2017
Guy Danon, Mark Last: A Syntactic Approach to Domain-Specific Automatic Question Generation. eprint arXiv:1712.09827 (12/2017)
Itay Hazan, Asaf Shabtai: Dynamic radius and confidence prediction in grid-based location prediction algorithms. Pervasive and Mobile Computing 42: 265-284 (2017)
Tomer Cohen, Danny Hendler, Dennis Potashnik: Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract). CSCML 2017: 34-49
Itay Hazan, Eyal Kushilevitz: Two-Party Direct-Sum Questions Through the Lens of Multiparty Communication Complexity. DISC 2017: 26:1-26:15
Gal Frishman, Yaniv Ben-Itzhak, Oded Margalit: Cluster-Based Load Balancing for Better Network Security. Big-DAMA@SIGCOMM 2017: 7-12
Bar Haim, Eitan Menahem, Yaron Wolfsthal, Christopher Meenan: Visualizing Insider Threats: An Effective Interface for Security Analytics. IUI Companion 2017: 39-42
2016
Eitan Menahem, Alon Schclar, Lior Rokach, Yuval Elovici: XML-AD: Detecting anomalous patterns in XML documents. Inf. Sci. 326: 71-88 (2016)
Aviv Ron, Alexandra Shulman-Peleg, Anton Puzanov: Analysis and Mitigation of NoSQL Injections. IEEE Security & Privacy 14(2): 30-39 (2016)
Oded Margalit: Using Computer Programming Competition for Cyber Education. SwSTE 2016: 104-107
2015
Aviv Ron, Alexandra Shulman-Peleg, Emanuel Bronshtein: No SQL, No Injection? Examining NoSQL Security. CoRR abs/1506.04082 (2015)
Itay Hazan, Asaf Shabtai: Noise Reduction of Mobile Sensors Data in the Prediction of Demographic Attributes. MOBILESoft 2015: 117-120
2014
Gadi Aleksandrowicz, Alexander Ivrii, Oded Margalit, Dan Rasin: Generating Modulo-2 Linear Invariants for Hardware Model Checking. Haifa Verification Conference 2014: 54-67
Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici: OSPF vulnerability to persistent poisoning attacks: a systematic analysis. ACSAC 2014: 336-345
2013
Eitan Menahem, Yuval Elovici, Nir Amar, Gabi Nakibly: ACTIDS: an active strategy for detecting and localizing network attacks. AISec 2013: 55-66
Eitan Menahem, Asaf Shabtai, Adi Levhar: Detecting malware through temporal function-based features. ACM Conference on Computer and Communications Security 2013: 1379-1382
Eitan Menahem, Lior Rokach, Yuval Elovici: Combining one-class classifiers via meta learning. CIKM 2013: 2435-2440
Oded Margalit: On the riddle of coding equality function in the garden hose model. ITA 2014: 1-5 2013
Eitan Menahem, Gabi Nakibly, Yuval Elovici: ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks. CoRR abs/1306.4845 (2013)
Danny Harnik, Ronen I. Kat, Oded Margalit, Dmitry Sotnikov, Avishay Traeger: To Zip or not to Zip: effective resource usage for real-time compression. FAST 2013: 229-242
2012
Oded Margalit: Better Bounds for Event Sequencing Testing. ICST Workshops 2013: 281-284 2012
Danny Harnik, Oded Margalit, Dalit Naor, Dmitry Sotnikov, Gil Vernik: Estimation of deduplication ratios in large data sets. MSST 2012: 1-11
Yael Ben-Haim, Alexander Ivrii, Oded Margalit, Arie Matsliah: Perfect Hashing and CNF Encodings of Cardinality Constraints. SAT 2012: 397-409
Eitan Menahem, Gabi Nakibly, Yuval Elovici: Network-based intrusion detection systems go active! ACM Conference on Computer and Communications Security 2012: 1004-1006
Eitan Menahem, Rami Pusiz, Yuval Elovici: Detecting Spammers via Aggregated Historical Data Set. NSS 2012: 248-262
Eitan Menahem, Rami Puzis: Detecting Spammers via Aggregated Historical Data Set. CoRR abs/1205.1357 (2012)
Eitan Menahem, Alon Schclar, Lior Rokach, Yuval Elovici: Securing Your Transactions: Detecting Anomalous Patterns In XML Documents. CoRR abs/1209.1797 (2012)
2011
Asaf Shabtai, Eitan Menahem, Yuval Elovici: F-Sign: Automatic, Function-Based Signature Generation for Malware. IEEE Trans. Systems, Man, and Cybernetics, Part C 41(4): 494-508 (2011)
Aryeh Kontorovich, Danny Hendler, Eitan Menahem: Metric Anomaly Detection via Asymmetric Risk Minimization. SIMBAD 2011: 17-30
Eitan Menahem, Lior Rokach, Yuval Elovici: Combining One-Class Classifiers via Meta-Learning. CoRR abs/1112.5246 (2011)
Ehud Aharoni, Shai Fine, Yaara Goldschmidt, Ofer Lavi, Oded Margalit, Michal Rosen-Zvi, Lavi Shpigelman: Smarter log analysis. IBM Journal of Research and Development 55(5): 10 (2011)
Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici: Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content. Security and Communication Networks 4(8): 947-965 (2011)
2010
Yuval Fledel, Asaf Shabtai, Dennis Potashnik, Yuval Elovici: Google Android: An Updated Security Review. MobiCASE 2010: 401-414