If you made any changes in Pure these will be visible here soon.

Search results

  • 2014

    Peers-based location of mobile devices

    Guri, M., Krasner, A. & Elovici, Y., 1 Jan 2014, Frontier and Innovation in Future Computing and Communications. Zomaya, A., Park, J. J., Jeong, H-Y. & Obaidat, M. (eds.). Springer Verlag, p. 439-445 7 p. (Lecture Notes in Electrical Engineering; vol. 301).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Resilience of anti-malware programs to naïve modifications of malicious binaries

    Guri, M., Kedma, G., Kachlon, A. & Elovici, Y., 4 Dec 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers, p. 152-159 8 p. 6975567. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Trusted detection of sensitive activities on mobile phones using power consumption measurements

    Guri, M., Kedma, G., Zadov, B. & Elovici, Y., 4 Dec 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers, p. 145-151 7 p. 6975566. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2013

    Analyzing users' web surfing patterns to trace terrorists and criminals

    Kedma, G., Guri, M., Sela, T. & Elovici, Y., 9 Sep 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 143-145 3 p. 6578804. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Noninvasive detection of anti-forensic malware

    Guri, M., Kedma, G., Sela, T., Carmeli, B., Rosner, A. & Elovici, Y., 1 Jan 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. Institute of Electrical and Electronics Engineers, p. 1-10 10 p. 6703679. (Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations