Filter
Conference contribution

Search results

  • 2025

    Access Policy Prediction via User Behavior

    Amour, S. & Gudes, E., 1 Jan 2025, Cyber Security, Cryptology, and Machine Learning - 8th International Symposium, CSCML 2024, Proceedings. Dolev, S., Elhadad, M., Kutyłowski, M. & Persiano, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 257-267 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15349 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2024

    AMaze: Non-Stop Source to Destination Optimal Vehicle Scheduling

    Yair, H., Dolev, S. & Gudes, E., 1 Jan 2024, Moving Integrated Product Development to Service Clouds in the Global Economy - Proceedings of the 21st ISPE Inc. International Conference on Concurrent Engineering, CE 2014. Shafik, M. (ed.). IOS Press BV, p. 329-338 10 p. (Advances in Transdisciplinary Engineering; vol. 63).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • A User Study of an ABAC Model for Online Social Networks

    Swissa, A. & Gudes, E., 1 Jan 2024, Trust Management XIV - 14th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2023, Proceedings. Muller, T., Fernandez-Gago, C., Ceolin, D., Gudes, E. & Gal-Oz, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 56-71 16 p. (IFIP Advances in Information and Communication Technology; vol. 694 IFIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Behavior-Dependent Access Control Policies

    Shmuel, A. & Gudes, E., 1 Jan 2024, Trust Management XIV - 14th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2023, Proceedings. Muller, T., Fernandez-Gago, C., Ceolin, D., Gudes, E. & Gal-Oz, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 19-36 18 p. (IFIP Advances in Information and Communication Technology; vol. 694 IFIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Coverage-Based Caching in Cloud Data Lakes

    Weintraub, G., Gudes, E. & Dolev, S., 16 Sep 2024, Proceedings of the 17th ACM International Systems and Storage Conference, SYSTOR 2024. Association for Computing Machinery, Inc, p. 193 1 p. (Proceedings of the 17th ACM International Systems and Storage Conference, SYSTOR 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Analyzing large-scale genomic data with cloud data lakes

    Weintraub, G., Hadar, N., Gudes, E., Dolev, S. & Birk, O., 5 Jun 2023, Proceedings of the 16th ACM International Conference on Systems and Storage, SYSTOR 2023. Association for Computing Machinery, Inc, p. 142 1 p. (Proceedings of the 16th ACM International Conference on Systems and Storage, SYSTOR 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2022

    BFLUT Bloom Filter for Private Look Up Tables

    Dolev, S., Gudes, E., Segev, E., Ullman, J. D. & Weintraub, G., 23 Jun 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Cham: Springer Science and Business Media Deutschland GmbH, Vol. 13301. p. 499-505 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Fake News Detection in Social Networks Using Machine Learning and Trust

    Voloch, N., Gudes, E., Gal-Oz, N., Mitrany, R., Shani, O. & Shoel, M., 1 Jan 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 180-188 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Non-stopping Junctions via Traffic Scheduling

    Dolev, S., Gudes, E. & Yair, H., 1 Jan 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 247-258 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2021

    An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks

    Swissa, A. & Gudes, E., 1 Jan 2021, Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Proceedings. Barker, K. & Ghazinour, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 377-392 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12840 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks

    Voloch, N., Gudes, E. & Gal-Oz, N., 1 Jan 2021, Complex Networks and Their Applications IX - Volume 1, Proceedings of the Ninth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2020. Benito, R. M., Cherifi, C., Cherifi, H., Moro, E., Rocha, L. M. & Sales-Pardo, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 641-650 10 p. (Studies in Computational Intelligence; vol. 943).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Automatic Real Time Platoon Formation Using the Road Graph

    Dolev, S., Gudes, E. & Yair, H., 1 Jan 2021, 2021 IEEE 20th International Symposium on Network Computing and Applications, NCA 2021. Andreolini, M., Marchetti, M. & Avresky, D. R. (eds.). Institute of Electrical and Electronics Engineers, (2021 IEEE 20th International Symposium on Network Computing and Applications, NCA 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Implementing GDPR in Social Networks Using Trust and Context

    Voloch, N., Gudes, E. & Gal-Oz, N., 1 Jan 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 497-503 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Indexing cloud data lakes within the lakes

    Weintraub, G., Gudes, E. & Dolev, S., 14 Jun 2021, SYSTOR 2021 - Proceedings of the 14th ACM International Conference on Systems and Storage. Association for Computing Machinery, Inc, 3463828. (SYSTOR 2021 - Proceedings of the 14th ACM International Conference on Systems and Storage).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model

    Voloch, N., Gudes, E. & Gal-Oz, N., 1 Jan 2021, Network and System Security - 15th International Conference, NSS 2021, Proceedings. Yang, M., Chen, C. & Liu, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 100-115 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13041 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Use of Blockchain for Ensuring Data Integrity in Cloud Databases.

    Vainshtein, Y. & Gudes, E., 1 Jul 2021, Cyber Security Cryptography and Machine Learning. CSCML 2021.. Dolev , S., Margalit , O., Pinkas , B. & Schwarzmann, A. (eds.). Cham : Springer International Publishing : Imprint: Springer, p. 325-335 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2020

    Comparison of DNS Based Methods for Detecting Malicious Domains

    Paz, E. & Gudes, E., 1 Jan 2020, Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings. Dolev, S., Weiss, G., Kolesnikov, V. & Lodha, S. (eds.). Springer, p. 219-236 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12161 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • PUA detection based on bundle installer characteristics

    Lukach, A., Gudes, E. & Shabtai, A., 1 Jan 2020, Data and Applications Security and Privacy - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Proceedings. Singhal, A. & Vaidya, J. (eds.). Springer, p. 261-273 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12122 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2019

    An access control model for data security in online social networks based on role and user credibility

    Voloch, N., Levy, P., Elmakies, M. & Gudes, E., 1 Jan 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 156-168 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • An MST-based information flow model for security in Online Social Networks

    Voloch, N. & Gudes, E., 1 Jul 2019, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. Institute of Electrical and Electronics Engineers, p. 460-465 6 p. 8806160. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • A role and trust access control model for preserving privacy and image anonymization in social networks

    Voloch, N., Nissim, P., Elmakies, M. & Gudes, E., 1 Jan 2019, Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Proceedings. Meng, W., Jensen, C. D., Cofta, P. & Grandison, T. (eds.). Springer, p. 19-27 9 p. (IFIP Advances in Information and Communication Technology; vol. 563 IFIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Deep Neural Networks as Similitude Models for Sharing Big Data

    Derbeko, P., Dolev, S. & Gudes, E., 1 Dec 2019, Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019. Baru, C., Huan, J., Khan, L., Hu, X. T., Ak, R., Tian, Y., Barga, R., Zaniolo, C., Lee, K. & Ye, Y. F. (eds.). Institute of Electrical and Electronics Engineers, p. 5728-5736 9 p. 9006313. (Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • MLDStore: DNNs as similitude models for sharing big data

    Derbeko, P., Dolev, S. & Gudes, E., 1 Jan 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 93-96 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Query-independent dynamic similitude data models for edge-computing

    Derbeko, P., Dolev, S. & Gudes, E., 1 Apr 2019, INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019. Institute of Electrical and Electronics Engineers, 9093754. (INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors

    Gudes, E. & Voloch, N., 1 Jan 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 55-67 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Data integrity verification in column-oriented NoSQL databases

    Weintraub, G. & Gudes, E., 1 Jan 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Springer Verlag, p. 165-181 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation

    Derbeko, P., Dolev, S. & Gudes, E., 1 Jan 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 105-119 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Secure protocol of ABAC certificates revocation and delegation

    Rabin, A. & Gudes, E., 1 Jan 2018, Foundations and Practice of Security - 10th International Symposium, FPS 2017, Revised Selected Papers. Imine, A., Fernandez, J. M., Logrippo, L., Marion, J.-Y. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10723 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2017

    Advanced flow models for computing the reputation of internet domains

    Othman, H., Gudes, E. & Gal-Oz, N., 1 Jan 2017, Trust Management XI - 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Proceedings. Steghofer, J.-P. & Esfandiari, B. (eds.). Springer New York LLC, p. 119-134 16 p. (IFIP Advances in Information and Communication Technology; vol. 505).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Brief announcement: Privacy preserving mining of distributed data using a trusted and partitioned third party

    Maoz, N. & Gudes, E., 1 Jan 2017, Cyber Security Cryptography and Machine Learning - 1st International Conference, CSCML 2017, Proceedings. Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 193-195 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud

    Weintraub, G. & Gudes, E., 10 Jul 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. Institute of Electrical and Electronics Engineers, p. 498-503 6 p. 7973736. (Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Cryptographically enforced role-based access control for NoSQL distributed databases

    Shalabi, Y. & Gudes, E., 1 Jan 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Efficient and private approximations of distributed databases calculations

    Derbeko, P., Dolev, S., Gudes, E. & Ullman, J. D., 1 Jul 2017, Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017. Nie, J.-Y., Obradovic, Z., Suzumura, T., Ghosh, R., Nambiar, R., Wang, C., Zang, H., Baeza-Yates, R., Baeza-Yates, R., Hu, X., Kepner, J., Cuzzocrea, A., Tang, J. & Toyoda, M. (eds.). Institute of Electrical and Electronics Engineers, p. 4487-4496 10 p. (Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Incremental frequent itemsets mining with MapReduce

    Kandalov, K. & Gudes, E., 1 Jan 2017, Advances in Databases and Information Systems - 21st European Conference, ADBIS 2017, Proceedings. Kirikova, M., Norvag, K. & Papadopoulos, G. A. (eds.). Springer Verlag, p. 247-261 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10509 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2016

    An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets

    Gonen, Y. & Gudes, E., 18 Jul 2016, Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016. Institute of Electrical and Electronics Engineers, p. 77-83 7 p. 7515413. (Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Attacking and defending dynamic analysis system-calls based IDS

    Rosenberg, I. & Gudes, E., 1 Jan 2016, Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer Verlag, p. 103-119 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9895 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Concise essence-preserving big data representation

    Derbeko, P., Dolev, S., Gudes, E. & Ullman, J. D., 1 Jan 2016, Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016. Ak, R., Karypis, G., Xia, Y., Hu, X. T., Yu, P. S., Joshi, J., Ungar, L., Liu, L., Sato, A.-H., Suzumura, T., Rachuri, S., Govindaraju, R. & Xu, W. (eds.). Institute of Electrical and Electronics Engineers, p. 3662-3665 4 p. 7841033. (Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Evading system-calls based intrusion detection systems

    Rosenberg, I. & Gudes, E., 1 Jan 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Yung, M., Chen, J., Su, C. & Piuri, V. (eds.). Springer Verlag, p. 200-216 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Sharing-habits based privacy control in social networks

    Levy, S., Gudes, E. & Oz, N. G., 1 Jan 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Ranise, S. & Swarup, V. (eds.). Springer Verlag, p. 217-232 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Trust-based dynamic RBAC

    Lavi, T. & Gudes, E., 1 Jan 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Camp, O., Furnell, S. & Mori, P. (eds.). SciTePress, p. 317-324 8 p. (ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • 2015

    A topology based flow model for computing domain reputation

    Mishsky, I., Gal-Oz, N. & Gudes, E., 1 Jan 2015, Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Proceedings. Samarati, P. (ed.). Springer Verlag, p. 277-292 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9149).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    13 Scopus citations
  • Reputation - from social perception to internet security

    Gudes, E., 1 Jan 2015, Trust Management IX - 9th IFIP Working Group 11.11 International Conference on Trust Management, IFIPTM 2015, Proceedings. Marsh, S., Dimitrakos, T., Jensen, C. D. & Murayama, Y. (eds.). Springer New York LLC, p. 3-10 8 p. (IFIP Advances in Information and Communication Technology; vol. 454).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • 2014

    Computing domains reputation using flow

    Mishsky, I., Gal-Oz, N. & Gudes, E., 1 Jan 2014, 2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014. Institute of Electrical and Electronics Engineers, p. 426-431 6 p. 7038850. (2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Contexto: Lessons learned from mobile context inference

    Unger, M., Bar, A., Shapira, B., Rokach, L. & Gudes, E., 1 Jan 2014, UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Association for Computing Machinery, Inc, p. 175-178 4 p. (UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Efficient and enhanced solutions for content sharing in DRM systems

    Davidson, M., Gudes, E. & Tassa, T., 1 Jan 2014, Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Proceedings. Springer Verlag, p. 373-381 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8566 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Knots maintenance for optimal management of trust relations

    Gur, L., Gal-Oz, N. & Gudes, E., 1 Jan 2014, Trust Management VIII - 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Proceedings. Zhou, J., Zhou, J., Gal-Oz, N., Gal-Oz, N., Zhang, J., Zhang, J., Gudes, E. & Gudes, E. (eds.). Springer New York LLC, p. 189-204 16 p. (IFIP Advances in Information and Communication Technology; vol. 430).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Trust and reputation in and across virtual communities

    Gal-Oz, N. & Gudes, E., 2 May 2013, Advances in Database Technology - EDBT 2013: 16th International Conference on Extending Database Technology, Proceedings. p. 769-772 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Code type revealing using experiments framework

    Sharon, R. & Gudes, E., 1 Aug 2012, Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Proceedings. p. 193-206 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7371 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2011

    A method for detecting unknown malicious executables

    Rozenberg, B., Gudes, E., Elovici, Y. & Fledel, Y., 1 Dec 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 190-196 7 p. 6120819. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • HashMax: A new method for mining maximal frequent itemsets

    Vanetik, N. & Gudes, E., 1 Dec 2011, KDIR 2011 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval. p. 140-145 6 p. (KDIR 2011 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review