1973 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2023

    Analyzing large-scale genomic data with cloud data lakes

    Weintraub, G., Hadar, N., Gudes, E., Dolev, S. & Birk, O., Jun 2023, Proceedings of the 16th ACM International Conference on Systems and Storage, SYSTOR 2023. Association for Computing Machinery, Inc, p. 142 1 p. (Proceedings of the 16th ACM International Conference on Systems and Storage, SYSTOR 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • 2022

    BFLUT Bloom Filter for Private Look Up Tables

    Dolev, S., Gudes, E., Segev, E., Ullman, J. D. & Weintraub, G., 23 Jun 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Cham: Springer Science and Business Media Deutschland GmbH, Vol. 13301. p. 499-505 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fake News Detection in Social Networks Using Machine Learning and Trust

    Voloch, N., Gudes, E., Gal-Oz, N., Mitrany, R., Shani, O. & Shoel, M., 1 Jan 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 180-188 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Non-stopping Junctions via Traffic Scheduling

    Dolev, S., Gudes, E. & Yair, H., 1 Jan 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 247-258 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Automatic Real Time Platoon Formation Using the Road Graph

    Dolev, S., Gudes, E. & Yair, H., 1 Jan 2021, 2021 IEEE 20th International Symposium on Network Computing and Applications, NCA 2021. Andreolini, M., Marchetti, M. & Avresky, D. R. (eds.). Institute of Electrical and Electronics Engineers, (2021 IEEE 20th International Symposium on Network Computing and Applications, NCA 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Implementing GDPR in Social Networks Using Trust and Context

    Voloch, N., Gudes, E. & Gal-Oz, N., 1 Jan 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 497-503 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Indexing cloud data lakes within the lakes

    Weintraub, G., Gudes, E. & Dolev, S., 2021, SYSTOR '21: The 14th ACM International Systems and Storage Conference, Haifa, Israel, June 14-16, 2021. Wassermann, B., Malka, M., Chidambaram, V. & Raz, D. (eds.). Association for Computing Machinery, Inc, 22

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model

    Voloch, N., Gudes, E. & Gal-Oz, N., 1 Jan 2021, Network and System Security - 15th International Conference, NSS 2021, Proceedings. Yang, M., Chen, C. & Liu, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 100-115 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13041 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Use of Blockchain for Ensuring Data Integrity in Cloud Databases.

    Vainshtein, Y. & Gudes, E., 1 Jul 2021, Cyber Security Cryptography and Machine Learning. CSCML 2021.. Dolev , S., Margalit , O., Pinkas , B. & Schwarzmann, A. (eds.). Cham : Springer International Publishing : Imprint: Springer, p. 325-335 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2020

    Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks

    Voloch, N., Gudes, E. & Gal-Oz, N., 2020, Complex Networks and Their Applications IX - Volume 1, Proceedings of the Ninth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2020. Benito, R. M., Cherifi, C., Cherifi, H., Moro, E., Rocha, L. M. & Sales-Pardo, M. (eds.). Springer Science and Business Media Deutschland GmbH, Vol. 943. p. 641-650 10 p. (Studies in Computational Intelligence; vol. 943).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Comparison of DNS Based Methods for Detecting Malicious Domains

    Paz, E. & Gudes, E., 1 Jan 2020, Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings. Dolev, S., Weiss, G., Kolesnikov, V. & Lodha, S. (eds.). Springer, p. 219-236 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12161 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • PUA detection based on bundle installer characteristics

    Lukach, A., Gudes, E. & Shabtai, A., 1 Jan 2020, Data and Applications Security and Privacy - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Proceedings. Singhal, A. & Vaidya, J. (eds.). Springer, p. 261-273 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12122 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2019

    An access control model for data security in online social networks based on role and user credibility

    Voloch, N., Levy, P., Elmakies, M. & Gudes, E., 1 Jan 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 156-168 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • An MST-based information flow model for security in Online Social Networks

    Voloch, N. & Gudes, E., 1 Jul 2019, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. Institute of Electrical and Electronics Engineers, p. 460-465 6 p. 8806160. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • A role and trust access control model for preserving privacy and image anonymization in social networks

    Voloch, N., Nissim, P., Elmakies, M. & Gudes, E., 1 Jan 2019, Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Proceedings. Meng, W., Jensen, C. D., Cofta, P. & Grandison, T. (eds.). Springer, p. 19-27 9 p. (IFIP Advances in Information and Communication Technology; vol. 563 IFIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Deep Neural Networks as Similitude Models for Sharing Big Data

    Derbeko, P., Dolev, S. & Gudes, E., 1 Dec 2019, Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019. Baru, C., Huan, J., Khan, L., Hu, X. T., Ak, R., Tian, Y., Barga, R., Zaniolo, C., Lee, K. & Ye, Y. F. (eds.). Institute of Electrical and Electronics Engineers, p. 5728-5736 9 p. 9006313. (Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • MLDStore: DNNs as similitude models for sharing big data

    Derbeko, P., Dolev, S. & Gudes, E., 1 Jan 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 93-96 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Query-independent dynamic similitude data models for edge-computing

    Derbeko, P., Dolev, S. & Gudes, E., 1 Apr 2019, INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019. Institute of Electrical and Electronics Engineers, 9093754. (INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors

    Gudes, E. & Voloch, N., 1 Jan 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 55-67 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Data integrity verification in column-oriented NoSQL databases

    Weintraub, G. & Gudes, E., 1 Jan 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Springer Verlag, p. 165-181 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation

    Derbeko, P., Dolev, S. & Gudes, E., 1 Jan 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 105-119 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Secure protocol of ABAC certificates revocation and delegation

    Rabin, A. & Gudes, E., 1 Jan 2018, Foundations and Practice of Security - 10th International Symposium, FPS 2017, Revised Selected Papers. Imine, A., Fernandez, J. M., Logrippo, L., Marion, J.-Y. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10723 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2017

    Advanced flow models for computing the reputation of internet domains

    Othman, H., Gudes, E. & Gal-Oz, N., 1 Jan 2017, Trust Management XI - 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Proceedings. Steghofer, J.-P. & Esfandiari, B. (eds.). Springer New York LLC, p. 119-134 16 p. (IFIP Advances in Information and Communication Technology; vol. 505).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Brief announcement: Privacy preserving mining of distributed data using a trusted and partitioned third party

    Maoz, N. & Gudes, E., 1 Jan 2017, Cyber Security Cryptography and Machine Learning - 1st International Conference, CSCML 2017, Proceedings. Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 193-195 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud

    Weintraub, G. & Gudes, E., 10 Jul 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. Institute of Electrical and Electronics Engineers, p. 498-503 6 p. 7973736. (Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Cryptographically enforced role-based access control for NoSQL distributed databases

    Shalabi, Y. & Gudes, E., 1 Jan 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • Efficient and private approximations of distributed databases calculations

    Derbeko, P., Dolev, S., Gudes, E. & Ullman, J. D., 1 Jul 2017, Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017. Nie, J.-Y., Obradovic, Z., Suzumura, T., Ghosh, R., Nambiar, R., Wang, C., Zang, H., Baeza-Yates, R., Baeza-Yates, R., Hu, X., Kepner, J., Cuzzocrea, A., Tang, J. & Toyoda, M. (eds.). Institute of Electrical and Electronics Engineers, p. 4487-4496 10 p. (Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Incremental frequent itemsets mining with MapReduce

    Kandalov, K. & Gudes, E., 1 Jan 2017, Advances in Databases and Information Systems - 21st European Conference, ADBIS 2017, Proceedings. Kirikova, M., Norvag, K. & Papadopoulos, G. A. (eds.). Springer Verlag, p. 247-261 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10509 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2016

    An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets

    Gonen, Y. & Gudes, E., 18 Jul 2016, Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016. Institute of Electrical and Electronics Engineers, p. 77-83 7 p. 7515413. (Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Attacking and defending dynamic analysis system-calls based IDS

    Rosenberg, I. & Gudes, E., 1 Jan 2016, Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer Verlag, p. 103-119 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9895 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Concise essence-preserving big data representation

    Derbeko, P., Dolev, S., Gudes, E. & Ullman, J. D., 1 Jan 2016, Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016. Ak, R., Karypis, G., Xia, Y., Hu, X. T., Yu, P. S., Joshi, J., Ungar, L., Liu, L., Sato, A.-H., Suzumura, T., Rachuri, S., Govindaraju, R. & Xu, W. (eds.). Institute of Electrical and Electronics Engineers, p. 3662-3665 4 p. 7841033. (Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Evading system-calls based intrusion detection systems

    Rosenberg, I. & Gudes, E., 1 Jan 2016, Network and System Security - 10th International Conference, NSS 2016, Proceedings. Yung, M., Chen, J., Su, C. & Piuri, V. (eds.). Springer Verlag, p. 200-216 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9955 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Sharing-habits based privacy control in social networks

    Levy, S., Gudes, E. & Oz, N. G., 1 Jan 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Ranise, S. & Swarup, V. (eds.). Springer Verlag, p. 217-232 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Trust-based dynamic RBAC

    Lavi, T. & Gudes, E., 1 Jan 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Camp, O., Furnell, S. & Mori, P. (eds.). SciTePress, p. 317-324 8 p. (ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • 2015

    A topology based flow model for computing domain reputation

    Mishsky, I., Gal-Oz, N. & Gudes, E., 1 Jan 2015, Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Proceedings. Samarati, P. (ed.). Springer Verlag, p. 277-292 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9149).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Scopus citations
  • Reputation - from social perception to internet security

    Gudes, E., 1 Jan 2015, Trust Management IX - 9th IFIP Working Group 11.11 International Conference on Trust Management, IFIPTM 2015, Proceedings. Marsh, S., Dimitrakos, T., Jensen, C. D. & Murayama, Y. (eds.). Springer New York LLC, p. 3-10 8 p. (IFIP Advances in Information and Communication Technology; vol. 454).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • 2014

    Computing domains reputation using flow

    Mishsky, I., Gal-Oz, N. & Gudes, E., 1 Jan 2014, 2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014. Institute of Electrical and Electronics Engineers, p. 426-431 6 p. 7038850. (2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Contexto: Lessons learned from mobile context inference

    Unger, M., Bar, A., Shapira, B., Rokach, L. & Gudes, E., 1 Jan 2014, UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Association for Computing Machinery, Inc, p. 175-178 4 p. (UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Efficient and enhanced solutions for content sharing in DRM systems

    Davidson, M., Gudes, E. & Tassa, T., 1 Jan 2014, Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Proceedings. Springer Verlag, p. 373-381 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8566 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Knots maintenance for optimal management of trust relations

    Gur, L., Gal-Oz, N. & Gudes, E., 1 Jan 2014, Trust Management VIII - 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Proceedings. Zhou, J., Zhou, J., Gal-Oz, N., Gal-Oz, N., Zhang, J., Zhang, J., Gudes, E. & Gudes, E. (eds.). Springer New York LLC, p. 189-204 16 p. (IFIP Advances in Information and Communication Technology; vol. 430).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2013

    Trust and reputation in and across virtual communities

    Gal-Oz, N. & Gudes, E., 2 May 2013, Advances in Database Technology - EDBT 2013: 16th International Conference on Extending Database Technology, Proceedings. p. 769-772 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Code type revealing using experiments framework

    Sharon, R. & Gudes, E., 1 Aug 2012, Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Proceedings. p. 193-206 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7371 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2011

    A method for detecting unknown malicious executables

    Rozenberg, B., Gudes, E., Elovici, Y. & Fledel, Y., 1 Dec 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 190-196 7 p. 6120819. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • HashMax: A new method for mining maximal frequent itemsets

    Vanetik, N. & Gudes, E., 1 Dec 2011, KDIR 2011 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval. p. 140-145 6 p. (KDIR 2011 - Proceedings of the International Conference on Knowledge Discovery and Information Retrieval).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Identifying knots of trust in virtual communities

    Gal-Oz, N., Yahalom, R. & Gudes, E., 1 Jan 2011, Trust Management V - 5th IFIP WG 11.11 International Conference, IFIPTM 2011 - Proceedings. Springer New York LLC, p. 67-81 15 p. (IFIP Advances in Information and Communication Technology; vol. 358 AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Mining roles from web application usage patterns

    Gal-Oz, N., Gonen, Y., Yahalom, R., Gudes, E., Rozenberg, B. & Shmueli, E., 20 Sep 2011, Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Proceedings. p. 125-137 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6863 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Privacy issues with sharing reputation across virtual communities

    Gal-Oz, N., Grinshpoun, T. & Gudes, E., 1 Jan 2011, Proceedings - 4th International Workshop on Privacy and Anonymity in the Information Society, PAIS 2011. Association for Computing Machinery, 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Security issues in NoSQL databases

    Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E. & Abramov, J., 1 Dec 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 541-547 7 p. 6120863. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    121 Scopus citations
  • Tracking end-users in web databases

    Rozenberg, B., Gonen, Y., Gudes, E., Gal-Oz, N. & Shmueli, E., 17 Nov 2011, Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011. p. 105-112 8 p. 6059966. (Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2010

    CAMLS: A constraint-based Apriori algorithm for mining long sequences

    Gonen, Y., Gal-Oz, N., Yahalom, R. & Gudes, E., 28 Dec 2010, Database Systems for Advanced Applications - 15th International Conference, DASFAA 2010, Proceedings. PART 1 ed. p. 63-77 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5981 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations