Остановите войну!
for scientists:
default search action
Robert Moskovitch
- > Home > Persons > Robert Moskovitch
Publications
- 2017
- [j25]Nir Nissim, Yuval Shahar, Yuval Elovici, George Hripcsak, Robert Moskovitch:
Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods. Artif. Intell. Medicine 81: 12-32 (2017) - 2016
- [j20]Nir Nissim, Mary Regina Boland, Nicholas P. Tatonetti, Yuval Elovici, George Hripcsak, Yuval Shahar, Robert Moskovitch:
Improving condition severity classification with an efficient active learning based framework. J. Biomed. Informatics 61: 44-54 (2016) - [j18]Nir Nissim, Robert Moskovitch, Oren Bar-Ad, Lior Rokach, Yuval Elovici:
ALDROID: efficient update of Android anti-virus software using designated active learning methods. Knowl. Inf. Syst. 49(3): 795-833 (2016) - [j17]Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren Bar-Ad, Yuval Elovici:
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework. Secur. Informatics 5(1): 1 (2016) - 2015
- [c25]Nir Nissim, Mary Regina Boland, Robert Moskovitch, Nicholas P. Tatonetti, Yuval Elovici, Yuval Shahar, George Hripcsak:
An Active Learning Framework for Efficient Condition Severity Classification. AIME 2015: 13-24 - 2014
- [j13]Nir Nissim, Robert Moskovitch, Lior Rokach, Yuval Elovici:
Novel active learning methods for enhanced PC malware detection in windows OS. Expert Syst. Appl. 41(13): 5843-5857 (2014) - [c23]Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici:
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files. JISIC 2014: 91-98 - 2012
- [j12]Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, Alon Schclar:
User identity verification via mouse dynamics. Inf. Sci. 201: 19-36 (2012) - [j11]Nir Nissim, Robert Moskovitch, Lior Rokach, Yuval Elovici:
Detecting unknown computer worm activity via support vector machines and active learning. Pattern Anal. Appl. 15(4): 459-475 (2012) - [j10]Asaf Shabtai, Robert Moskovitch, Clint Feher, Shlomi Dolev, Yuval Elovici:
Detecting unknown malicious code by applying classification techniques on OpCode patterns. Secur. Informatics 1(1): 1 (2012) - 2011
- [j9]Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici:
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content. Secur. Commun. Networks 4(8): 947-965 (2011) - 2010
- [c22]Tomer Shimshon, Robert Moskovitch, Lior Rokach, Yuval Elovici:
Continuous Verification Using Keystroke Dynamics. CIS 2010: 411-415 - 2009
- [j8]Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer:
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep. 14(1): 16-29 (2009) - [j6]Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar, Yuval Elovici:
Using artificial neural networks to detect unknown computer worms. Neural Comput. Appl. 18(7): 663-674 (2009) - [j5]Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Nathalie Japkowicz, Yuval Elovici:
Unknown malcode detection and the imbalance problem. J. Comput. Virol. 5(4): 295-308 (2009) - [c20]Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Seyit Ahmet Çamtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici:
Identity theft, computers and behavioral biometrics. ISI 2009: 155-160 - [c19]Robert Moskovitch, Clint Feher, Yuval Elovici:
A Chronological Evaluation of Unknown Malcode Detection. PAISI 2009: 112-117 - 2008
- [j4]Robert Moskovitch, Yuval Elovici, Lior Rokach:
Detection of unknown computer worms based on behavioral classification of the host. Comput. Stat. Data Anal. 52(9): 4544-4566 (2008) - [c18]Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici:
Unknown Malcode Detection Using OPCODE Representation. EuroISI 2008: 204-215 - [c17]Robert Moskovitch, Nir Nissim, Roman Englert, Yuval Elovici:
Active learning to improve the detection of unknown computer worms activity. FUSION 2008: 1-8 - [c16]Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici:
Unknown malcode detection via text categorization and the imbalance problem. ISI 2008: 156-161 - [c15]Robert Moskovitch, Clint Feher, Yuval Elovici:
Unknown malcode detection - A chronological evaluation. ISI 2008: 267-268 - [c14]Robert Moskovitch, Nir Nissim, Yuval Elovici:
Malicious Code Detection Using Active Learning. PinKDD 2008: 74-91 - 2007
- [c13]Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. CIDM 2007: 202-209 - [c12]Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Chanan Glezer, Yuval Shahar, Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. CISDA 2007: 169-177 - [c11]Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici:
Host Based Intrusion Detection using Machine Learning. ISI 2007: 107-114 - [c10]Robert Moskovitch, Nir Nissim, Yuval Elovici:
Malicious Code Detection and Acquisition Using Active Learning. ISI 2007: 371 - [c9]Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, Chanan Glezer:
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. KI 2007: 44-50 - [c8]Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici:
Improving the Detection of Unknown Computer Worms Activity Using Active Learning. KI 2007: 489-493 - 2006
- [c6]Dima Stopel, Zvi Boger, Robert Moskovitch, Yuval Shahar, Yuval Elovici:
Application of Artificial Neural Networks Techniques to Computer Worm Detection. IJCNN 2006: 2362-2369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-17 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint