Department of Software and Information Systems Engineering

Filter
Conference contribution

Search results

  • 2018

    Robust Multi-agent path finding

    Atzmon, D., Stern, R., Felner, A., Wagner, G., Bartak, R. & Zhou, N. F., 1 Jan 2018, Proceedings of the 11th International Symposium on Combinatorial Search, SoCS 2018. Bulitko, V. & Storandt, S. (eds.). AAAI press, p. 2-9 8 p. (Proceedings of the 11th International Symposium on Combinatorial Search, SoCS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    36 Scopus citations
  • Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study

    Dey, V., Pudi, V., Chattopadhyay, A. & Elovici, Y., 27 Mar 2018, Proceedings - 31st International Conference on VLSI Design, VLSID 2018 - Held concurrently with 17th International Conference on Embedded Systems, ES 2018. Institute of Electrical and Electronics Engineers, p. 398-403 6 p. (Proceedings of the IEEE International Conference on VLSI Design; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    73 Scopus citations
  • Software engineering lab- A n essential component of a software engineering curriculum

    Balaban, M. & Sturm, A., 27 May 2018, Proceedings 2018 ACM/IEEE 40th International Conference on Software Engineering: Software Engineering Education and Training, ICSE-SEET 2018. Institute of Electrical and Electronics Engineers, p. 21-30 10 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Sub-optimal SAT-based approach to multi-agent path-finding problem

    Surynek, P., Felner, A., Stern, R. & Boyarski, E., 1 Jan 2018, Proceedings of the 11th International Symposium on Combinatorial Search, SoCS 2018. Bulitko, V. & Storandt, S. (eds.). AAAI press, p. 99-105 7 p. (Proceedings of the 11th International Symposium on Combinatorial Search, SoCS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Symposium orchestration tools for teachers in the context of individual and collaborative learning: What information do teachers need and what do they do with it?

    van Leeuwen, A., Rummel, N., Aleven, V., Gal, K., Holstein, K., Knoop-Van Campen, C., McLaren, B. M., Molenaar, I., Prusak, N., Schwarz, B., Segal, A., Swidan, O. & Wise, A., 1 Jan 2018, 13th International Conference of the Learning Sciences, ICLS 2018: Rethinking Learning in the Digital Age: Making the Learning Sciences Count. Kay, J. & Luckin, R. (eds.). 2018-June ed. International Society of the Learning Sciences (ISLS), Vol. 2. p. 1227-1234 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Utilizing sequences of touch gestures for user verification on mobile devices

    Kimon, L. B., Mirsky, Y., Rokach, L. & Shapira, B., 17 Jun 2018, Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings. Webb, G. I., Phung, D., Ganji, M., Rashidi, L., Tseng, V. S. & Ho, B. (eds.). Springer Verlag, p. 816-828 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10939 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Variants of independence detection in SAT-based optimal multi-agent path finding

    Surynek, P., Švancara, J., Felner, A. & Boyarski, E., 1 Jan 2018, Agents and Artificial Intelligence - 9th International Conference, ICAART 2017, Revised Selected Papers. Filipe, J., van den Herik, J. & Rocha, A. P. (eds.). Springer Verlag, p. 116-136 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10839 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • XLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs

    Gur, M., Zadov, B., Daidakulov, A. & Elovici, Y., 29 Oct 2018, 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers, 8514196

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • 2017

    9-1-1 DDoS: Attacks, Analysis and Mitigation

    Guri, M., Mirsky, Y. & Elovici, Y., 28 Jun 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017. Institute of Electrical and Electronics Engineers, p. 218-232 15 p. 7961982. (Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (‘DiskFiltration’)

    Guri, M., Solewicz, Y., Daidakulov, A. & Elovici, Y., 1 Jan 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S. N., Gollmann, D. & Snekkenes, E. (eds.). Springer Verlag, p. 98-115 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    66 Scopus citations
  • A lightweight vulnerability mitigation framework for IoT devices

    Hadar, N., Siboni, S. & Elovici, Y., 3 Nov 2017, IoT S and P 2017 - Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 71-75 5 p. (IoT S and P 2017 - Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, co-located with CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • A proxy-based solution for securiting remote desktop connections in mission-critical systems

    Bitton, R., Feher, C., Elovici, Y., Shabtai, A., Shugol, G., Tikochinski, R. & Kur, S., 25 Apr 2017, Proceedings - IEEE 18th International Symposium on High Assurance Systems Engineering, HASE 2017. Institute of Electrical and Electronics Engineers, p. 153-156 4 p. 7911890. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Constance: Modeling annotation contexts to improve stance classification

    Joseph, K., Friedland, L., Hobbs, W., Lazer, D. & Tsur, O., 1 Jan 2017, EMNLP 2017 - Conference on Empirical Methods in Natural Language Processing, Proceedings. Association for Computational Linguistics (ACL), p. 1115-1124 10 p. (EMNLP 2017 - Conference on Empirical Methods in Natural Language Processing, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Cyber security patrol- Detecting fake and vulnerable WiFi-enabled printers

    Toh, J., Hatib, M., Porzecanski, O. & Elovici, Y., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association for Computing Machinery, p. 535-542 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F128005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • DiscOF: Balanced flow discovery in openflow

    Nacshon, L., Puzis, R. & Zilberman, P., 7 Dec 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017. Institute of Electrical and Electronics Engineers, p. 1-6 6 p. (2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • DLRS 2017 - Second workshop on deep learning for recommender systems

    Hidasi, B., Karatzoglou, A., Sar-Shalom, O., DIeleman, S., Shapira, B. & Tikk, D., 27 Aug 2017, RecSys 2017 - Proceedings of the 11th ACM Conference on Recommender Systems. Association for Computing Machinery, Inc, p. 370-371 2 p. (RecSys 2017 - Proceedings of the 11th ACM Conference on Recommender Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Efficient, safe, and probably approximately complete learning of action models

    Stern, R. & Juba, B., 1 Jan 2017, 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 4405-4411 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • Enhanced situation space mining for data streams

    Mirsky, Y., Halpern, T., Upadhyay, R., Toledo, S. & Elovici, Y., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association for Computing Machinery, p. 842-849 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F128005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Evaluation of additive and subtractive manufacturing from the security perspective

    Yampolskiy, M., King, W., Pope, G., Belikovetsky, S. & Elovici, Y., 1 Jan 2017, Critical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Revised Selected Papers. Rice, M. & Shenoi, S. (eds.). Springer New York LLC, p. 23-44 22 p. (IFIP Advances in Information and Communication Technology; vol. 512).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • Extracting and ranking travel tips from user-generated reviews

    Guy, I., Nus, A., Mejer, A. & Raiber, F., 1 Jan 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 987-996 10 p. 3052632. (26th International World Wide Web Conference, WWW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Formal semantics and analysis tasks for ME-MAP models

    Maraee, A. & Sturm, A., 23 Jun 2017, RCIS 2017 - 11th IEEE International Conference on Research Challenges in Information Science - Conference Proceedings. Pastor, O., Mouratidis, H. & Assar, S. (eds.). Institute of Electrical and Electronics Engineers, p. 234-243 10 p. 7956542. (Proceedings - International Conference on Research Challenges in Information Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • From smashed screens to smashed stacks: Attacking mobile phones using malicious aftermarket parts

    Shwartz, O., Shitrit, G., Shabtai, A. & Oren, Y., 30 Jun 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017. Institute of Electrical and Electronics Engineers, p. 94-98 5 p. 7966977. (Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Fun facts: Automatic trivia fact extraction from wikipedia

    Tsurel, D., Pelleg, D., Guy, I. & Shahaf, D., 2 Feb 2017, WSDM 2017 - Proceedings of the 10th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 345-354 10 p. (WSDM 2017 - Proceedings of the 10th ACM International Conference on Web Search and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • HiveRel: Towards focused knowledge acquisition

    Yogev, S., Shani, G. & Tractinsky, N., 13 Mar 2017, ESIDA 2017 - Proceedings of the 2017 ACM Workshop on Exploratory Search and Interactive Data Analytics, co-located with IUI 2017. Association for Computing Machinery, Inc, p. 17-24 8 p. (ESIDA 2017 - Proceedings of the 2017 ACM Workshop on Exploratory Search and Interactive Data Analytics, co-located with IUI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective

    Slaughter, A., Yampolskiy, M., Matthews, M., King, W. E., Guss, G. & Elovici, Y., 29 Aug 2017, ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security. Association for Computing Machinery, a78. (ACM International Conference Proceeding Series; vol. Part F130521).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations
  • How to formwinning coalitions in mixed human-computer settings

    Mash, M., Bachrach, Y., Gal, Y. & Zick, Y., 1 Jan 2017, 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 465-471 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    12 Scopus citations
  • HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System

    Mirsky, Y., Guri, M. & Elovici, Y., Mar 2017, Depth Security . Vol. II. p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Increased privacy with reduced communication in multi-agent planning

    Maliah, S., Brafman, R. I. & Shani, G., 1 Jan 2017, Proceedings of the 27th International Conference on Automated Planning and Scheduling, ICAPS 2017. Barbulescu, L., Frank, J. D., Mausam & Smith, S. F. (eds.). Association for the Advancement of Artificial Intelligence, p. 209-217 9 p. (Proceedings International Conference on Automated Planning and Scheduling, ICAPS; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Inferring contextual preferences using deep auto-encoding

    Unger, M., Shapira, B., Rokach, L. & Bar, A., 9 Jul 2017, UMAP 2017 - Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization. Association for Computing Machinery, Inc, p. 221-229 9 p. (UMAP 2017 - Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • Integration of independence detection into SAT-based optimal multi-agent path finding a novel SAT-based optimal MAPF solver

    Surynek, P., Švancara, J., Felner, A. & Boyarski, E., 1 Jan 2017, ICAART 2017 - Proceedings of the 9th International Conference on Agents and Artificial Intelligence. van den Herik, J., Rocha, A. P., Filipe, J. & Filipe, J. (eds.). SciTePress, p. 85-95 11 p. (ICAART 2017 - Proceedings of the 9th International Conference on Agents and Artificial Intelligence; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • Keeping the teacher in the loop: Technologies for monitoring group learning in real-time

    Segal, A., Hindi, S., Prusak, N., Swidan, O., Livni, A., Palatnic, A., Schwarz, B. & Gal, Y. K., 1 Jan 2017, Artificial Intelligence in Education - 18th International Conference, AIED 2017, Proceedings. Andre, E., Hu, X., Rodrigo, M. M. T., du Boulay, B. & Baker, R. (eds.). Springer Verlag, p. 64-76 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10331 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Scopus citations
  • Know-how mapping – A goal-oriented approach and evaluation

    Arnon, S., Yu, E. & Abrishamkar, S., 17 May 2017, Enterprise, Business-Process and Information Systems Modeling - 18th International Conference, BPMDS 2017, 22nd International Conference, EMMSAD 2017 Held at CAiSE 2017, Proceedings. Gulden, J., Nurcan, S., Reinhartz-Berger, I., Bera, P. & Guedria, W. (eds.). Springer Verlag, p. 272-286 15 p. (Lecture Notes in Business Information Processing; vol. 287).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • LED-it-GO: Leaking (a lot of) data from air-gapped computers via the (small) hard drive LED

    Guri, M., Zadov, B. & Elovici, Y., 1 Jan 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Polychronakis, M. & Meier, M. (eds.). Springer Verlag, p. 161-184 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    85 Scopus citations
  • Let the cat out of the bag: A holistic approach towards security analysis of the internet of things

    Sachidananda, V., Toh, J., Siboni, S., Bhairav, S., Shabtai, A. & Elovici, Y., 2 Apr 2017, IoTPTS 2017 - Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, co-located with ASIA CCS 2017. Association for Computing Machinery, Inc, p. 3-10 8 p. (IoTPTS 2017 - Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, co-located with ASIA CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Measurement of online discussion authenticity within online social media

    Elyashar, A., Bendahan, J., Puzis, R. & Sanmateu, M. A., 31 Jul 2017, Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017. Diesner, J., Ferrari, E. & Xu, G. (eds.). Association for Computing Machinery, Inc, p. 627-629 3 p. (Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Modeling and solving the multi-agent pathfinding problem in picat

    Bartak, R., Zhou, N. F., Stern, R., Boyarski, E. & Surynek, P., 2 Jul 2017, Proceedings - 2017 International Conference on Tools with Artificial Intelligence, ICTAI 2017. Institute of Electrical and Electronics Engineers, p. 959-966 8 p. (Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI; vol. 2017-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    40 Scopus citations
  • On packet loss modeling: An empirical assessment

    Iacovazzi, A., Frassinella, D. & Elovici, Y., 1 Jul 2017, Proceedings of the 2017 8th International Conference on the Network of the Future, NOF 2017. Mahmoodi, T., Secci, S., Cianfrani, A. & Idzikowaski, F. (eds.). Institute of Electrical and Electronics Engineers, p. 33-39 7 p. (Proceedings of the 2017 8th International Conference on the Network of the Future, NOF 2017; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Personal information leakage during password recovery of internet services

    Guri, M., Shemer, E., Shirtz, D. & Elovici, Y., 2 Mar 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. Brynielsson, J. & Johansson, F. (eds.). Institute of Electrical and Electronics Engineers, p. 136-139 4 p. 7870208. (Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Scopus citations
  • Plan recognition design

    Mirsky, R., Stern, R., Gal, Y. & Kalech, M., 5 Jul 2017, The Workshops of the Thirty-First AAAI Conference on Artificial Intelligence: Technical Reports Ws-17-01 - Ws-17-15. AI Access Foundation, p. 859-866 8 p. (AAAI Workshop - Technical Report; vol. WS-17-01 - WS-17-15).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Playing the mirror game with a robot: Who takes the lead, and what movements are most

    Kashi, S., Loutati, A. & Levy-Tzedek, S., 6 Mar 2017, HRI 2017 - Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction. Institute of Electrical and Electronics Engineers, p. 159-160 2 p. (ACM/IEEE International Conference on Human-Robot Interaction).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis

    Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J. D., Ochoa, M., Tippenhauer, N. O. & Elovici, Y., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association for Computing Machinery, p. 506-509 4 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F128005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    362 Scopus citations
  • Ranking vulnerability fixes using planning graph analysis

    Gonda, T., Shani, G., Puzis, R. & Shapira, B., 2017, IWAISe: First International Workshop on Artificial Intelligence in Security. Vol. 41.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Scalable attack path finding for increased security

    Gonda, T., Puzis, R. & Shapira, B., 2 Jun 2017, Cyber Security Cryptography and Machine Learning - 1st International Conference, CSCML 2017, Proceedings. Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 234-249 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Scholarly digital libraries as a platform for malware distribution

    Nissim, N., Cohen, A., Wu, J., Lanzi, A., Rokach, L., Elovici, Y. & Giles, L., 1 Jan 2017, A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R and D Conference, SG-CRC 2017. Liu, Y. & Roychoudhury, A. (eds.). IOS Press, p. 107-128 22 p. (Cryptology and Information Security Series; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • Session-based recommendations using item embedding

    Greenstein-Messica, A., Rokach, L. & Friedmann, M., 7 Mar 2017, IUI 2017 - Proceedings of the 22nd International Conference on Intelligent User Interfaces. Association for Computing Machinery, p. 629-633 5 p. (International Conference on Intelligent User Interfaces, Proceedings IUI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    35 Scopus citations
  • Short-term load forecasting in smart meters with sliding window-based ARIMA algorithms

    Alberg, D. & Last, M., 1 Jan 2017, Intelligent Information and Database Systems - 9th Asian Conference, ACIIDS 2017, Proceedings. Tojo, S., Nguyen, L. M., Nguyen, N. T. & Trawinski, B. (eds.). Springer Verlag, p. 299-307 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10192 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • SIPHON: Towards scalable high-interaction physical honeypots

    Guarnizo, J., Tambe, A., Bhunia, S. S., Ochoa, M., Tippenhauer, N. O., Shabtai, A. & Elovici, Y., 2 Apr 2017, CPSS 2017 - Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, co-located with ASIA CCS 2017. Association for Computing Machinery, Inc, p. 57-68 12 p. (CPSS 2017 - Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, co-located with ASIA CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    80 Scopus citations
  • Structured behavioral programming idioms

    Ashrov, A., Gordon, M., Marron, A., Arnon, S. & Weiss, G., 17 May 2017, Enterprise, Business-Process and Information Systems Modeling - 18th International Conference, BPMDS 2017, 22nd International Conference, EMMSAD 2017 Held at CAiSE 2017, Proceedings. Gulden, J., Nurcan, S., Reinhartz-Berger, I., Bera, P. & Guedria, W. (eds.). Springer Verlag, p. 319-333 15 p. (Lecture Notes in Business Information Processing; vol. 287).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • The challenge of real-Time multi-Agent systems for enabling IoT and CPS

    Calvaresi, D., Marinoni, M., Sturm, A., Schumacher, M. & Buttazzo, G., 23 Aug 2017, Proceedings - 2017 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2017. Association for Computing Machinery, Inc, p. 356-364 9 p. (Proceedings - 2017 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    101 Scopus citations
  • The curious case of the curious case: Detecting touchscreen events using a smartphone protective case

    Gluck, T., Puzis, R., Oren, Y. & Shabtai, A., 30 Jun 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017. Institute of Electrical and Electronics Engineers, p. 99-103 5 p. 7966978. (Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations