Filter
Conference contribution

Search results

  • 2024

    ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment

    Cohen, O., Bitton, R., Shabtai, A. & Puzis, R., 1 Jan 2024, Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, 2023, Proceedings. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 431-451 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT

    Daniel, N., Kaiser, F. K., Dzega, A., Elyashar, A. & Puzis, R., 1 Jan 2024, Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, 2023, Revised Selected Papers. Katsikas, S., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Ugarelli, R., Praça, I., Li, W., Meng, W., Furnell, S., Katt, B., Pirbhulal, S., Shukla, A., Ianni, M., Dalla Preda, M., Choo, K.-K. R., Pupo Correia, M., Abhishta, A., Sileno, G., Alishahi, M., Kalutarage, H. & Yanai, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 76-91 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14399 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Leveraging Exposure Networks for Detecting Fake News Sources

    Reuben, M., Friedland, L., Puzis, R. & Grinberg, N., 25 Aug 2024, KDD 2024 - Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 5635-5646 12 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2023

    Can One Hear the Position of Nodes?

    Puzis, R., 1 Jan 2023, Complex Networks and Their Applications XI - Proceedings of The 11th International Conference on Complex Networks and Their Applications: COMPLEX NETWORKS 2022—Volume 2. Cherifi, H., Mantegna, R. N., Rocha, L. M., Cherifi, C. & Micciche, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 649-660 12 p. (Studies in Computational Intelligence; vol. 1078).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • CDGeB: Cloud Data Geolocation Benchmark

    Offer, A., Zilberman, A., Shabtai, A., Elovici, Y. & Puzis, R., 26 Nov 2023, CCSW 2023 - Proceedings of the 2023 Cloud Computing Security Workshop. Association for Computing Machinery, Inc, p. 69-74 6 p. (CCSW 2023 - Proceedings of the 2023 Cloud Computing Security Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Large-Scale Shill Bidder Detection in E-commerce

    Fire, M., Puzis, R., Kagan, D. & Elovici, Y., 26 May 2023, 27th International Database Engineered Applications Symposium, IDEAS 2023. Chbeir, R., Ivanovic, M., Manolopoulos, Y. & Revesz, P. Z. (eds.). Association for Computing Machinery, p. 79-86 8 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Link2speed: VANET speed assessment via link-state analysis

    Freund, A., Puzis, R. & Segal, M., 1 Jan 2023, 2023 IEEE Wireless Communications and Networking Conference, WCNC 2023 - Proceedings. Institute of Electrical and Electronics Engineers, (IEEE Wireless Communications and Networking Conference, WCNC; vol. 2023-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Detecting Clickbait in Online Social Media: You Won’t Believe How We Did It

    Elyashar, A., Bendahan, J. & Puzis, R., 1 Jan 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 377-387 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Learning Centrality by Learning to Route

    Bachar, L., Elyashar, A. & Puzis, R., 1 Jan 2022, Complex Networks and Their Applications X - Proceedings of the 10th International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021. Benito, R. M., Cherifi, C., Cherifi, H., Moro, E., Rocha, L. M. & Sales-Pardo, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 247-259 13 p. (Studies in Computational Intelligence; vol. 1015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2021

    Lawful Interception in WebRTC Peer-To-Peer Communication

    Wagner, A. & Puzis, R., 1 Jan 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 153-170 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2020

    Dante: A framework for mining and monitoring darknet traffic

    Cohen, D., Mirsky, Y., Kamp, M., Martin, T., Elovici, Y., Puzis, R. & Shabtai, A., 1 Jan 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 88-109 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Deep Learning for Threat Actor Attribution from Threat Reports

    Naveen, S., Puzis, R. & Angappan, K., 28 Sep 2020, 4th International Conference on Computer, Communication and Signal Processing, ICCCSP 2020. Institute of Electrical and Electronics Engineers, 9315219. (4th International Conference on Computer, Communication and Signal Processing, ICCCSP 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Evaluating the Information Security Awareness of Smartphone Users

    Bitton, R., Boymgold, K., Puzis, R. & Shabtai, A., 21 Apr 2020, CHI 2020 - Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3376385. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • Security Ranking of IoT Devices Using an AHP Model

    Siboni, S., Glezer, C., Puzis, R., Shabtai, A. & Elovici, Y., 1 Jan 2020, Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings. Dolev, S., Weiss, G., Kolesnikov, V. & Lodha, S. (eds.). Springer, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12161 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • The Chameleon Attack: Manipulating Content Display in Online Social Media

    Elyashar, A., Uziel, S., Paradise, A. & Puzis, R., 20 Apr 2020, The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020. Association for Computing Machinery, Inc, p. 848-859 12 p. (The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • 2019

    Attack hypothesis generation

    Elitzur, A., Puzis, R. & Zilberman, P., 1 Nov 2019, Proceedings of the 2019 European Intelligence and Security Informatics Conference, EISIC 2019. Brynielsson, J. (ed.). Institute of Electrical and Electronics Engineers, p. 40-47 8 p. 9108886. (Proceedings of the 2019 European Intelligence and Security Informatics Conference, EISIC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Controllable privacy preserving blockchain: Fiatchain: Distributed privacy preserving cryptocurrency with law enforcement capabilities

    Puzis, R., Barshap, G., Zilberman, P. & Leiba, O., 1 Jan 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 178-197 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Deployment Optimization of IoT Devices through Attack Graph Analysis

    Agmon, N., Shabtai, A. & Puzis, R., 15 May 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 192-202 11 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    17 Scopus citations
  • EEGNAS: Neural Architecture Search for Electroencephalography Data Analysis and Decoding

    Rapaport, E., Shriki, O. & Puzis, R., 1 Jan 2019, Human Brain and Artificial Intelligence - 1st International Workshop, HBAI 2019, held in Conjunction with IJCAI 2019, Revised Selected Papers. Zeng, A., Pan, D., Hao, T., Zhang, D., Shi, Y. & Song, X. (eds.). Springer, p. 3-20 18 p. (Communications in Computer and Information Science; vol. 1072).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • New goal recognition algorithms using attack graphs

    Mirsky, R., Shalom, Y., Majadly, A., Gal, K., Puzis, R. & Felner, A., 1 Jan 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 260-278 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • NO-DOUBT: Attack attribution based on threat intelligence reports

    Perry, L., Shapira, B. & Puzis, R., 1 Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers, p. 80-85 6 p. 8823152. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • 2018

    Anti-forensic = suspicious: Detection of stealthy malware that hides its network traffic

    Agarwal, M., Puzis, R., Haj-Yahya, J., Zilberman, P. & Elovici, Y., 1 Jan 2018, ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Proceedings. Janczewski, L. J. & Kutyłowski, M. (eds.). Springer, p. 216-230 15 p. (IFIP Advances in Information and Communication Technology; vol. 529).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Application marketplace malware detection by user feedback analysis

    Hadad, T., Puzis, R., Sidik, B., Ofek, N. & Rokach, L., 9 Jun 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 1-19 19 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Attack graph obfuscation

    Polad, H., Puzis, R. & Shapira, B., 3 May 2018, Cyber Security Cryptography and Machine Learning - 1st International Conference, CSCML 2017, Proceedings. Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 269-287 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Embedding-centrality: Generic centrality computation using neural networks

    Puzis, R., Sofer, Z., Cohen, D. & Hugi, M., 1 Jan 2018, Springer Proceedings in Complexity. Cornelius, S., Coronges, K., Goncalves, B., Sinatra, R. & Vespignani, A. (eds.). Springer Science and Business Media B.V., p. 87-97 11 p. (Springer Proceedings in Complexity; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Focused SANA: Speeding up network alignment

    Leybovich, I., Puzis, R., Stern, R. & Reuben, M., 1 Jan 2018, Proceedings of the 11th International Symposium on Combinatorial Search, SoCS 2018. Bulitko, V. & Storandt, S. (eds.). AAAI press, p. 168-172 5 p. (Proceedings of the 11th International Symposium on Combinatorial Search, SoCS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Profilegen: Generation of automatic and realistic artificial profiles

    Paradise, A., Cohen, D., Shabtai, A. & Puzis, R., 24 Oct 2018, Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018. Tagarelli, A., Reddy, C. & Brandes, U. (eds.). Institute of Electrical and Electronics Engineers, p. 581-583 3 p. 8508242. (Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    DiscOF: Balanced flow discovery in openflow

    Nacshon, L., Puzis, R. & Zilberman, P., 7 Dec 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017. Institute of Electrical and Electronics Engineers, p. 1-6 6 p. (2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Measurement of online discussion authenticity within online social media

    Elyashar, A., Bendahan, J., Puzis, R. & Sanmateu, M. A., 31 Jul 2017, Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017. Diesner, J., Ferrari, E. & Xu, G. (eds.). Association for Computing Machinery, Inc, p. 627-629 3 p. (Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Ranking vulnerability fixes using planning graph analysis

    Gonda, T., Shani, G., Puzis, R. & Shapira, B., 2017, IWAISe: First International Workshop on Artificial Intelligence in Security. Vol. 41.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Scalable attack path finding for increased security

    Gonda, T., Puzis, R. & Shapira, B., 2 Jun 2017, Cyber Security Cryptography and Machine Learning - 1st International Conference, CSCML 2017, Proceedings. Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 234-249 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • The curious case of the curious case: Detecting touchscreen events using a smartphone protective case

    Gluck, T., Puzis, R., Oren, Y. & Shabtai, A., 30 Jun 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017. Institute of Electrical and Electronics Engineers, p. 99-103 5 p. 7966978. (Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • User feedback analysis for mobile malware detection

    Hadad, T., Sidik, B., Ofek, N., Puzis, R. & Rokach, L., 1 Jan 2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 83-94 12 p. (ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • 2016

    Brain inspired automatic directory

    Azaria, I., Dolev, S., Hanemann, A. & Puzis, R., 11 Mar 2016, Proceedings - 2nd International Symposium on Stochastic Models in Reliability Engineering, Life Science, and Operations Management, SMRLO 2016. Lisnianski, A. & Frenkel, I. (eds.). Institute of Electrical and Electronics Engineers, p. 197-201 5 p. 7433116. (Proceedings - 2nd International Symposium on Stochastic Models in Reliability Engineering, Life Science, and Operations Management, SMRLO 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Comparative network analysis using KronFit

    Sukrit, G., Rami, P. & Konstantin, K., 1 Jan 2016, Complex Networks VII - Proceedings of the 7th Workshop on Complex Networks CompleNet 2016. Cherifi, H., Goncalves, B., Menezes, R. & Sinatra, R. (eds.). Springer Verlag, p. 363-375 13 p. (Studies in Computational Intelligence; vol. 644).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Modeling and Reconstruction of Multi-stage Attacks

    Rubinshtein, S. & Puzis, R., 18 Jul 2016, Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016. Institute of Electrical and Electronics Engineers, p. 135-137 3 p. 7515421. (Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Spot the hotspot: Wi-Fi hotspot classification from internet traffic

    Finkelshtein, A., Puzis, R., Shabtai, A. & Sidik, B., 1 Jan 2016, Social, Cultural, and Behavioral Modeling - 9th International Conference, SBP-BRiMS 2016, Proceedings. Osgood, N., Xu, K. S., Reitter, D. & Lee, D. (eds.). Springer Verlag, p. 239-249 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9708 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2015

    Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search

    Bnaya, Z., Palombo, A., Puzis, R. & Felner, A., 1 Jan 2015, Proceedings of the 8th Annual Symposium on Combinatorial Search, SoCS 2015. Lelis, L. & Stern, R. (eds.). Association for the Advancement of Artificial Intelligence, p. 156-160 5 p. (Proceedings of the 8th Annual Symposium on Combinatorial Search, SoCS 2015; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Hunting organization-targeted socialbots

    Paradise, A., Shabtai, A. & Puzis, R., 25 Aug 2015, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Pei, J., Tang, J. & Silvestri, F. (eds.). Association for Computing Machinery, Inc, p. 537-540 4 p. (Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Leak sinks: The threat of targeted social eavesdropping

    Bokobza, Y., Paradise, A., Rapaport, G., Puzis, R., Shapira, B. & Shabtai, A., 25 Aug 2015, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Pei, J., Tang, J. & Silvestri, F. (eds.). Association for Computing Machinery, Inc, p. 375-382 8 p. (Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Max is more than min: Solving maximization problems with heuristic search

    Stern, R., Kiesel, S., Puzis, R., Felner, A. & Ruml, W., 1 Jan 2015, IJCAI 2015 - Proceedings of the 24th International Joint Conference on Artificial Intelligence. Wooldridge, M. & Yang, Q. (eds.). International Joint Conferences on Artificial Intelligence, p. 4324-4330 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Solving the snake in the box problem with heuristic search: First results

    Palombo, A., Stern, R., Puzis, R., Felner, A., Kiesel, S. & Ruml, W., 1 Jan 2015, Proceedings of the 8th Annual Symposium on Combinatorial Search, SoCS 2015. Lelis, L. & Stern, R. (eds.). AAAI press, p. 96-104 9 p. (Proceedings of the 8th Annual Symposium on Combinatorial Search, SoCS 2015; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • 2014

    Extended framework for target oriented network intelligence collection

    Samama-Kachko, L., Puzis, R., Stern, R. & Felner, A., 1 Jan 2014, Proceedings of the 7th Annual Symposium on Combinatorial Search, SoCS 2014. Edelkamp, S. & Bartak, R. (eds.). AAAI press, p. 131-138 8 p. (Proceedings of the 7th Annual Symposium on Combinatorial Search, SoCS 2014; vol. 2014-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Max Is More than Min: Solving Maximization Problems with Heuristic Search

    Stern, R. Z., Puzis, R., Felner, A., Kiesel, S. & Ruml, W., 1 Jan 2014, Proceedings of the 7th Annual Symposium on Combinatorial Search, SoCS 2014. Edelkamp, S. & Bartak, R. (eds.). AAAI press, p. 148-156 9 p. (Proceedings of the 7th Annual Symposium on Combinatorial Search, SoCS 2014; vol. 2014-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2013

    Bandit algorithms for social network queries

    Bnaya, Z., Puzis, R., Stern, R. & Felner, A., 1 Dec 2013, Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013. p. 148-153 6 p. 6693326. (Proceedings - SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • TONIC: Target Oriented Network Intelligence Collection for the social web

    Stern, R., Samama, L., Puzis, R., Beja, T., Bnaya, Z. & Felner, A., 1 Dec 2013, Proceedings of the 27th AAAI Conference on Artificial Intelligence, AAAI 2013. p. 1184-1190 7 p. (Proceedings of the 27th AAAI Conference on Artificial Intelligence, AAAI 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Volatile multi-armed bandits for guaranteed targeted social crawling

    Bnaya, Z., Puzis, R., Stern, R. & Felner, A., 1 Jan 2013, Late-Breaking Developments in the Field of Artificial Intelligence - Papers Presented at the 27th AAAI Conference on Artificial Intelligence, Technical Report. AI Access Foundation, p. 8-10 3 p. (AAAI Workshop - Technical Report; vol. WS-13-17).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • 2012

    Data mining opportunities in geosocial networks for improving road safety

    Fire, M., Kagan, D., Puzis, R., Rokach, L. & Elovici, Y., 1 Dec 2012, 2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2012. 6377049. (2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Scopus citations
  • Heuristics for speeding up betweenness centrality computation

    Puzis, R., Zilberman, P., Elovici, Y., Dolev, S. & Brandes, U., 1 Dec 2012, Proceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012. p. 302-311 10 p. 6406259. (Proceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • On-line detection and prediction of temporal patterns

    Dolev, S., Goldfeld, J. & Puzis, R., 5 Nov 2012, Hardware and Software: Verification and Testing - 7th International Haifa Verification Conference, HVC 2011, Revised Selected Papers. p. 254-256 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7261 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review