Department of Software and Information Systems Engineering

Filter
Conference contribution

Search results

  • 2020

    Model-based diagnosis with uncertain observations

    Cazes, D. & Kalech, M., 1 Jan 2020, AAAI 2020 - 34th AAAI Conference on Artificial Intelligence. AAAI press, p. 2766-2773 8 p. (AAAI 2020 - 34th AAAI Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • Moving agents in formation in congested environments

    Li, J., Sun, K., Ma, H., Felner, A., Kumar, T. K. S. & Koenig, S., 1 Jan 2020, Proceedings of the 13th International Symposium on Combinatorial Search, SoCS 2020. Harabor, D. & Vallati, M. (eds.). The AAAI Press, p. 131-132 2 p. (Proceedings of the 13th International Symposium on Combinatorial Search, SoCS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Moving agents in formation in congested environments

    Li, J., Sun, K., Ma, H., Felner, A., Satish Kumar, T. K. & Koenig, S., 1 Jan 2020, Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2020. An, B., El Fallah Seghrouchni, A. & Sukthankar, G. (eds.). International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 726-734 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • Multi-directional heuristic search

    Atzmon, D., Li, J., Felner, A., Nachmani, E., Shperberg, S., Sturtevant, N. & Koenig, S., 1 Jan 2020, Proceedings of the 29th International Joint Conference on Artificial Intelligence, IJCAI 2020. Bessiere, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 4062-4068 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2021-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Multi-directional search

    Atzmon, D., Li, J., Felner, A., Nachmani, E., Shperberg, S., Sturtevant, N. & Koenig, S., 1 Jan 2020, Proceedings of the 13th International Symposium on Combinatorial Search, SoCS 2020. Harabor, D. & Vallati, M. (eds.). The AAAI Press, p. 121-122 2 p. (Proceedings of the 13th International Symposium on Combinatorial Search, SoCS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the differences and similarities of fMM and GBFHS

    Shperberg, S. S. & Felner, A., 1 Jan 2020, Proceedings of the 13th International Symposium on Combinatorial Search, SoCS 2020. Harabor, D. & Vallati, M. (eds.). The AAAI Press, p. 66-74 9 p. (Proceedings of the 13th International Symposium on Combinatorial Search, SoCS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • OVER: Overhauling vulnerability detection for iot through an adaptable and automated static analysis framework

    Sachidananda, V., Bhairav, S. & Elovici, Y., 30 Mar 2020, 35th Annual ACM Symposium on Applied Computing, SAC 2020. Association for Computing Machinery, p. 729-738 10 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks

    Nassi, B., Mirsky, Y., Nassi, D., Ben-Netanel, R., Drokin, O. & Elovici, Y., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 293-308 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    63 Scopus citations
  • Product Bundle Identification using Semi-Supervised Learning

    Tzaban, H., Guy, I., Greenstein-Messica, A., Dagan, A., Rokach, L. & Shapira, B., 25 Jul 2020, SIGIR 2020 - Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. Association for Computing Machinery, Inc, p. 791-800 10 p. (SIGIR 2020 - Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • PUA detection based on bundle installer characteristics

    Lukach, A., Gudes, E. & Shabtai, A., 1 Jan 2020, Data and Applications Security and Privacy - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Proceedings. Singhal, A. & Vaidya, J. (eds.). Springer, p. 261-273 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12122 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Query-Efficient Black-Box Attack against Sequence-Based Malware Classifiers

    Rosenberg, I., Shabtai, A., Elovici, Y. & Rokach, L., 7 Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, p. 611-626 16 p. 3427230. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    42 Scopus citations
  • Security Ranking of IoT Devices Using an AHP Model

    Siboni, S., Glezer, C., Puzis, R., Shabtai, A. & Elovici, Y., 1 Jan 2020, Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings. Dolev, S., Weiss, G., Kolesnikov, V. & Lodha, S. (eds.). Springer, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12161 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Solving the watchman route problem on a grid with heuristic search

    Seiref, S., Jaffey, T., Lopatin, M. & Felner, A., 1 Jan 2020, Proceedings of the 13th International Symposium on Combinatorial Search, SoCS 2020. Harabor, D. & Vallati, M. (eds.). The AAAI Press, p. 139-140 2 p. (Proceedings of the 13th International Symposium on Combinatorial Search, SoCS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • TdGraphEmbed: Temporal Dynamic Graph-Level Embedding

    Beladev, M., Rokach, L., Katz, G., Guy, I. & Radinsky, K., 19 Oct 2020, CIKM 2020 - Proceedings of the 29th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 55-64 10 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Scopus citations
  • The Chameleon Attack: Manipulating Content Display in Online Social Media

    Elyashar, A., Uziel, S., Paradise, A. & Puzis, R., 20 Apr 2020, The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020. Association for Computing Machinery, Inc, p. 848-859 12 p. (The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • The phantom steering effect in QA websites

    Hoernle, N., Kehne, G., Procaccia, A. D. & Gal, K., 1 Nov 2020, Proceedings - 20th IEEE International Conference on Data Mining, ICDM 2020. Plant, C., Wang, H., Cuzzocrea, A., Zaniolo, C. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers, p. 172-181 10 p. 9338378. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Threshold task games: Theory, platform and experiments

    Gal, K., Nguyen, T. D., Tran, Q. N. & Zick, Y., 1 Jan 2020, Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2020. An, B., El Fallah Seghrouchni, A. & Sukthankar, G. (eds.). International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 393-401 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Twitter Data Augmentation for Monitoring Public Opinion on COVID-19 Intervention Measures.

    Miao, L., Last, M. & Litvak, M., Dec 2020, Proceedings of the 1st Workshop on NLP for COVID-19 (Part 2) at EMNLP 2020. Association for Computational Linguistics, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Using Bandits for Effective Database Activity Monitoring

    Grushka-Cohen, H., Biller, O., Sofer, O., Rokach, L. & Shapira, B., 6 May 2020, Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD 2020, Proceedings. Lauw, H. W., Lim, E.-P., Wong, R.C.-W., Ntoulas, A., Ng, S.-K. & Pan, S. J. (eds.). Springer, p. 701-713 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12085 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • Using customers' online reviews to identify and classify human robot interaction failures in domestic robots

    Honig, S., Bartal, A. & Oron-Gilad, T., 23 Mar 2020, HRI 2020 - Companion of the 2020 ACM/IEEE International Conference on Human-Robot Interaction. Institute of Electrical and Electronics Engineers, p. 251-253 3 p. (ACM/IEEE International Conference on Human-Robot Interaction).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Using Data Mining for Infrastructure and Safety Violations Discovery in Cities

    Laadan, D., Arviv, E. & Fire, M., 28 Sep 2020, 2020 IEEE International Smart Cities Conference, ISC2 2020. Institute of Electrical and Electronics Engineers, 9239035. (2020 IEEE International Smart Cities Conference, ISC2 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

    Fidel, G., Bitton, R. & Shabtai, A., 1 Jul 2020, 2020 International Joint Conference on Neural Networks, IJCNN 2020 - Proceedings. Institute of Electrical and Electronics Engineers, 9207637. (Proceedings of the International Joint Conference on Neural Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    84 Scopus citations
  • 2019

    Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

    Marcus Tan, Y. X., Iacovazzi, A., Homoliak, I., Elovici, Y. & Binder, A., 1 Jul 2019, 2019 International Joint Conference on Neural Networks, IJCNN 2019. Institute of Electrical and Electronics Engineers, 8852414. (Proceedings of the International Joint Conference on Neural Networks; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    22 Scopus citations
  • A factored approach to deterministic contingent multi-agent planning

    Shekhar, S., Brafman, R. I. & Shani, G., 1 Jan 2019, Proceedings of the 29th International Conference on Automated Planning and Scheduling, ICAPS 2019. Benton, J., Lipovetzky, N., Onaindia, E., Smith, D. E. & Srivastava, S. (eds.). Association for the Advancement of Artificial Intelligence, p. 419-427 9 p. (Proceedings International Conference on Automated Planning and Scheduling, ICAPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • AISec'19: 12th ACM workshop on artificial intelligence and security

    Afroz, S., Biggio, B., Carlini, N., Elovici, Y. & Shabtai, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2707-2708 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • A Method for Database Model Selection

    Roy-Hubara, N., Shoval, P. & Sturm, A., 1 Jan 2019, Enterprise, Business-Process and Information Systems Modeling - 20th International Conference, BPMDS 2019, 24th International Conference, EMMSAD 2019, Held at CAiSE 2019, Proceedings. Reinhartz-Berger, I., Zdravkovic, J., Gulden, J. & Schmidt, R. (eds.). Springer Verlag, p. 261-275 15 p. (Lecture Notes in Business Information Processing; vol. 352).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Analysis of location data leakage in the internet traffic of android-based mobile devices

    Sivan, N., Bitton, R. & Shabtai, A., 1 Jan 2019, RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses. USENIX Association, p. 243-260 18 p. (RAID 2019 Proceedings - 22nd International Symposium on Research in Attacks, Intrusions and Defenses).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • A Neural Attention Model for Real-Time Network Intrusion Detection

    Tan, M., Iacovazzi, A., Cheung, N. M. M. & Elovici, Y., 1 Oct 2019, Proceedings of the 44th Annual IEEE Conference on Local Computer Networks, LCN 2019. Andersson, K., Tan, H.-P. & Oteafy, S. (eds.). Institute of Electrical and Electronics Engineers, p. 291-299 9 p. 8990890. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2019-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    35 Scopus citations
  • Approximate String Matching for DNS Anomaly Detection

    Mateless, R. & Segal, M., 1 Jan 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Proceedings. Wang, G., Feng, J., Bhuiyan, M. Z. A. & Lu, R. (eds.). Springer Verlag, p. 490-504 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Are all rejected recommendations equally bad? Towards analysing rejected recommendations

    Frumerman, S., Shani, G., Shapira, B. & Shalom, O. S., 7 Jun 2019, ACM UMAP 2019 - Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization. Association for Computing Machinery, Inc, p. 157-165 9 p. (ACM UMAP 2019 - Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • A scenario based on-board software and testing environment for satellites

    Bar-Sinai, M., Elyasaf, A., Sadon, A. & Weiss, G., 1 Jan 2019, 59th Israel Annual Conference on Aerospace Sciences, IACAS 2019. Israel Annual Conference on Aerospace Sciences, p. 1407-1419 13 p. (59th Israel Annual Conference on Aerospace Sciences, IACAS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Assigning suppliers to meet a deadline

    Cohen, L., Grinshpoun, T. & Stern, R., 1 Jan 2019, Proceedings of the 12th International Symposium on Combinatorial Search, SoCS 2019. Surynek, P. & Yeoh, W. (eds.). AAAI press, p. 170-171 2 p. (Proceedings of the 12th International Symposium on Combinatorial Search, SoCS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Attack hypothesis generation

    Elitzur, A., Puzis, R. & Zilberman, P., 1 Nov 2019, Proceedings of the 2019 European Intelligence and Security Informatics Conference, EISIC 2019. Brynielsson, J. (ed.). Institute of Electrical and Electronics Engineers, p. 40-47 8 p. 9108886. (Proceedings of the 2019 European Intelligence and Security Informatics Conference, EISIC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Augboost: Gradient boosting enhanced with step-wise feature augmentation

    Tannor, P. & Rokach, L., 1 Jan 2019, Proceedings of the 28th International Joint Conference on Artificial Intelligence, IJCAI 2019. Kraus, S. (ed.). International Joint Conferences on Artificial Intelligence, p. 3555-3561 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2019-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • AutoGRD: Model recommendation through graphical dataset representation

    Cohen-Shapira, N., Rokach, L., Shapira, B., Katz, G. & Vainshtein, R., 3 Nov 2019, CIKM 2019 - Proceedings of the 28th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 821-830 10 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    33 Scopus citations
  • A Weighted Risk Score Model for IoT Devices

    Siboni, S., Glezer, C., Shabtai, A. & Elovici, Y., 1 Jan 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Proceedings. Wang, G., Feng, J., Bhuiyan, M. Z. A. & Lu, R. (eds.). Springer Verlag, p. 20-34 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11637 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Brightness: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

    Guri, M., Bykhovsky, D. & Elovici, Y., 1 Nov 2019, 12th CMI Conference on Cybersecurity and Privacy, CMI 2019. Institute of Electrical and Electronics Engineers, 8962137

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    28 Scopus citations
  • Can an algorithm prepare students for tasks without knowing what the tasks are?

    Hershkovitz, A., Tzayada, O., Ezra, O., Cohen, A., Tabach, M., Levy, B., Segal, A. & Gal, K., 1 Dec 2019, Proceedings - 6th Annual Conference on Computational Science and Computational Intelligence, CSCI 2019. Institute of Electrical and Electronics Engineers, p. 754-759 6 p. 9071302. (Proceedings - 6th Annual Conference on Computational Science and Computational Intelligence, CSCI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Cluster Switches in Gene Expression Data

    Hassidim, M., Shani, G. & Shay, T., 21 Jan 2019, Proceedings - 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018. Schmidt, H., Griol, D., Wang, H., Baumbach, J., Zheng, H., Callejas, Z., Hu, X., Dickerson, J. & Zhang, L. (eds.). Institute of Electrical and Electronics Engineers, p. 1788-1795 8 p. 8621508. (Proceedings - 2018 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Comparative criteria for partially observable contingent planning

    Shmaryahu, D., Hoffmann, J. & Shani, G., 1 Jan 2019, 18th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2019. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1740-1742 3 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Comparative Evaluation of Node-Link and Sankey Diagrams for the Cyber Security Domain

    Blinder, R., Biller, O., Even, A., Sofer, O., Tractinsky, N., Lanir, J. & Bak, P., 1 Jan 2019, Human-Computer Interaction – INTERACT 2019 - 17th IFIP TC 13 International Conference, Proceedings. Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M. & Zaphiris, P. (eds.). Springer Verlag, p. 497-518 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11746 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Controllable privacy preserving blockchain: Fiatchain: Distributed privacy preserving cryptocurrency with law enforcement capabilities

    Puzis, R., Barshap, G., Zilberman, P. & Leiba, O., 1 Jan 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 178-197 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • CT-GAN: Malicious tampering of 3D medical imagery using deep learning

    Mirsky, Y., Mahler, T., Shelef, I. & Elovici, Y., 1 Jan 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 461-478 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    138 Scopus citations
  • CTRL-ALT-LED: Leaking data from air-gapped computers via keyboard LEDs

    Guri, M., Zadov, B., Bykhovsky, D. & Elovici, Y., 1 Jul 2019, Proceedings - 2019 IEEE 43rd Annual Computer Software and Applications Conference, COMPSAC 2019. Getov, V., Gaudiot, J.-L., Yamai, N., Cimato, S., Chang, M., Teranishi, Y., Yang, J.-J., Leong, H. V., Shahriar, H., Takemoto, M., Towey, D., Takakura, H., Elci, A., Takeuchi, S. & Puri, S. (eds.). Institute of Electrical and Electronics Engineers, p. 801-810 10 p. 8754078. (Proceedings - International Computer Software and Applications Conference; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    39 Scopus citations
  • Debguer: A tool for bug prediction and diagnosis

    Elmishali, A., Stern, R. & Kalech, M., 1 Jan 2019, 33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Innovative Applications of Artificial Intelligence Conference, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019. AAAI press, p. 9446-9451 6 p. (33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Innovative Applications of Artificial Intelligence Conference, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    12 Scopus citations
  • Deployment Optimization of IoT Devices through Attack Graph Analysis

    Agmon, N., Shabtai, A. & Puzis, R., 15 May 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 192-202 11 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    17 Scopus citations
  • Design procedure of knowledge base for practical attack graph generation

    Inokuchi, M., Ohta, Y., Kinoshita, S., Yagyu, T., Stan, O., Bitton, R., Elovici, Y. & Shabtai, A., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 594-601 8 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Detecting Adversarial Perturbations through Spatial Behavior in Activation Spaces

    Katzir, Z. & Elovici, Y., 1 Jul 2019, 2019 International Joint Conference on Neural Networks, IJCNN 2019. Institute of Electrical and Electronics Engineers, 8852285. (Proceedings of the International Joint Conference on Neural Networks; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    16 Scopus citations
  • Detecting creativity in an open ended geometry environment

    Shillo, R., Hoernle, N. & Gal, K., 1 Jan 2019, EDM 2019 - Proceedings of the 12th International Conference on Educational Data Mining. Lynch, C. F., Merceron, A., Desmarais, M. & Nkambou, R. (eds.). International Educational Data Mining Society, p. 408-413 6 p. (EDM 2019 - Proceedings of the 12th International Conference on Educational Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Detection of threats to IoT devices using scalable VPN-forwarded honeypots

    Tambe, A., Aung, Y. L., Sridharan, R., Ochoa, M., Tippenhauer, N. O., Shabtai, A. & Elovici, Y., 13 Mar 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 85-96 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    31 Scopus citations