobile malware detection through analysis of deviations in application network behavior (2014) (165)
- Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers (2017) (155)
- Routing betweenness centrality (2010) (149)
- BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations (2015) (147)
- Improving malware detection by applying multi-inducer ensemble (2009) (144)
- GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies (2015) (142)
- User identity verification via mouse dynamics (2012) (134)
- CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning (2019) (132)
- AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies (2014) (130)
- Efficient Multidimensional Suppression for K-Anonymity (2010) (126)
- Dynamic Malware Analysis in the Modern Era—A State of the Art Survey (2019) (122)
- Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method (2010) (113)
- Detection of unknown computer worms based on behavioral classification of the host (2008) (111)
- Unknown malcode detection via text categorization and the imbalance problem (2008) (104)
- Google Android: A State-of-the-Art Review of Security Mechanisms (2009) (103)
- USBee: Air-gap covert-channel via electromagnetic emission from USB (2016) (102)
- Novel active learning methods for enhanced PC malware detection in windows OS (2014) (101)
- Introduction to Information Security (2012) (100)
- Friend or foe? Fake profile identification in online social networks (2013) (99)
- dr0wned - Cyber-Physical Attack with Additive Manufacturing (2016) (96)
- LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED (2017) (94)
- Security of additive manufacturing: Attack taxonomy and survey (2018) (93)
- Security Testbed for Internet-of-Things Devices (2019) (93)
- Strangers Intrusion Detection - Detecting Spammers and Fake Proles in Social Networks Based on Topology Anomalies (2012) (92)
- Entity Matching in Online Social Networks (2013) (90)
- Troika - An improved stacking schema for classification tasks (2009) (90)
- SIPHON: Towards Scalable High-Interaction Physical Honeypots (2017) (90)
- Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks (2013) (89)
- Computationally efficient link prediction in a variety of social networks (2013) (87)
- DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN (2018) (87)
- Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures (2018) (87)
- Identity theft, computers and behavioral biometrics (2009) (84)
- Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic (2007) (80)
- Organization Mining Using Online Social Networks (2013) (78)
- Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration') (2017) (77)
- Applying Behavioral Detection on Android-Based Devices (2010) (76)
- Detection of malicious PDF files and directions for enhancements: A state-of-the art survey (2015) (74)
- Unknown malcode detection and the imbalance problem (2009) (73)
- CIoTA: Collaborative IoT Anomaly Detection via Blockchain (2018) (72)
- HoneyGen: An automated honeytokens generator (2011) (72)
- Database encryption: an overview of contemporary challenges and design considerations (2010) (71)
- Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers (2016) (69)
- Insight Into Insiders and IT (2018) (69)
- Detecting unknown computer worm activity via support vector machines and active learning (2012) (67)
- Fast algorithm for successive computation of group betweenness centrality. (2007) (66)
- An optical covert-channel to leak data through an air-gap (2016) (66)
- ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology (2017) (66)
- aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR) (2017) (64)
- CoBAn: A context based model for data leakage prevention (2014) (62)
- Finding the most prominent group in complex networks (2007) (61)
- Homing Socialbots: Intrusion on a specific organization's employee using Socialbots (2013) (59)
- ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields (2018) (59)
- Designing Secure Indexes for Encrypted Databases (2005) (59)
- Predicting Student Exam's Scores by Analyzing Social Network Data (2012) (58)
- PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines (2018) (58)
- SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research (2016) (57)
- Advanced Security Testbed Framework for Wearable IoT Devices (2016) (56)
- SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods (2016) (53)
- USB-based attacks (2017) (52)
- Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers (2017) (51)
- Continuous Verification Using Keystroke Dynamics (2010) (49)
- MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication (2018) (48)
- A Structure Preserving Database Encryption Scheme (2004) (46)
- HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (2019) (46)
- Quantifying the resilience of machine learning classifiers used for cyber security (2018) (46)
- Incremental deployment of network monitors based on Group Betweenness Centrality (2009) (45)
- A decision-theoretic approach to data mining (2003) (44)
- M-Score: A Misuseability Weight Measure (2012) (44)
- Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack (2017) (43)
- Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain (2021) (43)
- Link Prediction in Highly Fractional Data Sets (2013) (42)
- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) (2011) (42)
- Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks (2017) (42)
- Digital Audio Signature for 3D Printing Integrity (2019) (41)
- Improving the Detection of Unknown Computer Worms Activity Using Active Learning (2007) (41)
- A model of the information security investment decision-making process (2016) (41)
- Application of Artificial Neural Networks Techniques to Computer Worm Detection (2006) (41)
- F-Sign: Automatic, Function-Based Signature Generation for Malware (2011) (40)
- ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files (2014) (40)
- Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study (2018) (39)
- Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things (2017) (38)
- SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps (2019) (38)
- MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields (2018) (38)
- Malicious Code Detection Using Active Learning (2009) (38)
- Network Flow Watermarking: A Survey (2017) (38)
- Augmented Betweenness Centrality for Mobility Prediction in Transportation Networks (2011) (38)
- Bridgeware: the air-gap malware (2018) (38)
- Ethical Considerations when Employing Fake Identities in Online Social Networks for Research (2014) (37)
- Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems (2020) (37)
- The Translucent Patch: A Physical and Universal Attack on Object Detectors (2020) (37)
- PRAW - A PRivAcy model for the Web (2005) (36)
- The CASH algorithm-cost-sensitive attribute selection using histograms (2013) (36)
- ALDROID: efficient update of Android anti-virus software using designated active learning methods (2016) (36)
- User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study (2020) (36)
- A new privacy model for hiding group interests while accessing the Web (2002) (35)
- Combining one-class classifiers via meta learning (2011) (35)
- Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks (2020) (35)
- Data mining opportunities in geosocial networks for improving road safety (2012) (35)
- Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data (2011) (34)
- Using Data Mining Techniques for Detecting Terror-Related Activities on the Web (2004) (34)
- Collaborative attack on Internet users' anonymity (2009) (34)
- Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining (2018) (34)
- Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework (2016) (33)
- An intelligent, interactive tool for exploration and visualization of time-oriented security data (2006) (33)
- Defense Methods Against Adversarial Examples for Recurrent Neural Networks (2019) (33)
- Clustering di-graphs for continuously verifying users according to their typing patterns (2010) (33)
- Matching entities across online social networks (2014) (33)
- Heuristics for Speeding Up Betweenness Centrality Computation (2012) (32)
- xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs (2018) (31)
- Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation (2018) (31)
- IoT Device Identification Using Deep Learning (2019) (31)
- Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers (2018) (31)
- Analyzing group communication for preventing data leakage via email (2010) (31)
- Exfiltration of information from air-gapped machines using monitor's LED indicator (2014) (31)
- xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs (2017) (30)
- Host Based Intrusion Detection using Machine Learning (2007) (30)
- Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations (2020) (30)
- Drones' Cryptanalysis - Smashing Cryptography with a Flicker (2019) (29)
- How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective (2017) (29)
- Handwritten Signature Verification Using Wrist-Worn Devices (2018) (29)
- Optimizing Investment Decisions in Selecting Information Security Remedies (2011) (28)
- Implementing a database encryption solution, design and implementation issues (2014) (28)
- Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques (2008) (27)
- User Authentication Based on Representative Users (2012) (27)
- Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods (2018) (27)
- A novel approach for detecting vulnerable IoT devices connected behind a home NAT (2020) (27)
- Topology manipulations for speeding betweenness centrality computation (2015) (27)
- CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs (2019) (27)
- Social Privacy Protector - Protecting Users' Privacy in Social Networks (2012) (27)
- Combined network analysis and machine learning allows the prediction of metabolic pathways from tomato metabolomics data (2019) (26)
- Mouse Authentication Without the Temporal Aspect – What Does a 2D-CNN Learn? (2018) (26)
- Detecting application update attack on mobile devices through network featur (2013) (26)
- Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs (2018) (26)
- Organizational Intrusion: Organization Mining Using Socialbots (2012) (26)
- How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage (2012) (25)
- The Social Amplifier—Reaction of Human Communities to Emergencies (2013) (25)
- Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments (2020) (25)
- Content-Based Methodology for Anomaly Detection on the Web (2003) (25)
- SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit (2016) (25)
- Generic anomalous vertices detection utilizing a link prediction algorithm (2016) (24)
- Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining (2007) (24)
- Malicious Code Detection and Acquisition Using Active Learning (2007) (24)
- Cyber Security and the Role of Intelligent Systems in Addressing its Challenges (2017) (24)
- JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface (2015) (24)
- Detecting data misuse by applying context-based data linkage (2010) (24)
- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS) (2005) (24)
- Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing (2017) (24)
- Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population (2013) (23)
- A Lightweight Vulnerability Mitigation Framework for IoT Devices (2017) (23)
- Using artificial neural networks to detect unknown computer worms (2009) (23)
- OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage (2014) (23)
- Privacy Preservation Improvement by Learning Optimal Profile Generation Rate (2003) (23)
- Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots (2019) (23)
- Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content (2011) (22)
- A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks (2011) (22)
- SoK: Security and Privacy in the Age of Commercial Drones (2021) (22)
- Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices (2017) (22)
- The Security of IP-Based Video Surveillance Systems (2019) (22)
- Improving condition severity classification with an efficient active learning based framework (2016) (22)
- Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing (2017) (22)
- Anomaly detection for smartphone data streams (2017) (21)
- Enhancing customer privacy while searching for products and services on the world wide web (2005) (21)
- Theory of actionable data mining with application to semiconductor manufacturing control (2007) (21)
- Improving the effectiveness of intrusion detection systems for hierarchical data (2019) (21)
- An Active Learning Framework for Efficient Condition Severity Classification (2015) (21)
- M-score: estimating the potential damage of data leakage incident by assigning misuseability weight (2010) (21)
- Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics (2010) (20)
- Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures (2008) (20)
- Guided socialbots: Infiltrating the social networks of specific organizations' employees (2014) (19)
- Lightweight Collaborative Anomaly Detection for the IoT using Blockchain (2020) (19)
- Handwritten Signature Verification Using Hand-Worn Devices (2016) (19)
- Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures (2019) (19)
- Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud (2019) (19)
- Auto-Sign: an automatic signature generator for high-speed malware filtering devices (2009) (19)
- Evaluation of Additive and Subtractive Manufacturing from the Security Perspective (2017) (19)
- Deployment of DNIDS in Social Networks (2007) (19)
- On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers (2017) (19)
- MobilBye: Attacking ADAS with Camera Spoofing (2019) (18)
- pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts (2015) (18)
- DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise (2016) (18)
- Security and Privacy in Social Networks (2014) (18)
- Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices (2018) (18)
- OSPF vulnerability to persistent poisoning attacks: a systematic analysis (2014) (18)
- The Threat of Offensive AI to Organizations (2021) (18)
- MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images (2020) (18)
- Combined network analysis and machine learning allows the prediction of metabolic pathways from tomato metabolomics data (2019) (18)
- A Chronological Evaluation of Unknown Malcode Detection (2009) (18)
- Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks (2019) (18)
- Reverse Engineering IoT Devices: Effective Techniques and Methods (2018) (17)
- Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness (2019) (17)
- HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System (2017) (17)
- Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus (2017) (17)
- Dynamic Adversarial Patch for Evading Object Detection Models (2020) (17)
- kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity (2009) (17)
- Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces (2018) (17)
- MarCol: A Market-Based Recommender System (2007) (17)
- Links Reconstruction Attack (2013) (16)
- Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise (2020) (16)
- On the Rationality and Optimality of Transportation Networks Defense (2015) (16)
- SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT (2019) (16)
- Ransomware prevention using application authentication-based file access control (2018) (16)
- Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks (2013) (16)
- Cluster-analysis attack against a PRivAte Web solution (PRAW) (2006) (16)
- Behavioral Study of Users When Interacting with Active Honeytokens (2016) (15)
- 9-1-1 DDoS: Attacks, Analysis and Mitigation (2017) (15)
- Xerox Day Vulnerability (2019) (15)
- Group Decision Support for Leisure Activities Using Voting and Social Networks (2017) (15)
- Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods (2017) (15)
- Mining Subgraphs from Propagation Networks through Temporal Dynamic Analysis (2018) (15)
- MindDesktop - Computer Accessibility for Severely Handicapped (2011) (14)
- Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis (2019) (14)
- A New Privacy Model for Web Surfing (2002) (14)
- Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure (2011) (14)
- Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics (2019) (14)
- Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers (2018) (14)
- TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning (2019) (14)
- Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS) (2010) (13)
- Detection of Deviations in Mobile Applications Network Behavior (2012) (13)
- DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback (2017) (13)
- Trade-Offs in Social and Behavioral Modeling in Mobile Networks (2013) (13)
- Security Analysis of Radar Systems (2019) (12)
- A fast and scalable method for threat detection in large-scale DNS logs (2013) (12)
- A Method for Detecting Unknown Malicious Executables (2009) (12)
- Online Social Networks: Threats and Solutions Survey (2013) (12)
- Using the Information Structure Model to Compare Profile-Based Information Filtering Systems (2004) (11)
- A Neural Attention Model for Real-Time Network Intrusion Detection (2019) (11)
- Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers (2018) (11)
- A fuzzy-based algorithm for Web document clustering (2004) (11)
- Analyzing users' web surfing patterns to trace terrorists and criminals (2013) (11)
- TTLed Random Walks for Collaborative Monitoring (2010) (11)
- Detecting Anomalous Behaviors Using Structural Properties of Social Networks (2013) (11)
- CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices (2020) (10)
- Temporal Pattern Discovery for Accurate Sepsis Diagnosis in ICU Patients (2017) (10)
- Boosting the Detection of Malicious Documents Using Designated Active Learning Methods (2015) (10)
- Unknown malcode detection — A chronological evaluation (2008) (10)
- Active learning to improve the detection of unknown computer worms activity (2008) (10)
- DANTE: A framework for mining and monitoring darknet traffic (2020) (10)
- SISR - A New Model for Epidemic Spreading of Electronic Threats (2009) (10)
- Intrusion Detection System for the MIL-STD-1553 Communication Bus (2020) (10)
- Design Procedure of Knowledge Base for Practical Attack Graph Generation (2019) (9)
- Game of Drones - Detecting Streamed POI from Encrypted FPV Channel (2018) (9)
- Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED (2021) (9)
- PRAW—A PRivAcy model for the Web: Research Articles (2005) (9)
- Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples (2020) (9)
- Personal Information Leakage During Password Recovery of Internet Services (2016) (9)
- The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding (2019) (9)
- Evaluating the Security of Open Radio Access Networks (2022) (9)
- Dodging Attack Using Carefully Crafted Natural Makeup (2021) (9)
- Oops!...I think I scanned a malware (2017) (9)
- Trawling Traffic under Attack, Overcoming DDoS Attacks by Target-Controlled Traffic Filtering (2009) (9)
- Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach (2009) (8)
- Adversarial Learning in the Cyber Security Domain (2020) (8)
- Bridging the Air-Gap by Manipulating the Environment Temperature (2017) (8)
- A particle swarm model for estimating reliability and scheduling system maintenance (2016) (8)
- Leaking data from enterprise networks using a compromised smartwatch device (2018) (8)
- Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems (2021) (8)
- Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs (2018) (8)
- Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework (2019) (8)
- Security Testbed for the Internet of Things (2016) (8)
- Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic (2019) (8)
- Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers (2018) (8)
- Noninvasive detection of anti-forensic malware (2013) (7)
- Dynamic Sensitivity-Based Access Control (2011) (7)
- Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks (2020) (7)
- ANALYST INTUITION INSPIRED NEURAL NETWORK BASED CYBER SECURITY ANOMALY DETECTION (2017) (7)
- POSTER: Towards Exposing Internet of Things: A Roadmap (2016) (7)
- Data Leakage Detection/Prevention Solutions (2012) (7)
- Nesto - Network selection and traffic offloading system for android mobile devices (2013) (7)
- Not all datasets are born equal: On heterogeneous tabular data and adversarial examples (2022) (7)
- Unknown Malicious Code Detection – Practical Issues (2008) (7)
- Google Android: An Updated Security Review (2010) (7)
- Heuristic Approach for Countermeasure Selection Using Attack Graphs (2021) (7)
- Per-packet pricing scheme for IP networks (2003) (7)
- An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions (2020) (6)
- An Overview of IDS Using Anomaly Detection (2009) (6)
- A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation (2020) (6)
- On the Security of MIL-STD-1553 Communication Bus (2018) (6)
- A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions (2012) (6)
- Cyber security patrol: detecting fake and vulnerable wifi-enabled printers (2017) (6)
- Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models (2021) (6)
- XML-AD: Detecting anomalous patterns in XML documents (2016) (6)
- Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal (2020) (6)
- Increased cyber-biosecurity for DNA synthesis (2020) (6)
- VisiSploit: An Optical Covert-Channel (2016) (6)
- Who's Afraid of Adversarial Transferability? (2021) (6)
- A decision theoretic approach to combining information filters: An analytical and empirical evaluation (2006) (6)
- A Weighted Risk Score Model for IoT Devices (2019) (6)
- Fair and accurate age prediction using distribution aware data curation and augmentation (2020) (6)
- WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models (2022) (6)
- Analyzing group E-mail exchange to detect data leakage (2013) (6)
- Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data (2017) (5)
- TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack (2021) (5)
- The role of network setting and gender in online content popularity (2017) (5)
- Piping Botnet - Turning Green Technology into a Water Disaster (2018) (5)
- Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain (2007) (5)
- Scholarly Digital Libraries as a Platform for Malware Distribution (2017) (5)
- AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus (2022) (5)
- A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions (2021) (5)
- Performance evaluation of a distributed application (2001) (5)
- Optimizing Data Misuse Detection (2014) (5)
- OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis framework (2020) (5)
- Using malware for the greater good: Mitigating data leakage (2019) (5)
- Toward Scalable and Unified Example-Based Explanation and Outlier Detection (2020) (5)
- Adversarial Machine Learning Threat Analysis in Open Radio Access Networks (2022) (5)
- Chapter 1 Links Reconstruction Attack Using Link Prediction Algorithms to Compromise Social Networks Privacy (2013) (5)
- Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera’s Video Stream (2022) (5)
- A Taxonomy of Data Leakage Prevention Solutions (2012) (5)
- Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel (2021) (5)
- ACTIDS: an active strategy for detecting and localizing network attacks (2013) (5)
- FOOD: Fast Out-Of-Distribution Detector (2021) (5)
- Speaker-to-speaker covert ultrasonic communication (2020) (5)
- A Distributed Framework for the Detection of New Worm-Related Malware (2008) (5)
- Detecting Spying Drones (2021) (4)
- Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup (2019) (4)
- Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques (2019) (4)
- Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis (2021) (4)
- The Security of Deep Learning Defences for Medical Imaging (2022) (4)
- Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements (2014) (4)
- Virtual Breathalyzer (2016) (4)
- Eliciting domain expert misuseability conceptions (2011) (4)
- Evaluation of Security Solutions for Android Systems (2015) (4)
- Introduction to the Special Issue on Data Mining for Cybersecurity (2018) (4)
- GLOD: Gaussian Likelihood Out of Distribution Detector (2020) (4)
- 9-1-1 DDoS: Threat, Analysis and Mitigation (2016) (4)
- Securing Your Transactions: Detecting Anomalous Patterns In XML Documents (2012) (4)
- Security and Safety Interplay of Intelligent Software Systems (2018) (4)
- Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service (2019) (4)
- An attack scenario and mitigation mechanism for enterprise BYOD environments (2018) (4)
- Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk (2017) (4)
- Detecting Spammers via Aggregated Historical Data Set (2012) (4)
- Network-based intrusion detection systems go active! (2012) (4)
- Heuristic Approach Towards Countermeasure Selection using Attack Graphs (2019) (4)
- OVER (2020) (3)
- PALE: Time Bounded Practical Agile Leader Election (2020) (3)
- RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks (2021) (3)
- A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions (2020) (3)
- Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations (2020) (3)
- Large-Scale Shill Bidder Detection in E-commerce (2022) (3)
- A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems (2017) (3)
- 3D Marketplace: Distributed Attestation of 3D Designs on Blockchain (2019) (3)
- Challenges for Security Assessment of Enterprises in the IoT Era (2019) (3)
- Cost-Sensitive Detection of Malicious Applications in Mobile Devices (2010) (3)
- PALE: Partially Asynchronous Agile Leader Election (2018) (3)
- Bridgeware (2018) (3)
- Unsupervised Anomalous Vertices Detection Utilizing Link Prediction Algorithms (2016) (3)
- Enhanced situation space mining for data streams (2017) (3)
- Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs (2011) (3)
- Helix: DGA Domain Embeddings for Tracking and Exploring Botnets (2020) (3)
- HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version) (2022) (3)
- PIT: A Probe Into Internet of Things by Comprehensive Security Analysis (2019) (3)
- TEALS: Time-aware Text Embedding Approach to Leverage Subgraphs (2019) (2)
- Out-of-distribution detection and generalization to enhance fairness in age prediction (2020) (2)
- Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants (2021) (2)
- Web based Malware Detection using Important Supervised Learning Techniques on Online Web Traffic (2016) (2)
- Stealing Reality (2010) (2)
- ReDroId: Remote Drone Identification Based on Visual RSA SecurID Tokens (2021) (2)
- Stealing Reality : When Criminals Become Data Scientists (2012) (2)
- Liability Exposure when 3D-Printed Parts Fall from the Sky (2018) (2)
- bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements (2022) (2)
- RT Spoofing Attacks on MIL-STD-1553 Communication Traffic (2018) (2)
- Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images (2023) (2)
- Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration (2017) (2)
- Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics (2023) (2)
- Message Passing System for closely coupled multiprocessor system (1991) (2)
- Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains (2015) (2)
- TTLed Random Walks for Collaborative Monitoring in Mobile and Social Networks (2012) (2)
- A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices (2021) (2)
- A Self-Healing Mechanism for Internet of Things Devices (2021) (2)
- ALDROID: efficient update of Android anti-virus software using designated active learning methods (2016) (2)
- On packet loss modeling: An empirical assessment (2017) (2)
- Security Ranking of IoT Devices Using an AHP Model (2020) (2)
- CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals (2021) (2)
- Ethical Considerations when Employing Fake Identities in OSN for Research (2013) (2)
- Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems (1993) (2)
- Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn (2019) (2)
- Reaction to New Security Threat Class (2014) (2)
- Multiple interfaces message passing system for transputer network (1992) (2)
- Process for finding the most prominent group of vertices in complex networks (2007) (2)
- Terrorist Detection System (2004) (2)
- LoOkie - it feels like being there (2011) (2)
- Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities (2020) (2)
- NewApproach for Detecting Unknown Malicious Executables (2010) (2)
- Game of Drones - Detecting Spying Drones Using Time Domain Analysis (2021) (2)
- Facebook Applications' Installation and Removal: A Temporal Analysis (2013) (1)
- IoT Device Identification Based on Network Communication Analysis Using Deep Learning (2022) (1)
- MindDesktop: a general purpose brain computer interface (2017) (1)
- Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries (2014) (1)
- The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects (2022) (1)
- ATHAFI: Agile Threat Hunting And Forensic Investigation (2020) (1)
- IoT-deNAT: Outbound flow-based network traffic data of IoT and non-IoT devices behind a home NAT (2020) (1)
- Detecting Android Kernel Rootkits via JTAG Memory Introspection (2017) (1)
- Cost Benefit Deployment of DNIPS (2010) (1)
- Exploiting simultaneous usage of different wireless interfaces for security and mobility (2013) (1)
- Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic (2018) (1)
- HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter (2022) (1)
- Adaptive Noise Injection for Training Stochastic Student Networks from Deterministic Teachers (2021) (1)
- Detection of Adversarial Supports in Few-shot Classifiers Using Self-Similarity and Filtering (2020) (1)
- Attacking Object Detector Using A Universal Targeted Label-Switch Patch (2022) (1)
- Trawling Traffic under Attack (2009) (1)
- Privacy, Data Anonymization, and Secure Data Publishing (2012) (1)
- Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks (2019) (1)
- When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders (2020) (1)
- Spoofing Mobileye 630’s Video Camera Using a Projector (2021) (1)
- TDS - An Innovative Terrorist Detection System (2005) (1)
- Enhancing real-world adversarial patches through 3D modeling of complex target scenes (2021) (1)
- Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders (2020) (1)
- Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers (2020) (1)
- Quantitative Analysis of Genealogy Using Digitised Family Trees (2014) (1)
- Enhancing Real-World Adversarial Patches with 3D Modeling Techniques (2021) (1)
- BENN: Bias Estimation Using Deep Neural Network (2020) (1)
- Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things (2018) (1)
- PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks (2018) (1)
- A decision theoretic approach to combining information filtering (2009) (1)
- Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations (2022) (1)
- VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream (2022) (1)
- CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs (2021) (1)
- Friend or foe? Fake profile identification in online social networks (2014) (0)
- Demo: Detecting Illicit Drone Video Filming Using Cryptanalysis (2021) (0)
- GIM: Gaussian Isolation Machines (2020) (0)
- Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph (2023) (0)
- Ethical Considerations when Employing Fake Identities in Online Social Networks for Research (2013) (0)
- YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection (2022) (0)
- 11th International Workshop on Artificial Intelligence and Security (AISec 2018) (2018) (0)
- A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists’ Perspective (2022) (0)
- Introduction to Security and Privacy in Social Networks (2013) (0)
- Information Security Investments Decision Making : A Conceptual Model Using Grounded Theory (2015) (0)
- INTELLIGENT TECHNOLOGY FOR CONTENT MONITORING ON THE WEB (2004) (0)
- Group Decision Support for Leisure Activities Using Voting and Social Networks (2016) (0)
- Evasive Routing: Achieving Anonymity Using Multiple ISPs (2007) (0)
- USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks (2016) (0)
- Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions (2023) (0)
- Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices (2022) (0)
- Guest editorial: Special issue on data mining for information security (2013) (0)
- Demo: Identifying Drones Based on Visual Tokens (2022) (0)
- Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems (2016) (0)
- Prioritizing Antivirus Alerts on Internal Enterprise Machines (2022) (0)
- Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models (2022) (0)
- Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models (2021) (0)
- Transferability Ranking of Adversarial Examples (2022) (0)
- AISec'19: 12th ACM Workshop on Artificial Intelligence and Security (2019) (0)
- Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples (2021) (0)
- A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions (2011) (0)
- Future Trends in Data Leakage (2012) (0)
- Computer Systems & Information SSR: a Unified Approach for Decision Making (2007) (0)
- Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems (2020) (0)
- Analysing the Adversarial Landscape of Binary Stochastic Networks (2021) (0)
- Security of Open Radio Access Networks (2022) (0)
- Hidden-Web Privacy Preservation Surfing (Hi-Wepps) Model (2006) (0)
- Simulating Threats Propagation within the NSP Infrastructure (2007) (0)
- Active Discovery of Hidden Profiles in Social Networks Using Malware (2015) (0)
- Data Leakage/Misuse Scenarios (2012) (0)
- A Bounded Local Adaptive Packet Pricing ( BLAPP ) Scheme for IP Networks (0)
- Session details: AI for Forensics (2018) (0)
- The Social Amplifier—Reaction of Human Communities to Emergencies (2013) (0)
- Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN) (2022) (0)
- Overcoming DDoS Attacks by Target-Controlled Traffic Filtering (Extended Abstract) (2009) (0)
- Comparing Information Filtering Systems Using the Information Structure Model (2002) (0)
- POSTER: Misuseablity Analysis for IT Infrastructure (2014) (0)
- Latent SHAP: Toward Practical Human-Interpretable Explanations (2022) (0)
- POSTER: Recovering Songs from a Hanging Light Bulb (2021) (0)
- Optimizing Targeting of Intrusion Detection Systems in Social Networks (2010) (0)
- IP2User -- Identifying the Username of an IP Address in Network-Related Events (2013) (0)
- Protecting Autonomous Cars from Phantom Attacks (2023) (0)
- LoOkie - It Feels Like Being There, proposing a social mobile application (2011) (0)
- SMuF: State Machine Based Mutational Fuzzing Framework for Internet of Things (2018) (0)
- Ethical Considerations When Employing Fake Identities for Research in OSN (2013) (0)
- Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings (2022) (0)
- Efficient Collaborative Application Monitoring Scheme for Mobile Networks (2010) (0)
- FEPC: Fairness Estimation Using Prototypes and Critics for Tabular Data (2022) (0)
- Demo: Attacking Tesla Model X’s Autopilot Using Compromised Advertisement (2021) (0)
- Detection of Data Leakage using Misuseability Weight Measure (2013) (0)
- Incentives in Collaborative Applications (2018) (0)
- Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization (2020) (0)
- Limiting access to unintentionally leaked sensitive documents using malware signatures (2014) (0)
- Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity (2020) (0)
- Optical Speech Recovery From Desktop Speakers (2022) (0)
- AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling (2016) (0)
- EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome (2022) (0)
- TTLed Random Walks for Collaborative Monitoring (Preliminary Version) (2010) (0)
- Adversarial Attacks Against IoT Identification Systems (2023) (0)
- Peers-Based Location of Mobile Devices (2014) (0)
- Botnet IND: About Botnets of Botless IoT Devices (2020) (0)
- Towards Scalable and Unified Example-based Explanation and Outlier Detection (2021) (0)
- Method for finding the most prominent group of vertices in complex data communication networks (2007) (0)
- Acknowledgment to reviewers (1993) (0)
- Search Problems in the Domain of Multiplication : Case Study on Robust Anomaly Detection Using Markov Chains (2015) (0)
- The Age of Testifying Wearable Devices: The Case of Intoxication Detection (2020) (0)
- TTLed RandomWalks for Collaborative Monitoring in Mobile and Social Networks (2011) (0)
- An Attentive Digital Signage System (2009) (0)
- Proceedings of the 2010 international conference on Collaborative methods for security and privacy (2010) (0)
- User-guided Graph Exploration: A Framework for Algorithmic Complexity Reduction in Large Data Sets (2018) (0)
- “Andromaly”: a behavioral malware detection framework for android devices (2011) (0)
- Deja vu from the SVM Era: Example-based Explanations with Outlier Detection (2020) (0)
- PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks (2022) (0)
- Detecting unknown computer worm activity via support vector machines and active learning (2012) (0)
- Rendezvous Tunnel for Anonymous Publishing Rendezvous Tunnel for Anonymous Publishing (2010) (0)
This paper list is powered by the following services:
Other Resources About Yuval Elovici
What Schools Are Affiliated With Yuval Elovici?
Yuval Elovici is affiliated with the following schools: