Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Rami Puzis
@article{DBLP:journals/corr/abs-2402-11543, author = {Dov Shirtz and Inna Koberman and Aviad Elyashar and Rami Puzis and Yuval Elovici}, title = {Enhancing Energy Sector Resilience: Integrating Security by Design Principles}, journal = {CoRR}, volume = {abs/2402.11543}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.11543}, doi = {10.48550/ARXIV.2402.11543}, eprinttype = {arXiv}, eprint = {2402.11543}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-11543.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TayouriBSP23, author = {David Tayouri and Nick Baum and Asaf Shabtai and Rami Puzis}, title = {A Survey of MulVAL Extensions and Their Attack Scenarios Coverage}, journal = {{IEEE} Access}, volume = {11}, pages = {27974--27991}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3257721}, doi = {10.1109/ACCESS.2023.3257721}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TayouriBSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/RybickiFP23, author = {Jedrzej Rybicki and Tatiana Frenklach and Rami Puzis}, title = {{DISCONA:} distributed sample compression for nearest neighbor algorithm}, journal = {Appl. Intell.}, volume = {53}, number = {17}, pages = {19976--19989}, year = {2023}, url = {https://doi.org/10.1007/s10489-023-04482-y}, doi = {10.1007/S10489-023-04482-Y}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/RybickiFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LiBP23, author = {Xin Li and Liav Bachar and Rami Puzis}, title = {Centrality Learning: Auralization and Route Fitting}, journal = {Entropy}, volume = {25}, number = {8}, pages = {1115}, year = {2023}, url = {https://doi.org/10.3390/e25081115}, doi = {10.3390/E25081115}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/LiBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KaiserDEZDWSEP23, author = {Florian Klaus Kaiser and Uriel Dardik and Aviad Elitzur and Polina Zilberman and Nir Daniel and Marcus Wiens and Frank Schultmann and Yuval Elovici and Rami Puzis}, title = {Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4793--4809}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3233703}, doi = {10.1109/TDSC.2022.3233703}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/KaiserDEZDWSEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DekelLZP23, author = {Liad Dekel and Ilia Leybovich and Polina Zilberman and Rami Puzis}, title = {{MABAT:} {A} Multi-Armed Bandit Approach for Threat-Hunting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {477--490}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3215010}, doi = {10.1109/TIFS.2022.3215010}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DekelLZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ElyasharPF23, author = {Aviad Elyashar and Rami Puzis and Michael Fire}, title = {It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {2}, pages = {1651--1666}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2021.3096670}, doi = {10.1109/TKDE.2021.3096670}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/ElyasharPF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/AdlerBEP23, author = {Ari Adler and Lior Bass and Yuval Elovici and Rami Puzis}, title = {How Polynomial Regression Improves DeNATing}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {4}, pages = {5000--5011}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3266390}, doi = {10.1109/TNSM.2023.3266390}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/AdlerBEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccsw-ws/OfferZSEP23, author = {Adi Offer and Aviram Zilberman and Asaf Shabtai and Yuval Elovici and Rami Puzis}, editor = {Francesco Regazzoni and Apostolos P. Fournaris}, title = {CDGeB: Cloud Data Geolocation Benchmark}, booktitle = {Proceedings of the 2023 on Cloud Computing Security Workshop, {CCSW} 2023, Copenhagen, Denmark, 26 November 2023}, pages = {69--74}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605763.3625273}, doi = {10.1145/3605763.3625273}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccsw-ws/OfferZSEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DanielKDEP23, author = {Nir Daniel and Florian Klaus Kaiser and Anton Dzega and Aviad Elyashar and Rami Puzis}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Labeling {NIDS} Rules with {MITRE} {ATT} {\&}CK Techniques Using ChatGPT}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {76--91}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_5}, doi = {10.1007/978-3-031-54129-2\_5}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DanielKDEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CohenBSP23, author = {Ofir Cohen and Ron Bitton and Asaf Shabtai and Rami Puzis}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {ConGISATA: {A} Framework for Continuous Gamified Information Security Awareness Training and Assessment}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {431--451}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_22}, doi = {10.1007/978-3-031-51479-1\_22}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CohenBSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideas/FirePKE23, author = {Michael Fire and Rami Puzis and Dima Kagan and Yuval Elovici}, editor = {Richard Chbeir and Mirjana Ivanovic and Yannis Manolopoulos and Peter Z. Revesz}, title = {Large-Scale Shill Bidder Detection in E-commerce}, booktitle = {Proceedings of the International Database Engineered Applications Symposium Conference, {IDEAS} 2023, Heraklion, Crete, Greece, May 5-7, 2023}, pages = {79--86}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589462.3589479}, doi = {10.1145/3589462.3589479}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ideas/FirePKE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/FreundPS23, author = {Alon Freund and Rami Puzis and Michael Segal}, title = {Link2speed: {VANET} speed assessment via link-state analysis}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2023, Glasgow, UK, March 26-29, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WCNC55385.2023.10119086}, doi = {10.1109/WCNC55385.2023.10119086}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/FreundPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-06786, author = {Natan Semyonov and Rami Puzis and Asaf Shabtai and Gilad Katz}, title = {ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network}, journal = {CoRR}, volume = {abs/2305.06786}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.06786}, doi = {10.48550/ARXIV.2305.06786}, eprinttype = {arXiv}, eprint = {2305.06786}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-06786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/GrolmanCFSP22, author = {Edita Grolman and Dvir Cohen and Tatiana Frenklach and Asaf Shabtai and Rami Puzis}, title = {How and when to stop the co-training process}, journal = {Expert Syst. Appl.}, volume = {187}, pages = {115841}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2021.115841}, doi = {10.1016/J.ESWA.2021.115841}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/GrolmanCFSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/OlswangGPSST22, author = {Amir Olswang and Tom Gonda and Rami Puzis and Guy Shani and Bracha Shapira and Noam Tractinsky}, title = {Prioritizing vulnerability patches in large networks}, journal = {Expert Syst. Appl.}, volume = {193}, pages = {116467}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2021.116467}, doi = {10.1016/J.ESWA.2021.116467}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/OlswangGPSST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ReubenEP22, author = {Maor Reuben and Aviad Elyashar and Rami Puzis}, title = {Iterative query selection for opaque search engines with pseudo relevance feedback}, journal = {Expert Syst. Appl.}, volume = {201}, pages = {117027}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.117027}, doi = {10.1016/J.ESWA.2022.117027}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/ReubenEP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/SolomonMBSRPS22, author = {Adir Solomon and Michael Michaelshvili and Ron Bitton and Bracha Shapira and Lior Rokach and Rami Puzis and Asaf Shabtai}, title = {Contextual security awareness: {A} context-based approach for assessing the security awareness of users}, journal = {Knowl. Based Syst.}, volume = {246}, pages = {108709}, year = {2022}, url = {https://doi.org/10.1016/j.knosys.2022.108709}, doi = {10.1016/J.KNOSYS.2022.108709}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/SolomonMBSRPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complexnetworks/Puzis22, author = {Rami Puzis}, editor = {Hocine Cherifi and Rosario Nunzio Mantegna and Luis M. Rocha and Chantal Cherifi and Salvatore Miccich{\`{e}}}, title = {Can One Hear the Position of Nodes?}, booktitle = {Complex Networks and Their Applications {XI} - Proceedings of The Eleventh International Conference on Complex Networks and Their Applications: {COMPLEX} {NETWORKS} 2022, Palermo, Italy, 8-10 November, 2022, Volume 2}, series = {Studies in Computational Intelligence}, volume = {1078}, pages = {649--660}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21131-7\_50}, doi = {10.1007/978-3-031-21131-7\_50}, timestamp = {Tue, 16 Apr 2024 10:02:05 +0200}, biburl = {https://dblp.org/rec/conf/complexnetworks/Puzis22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/ElyasharBP22, author = {Aviad Elyashar and Jorge Bendahan and Rami Puzis}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {Detecting Clickbait in Online Social Media: You Won't Believe How We Did It}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {377--387}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_28}, doi = {10.1007/978-3-031-07689-3\_28}, timestamp = {Fri, 24 Jun 2022 18:23:22 +0200}, biburl = {https://dblp.org/rec/conf/cscml/ElyasharBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/DekelZPDE22, author = {Liad Dekel and Polina Zilberman and Rami Puzis and Uriel Dardik and Aviad Elitzur}, title = {Attack {DB} {OTX-XFORCE-VT}}, publisher = {{IEEE} DataPort}, year = {2022}, month = may, howpublished = {\url{https://doi.org/10.21227/f74t-gh08}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/f74t-gh08}, doi = {10.21227/F74T-GH08}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/DekelZPDE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/TayouriBSP22, author = {David Tayouri and Nick Baum and Asaf Shabtai and Rami Puzis}, title = {MulVAL Interaction Rules Mapped to {MITRE} ATT{\&}CK}, publisher = {{IEEE} DataPort}, year = {2022}, month = jul, howpublished = {\url{https://doi.org/10.21227/bvkn-4119}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/bvkn-4119}, doi = {10.21227/BVKN-4119}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/TayouriBSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-02057, author = {Michael Fire and Rami Puzis and Dima Kagan and Yuval Elovici}, title = {Large-Scale Shill Bidder Detection in E-commerce}, journal = {CoRR}, volume = {abs/2204.02057}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.02057}, doi = {10.48550/ARXIV.2204.02057}, eprinttype = {arXiv}, eprint = {2204.02057}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-02057.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-05750, author = {David Tayouri and Nick Baum and Asaf Shabtai and Rami Puzis}, title = {A Survey of MulVAL Extensions and Their Attack Scenarios Coverage}, journal = {CoRR}, volume = {abs/2208.05750}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.05750}, doi = {10.48550/ARXIV.2208.05750}, eprinttype = {arXiv}, eprint = {2208.05750}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-05750.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-06325, author = {Rami Puzis}, title = {Can one hear the position of nodes?}, journal = {CoRR}, volume = {abs/2211.06325}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.06325}, doi = {10.48550/ARXIV.2211.06325}, eprinttype = {arXiv}, eprint = {2211.06325}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-06325.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-14404, author = {Moti Cohen and Lior Rokach and Rami Puzis}, title = {Cross Version Defect Prediction with Class Dependency Embeddings}, journal = {CoRR}, volume = {abs/2212.14404}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.14404}, doi = {10.48550/ARXIV.2212.14404}, eprinttype = {arXiv}, eprint = {2212.14404}, timestamp = {Sun, 08 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-14404.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrenklachCSP21, author = {Tatiana Frenklach and Dvir Cohen and Asaf Shabtai and Rami Puzis}, title = {Android malware detection via an app similarity graph}, journal = {Comput. Secur.}, volume = {109}, pages = {102386}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102386}, doi = {10.1016/J.COSE.2021.102386}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FrenklachCSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LandauPN20, author = {Ofir Landau and Rami Puzis and Nir Nissim}, title = {Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security in Cyber Space}, journal = {{ACM} Comput. Surv.}, volume = {53}, number = {1}, pages = {17:1--17:38}, year = {2021}, url = {https://doi.org/10.1145/3372043}, doi = {10.1145/3372043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/LandauPN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/FarshteindikerP21, author = {Adi Farshteindiker and Rami Puzis}, title = {Leadership Hijacking in Docker Swarm and Its Consequences}, journal = {Entropy}, volume = {23}, number = {7}, pages = {914}, year = {2021}, url = {https://doi.org/10.3390/e23070914}, doi = {10.3390/E23070914}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/FarshteindikerP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/ElyasharPF21, author = {Aviad Elyashar and Rami Puzis and Michael Fire}, title = {How does that name sound? Name representation learning using accent-specific speech generation}, journal = {Knowl. Based Syst.}, volume = {227}, pages = {107229}, year = {2021}, url = {https://doi.org/10.1016/j.knosys.2021.107229}, doi = {10.1016/J.KNOSYS.2021.107229}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/ElyasharPF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ploscb/GuersteinRDMDPP21, author = {Sharon Guerstein and Victoria Romeo{-}Aznar and Ma'ayan Dekel and Oren Miron and Nadav Davidovitch and Rami Puzis and Shai Pilosof}, title = {The interplay between vaccination and social distancing strategies affects {COVID19} population-level outcomes}, journal = {PLoS Comput. Biol.}, volume = {17}, number = {8}, year = {2021}, url = {https://doi.org/10.1371/journal.pcbi.1009319}, doi = {10.1371/JOURNAL.PCBI.1009319}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ploscb/GuersteinRDMDPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/RapaportPZHP21, author = {Elad Rapaport and Ingmar Poese and Polina Zilberman and Oliver Holschke and Rami Puzis}, title = {Spillover Today? Predicting Traffic Overflows on Private Peering of Major Content Providers}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {4}, pages = {4169--4182}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3126643}, doi = {10.1109/TNSM.2021.3126643}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/RapaportPZHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complexnetworks/BacharEP21, author = {Liav Bachar and Aviad Elyashar and Rami Puzis}, editor = {Rosa Mar{\'{\i}}a Benito and Chantal Cherifi and Hocine Cherifi and Esteban Moro and Luis M. Rocha and Marta Sales{-}Pardo}, title = {Learning Centrality by Learning to Route}, booktitle = {Complex Networks {\&} Their Applications {X} - Volume 1, Proceedings of the Tenth International Conference on Complex Networks and Their Applications {COMPLEX} {NETWORKS} 2021, Madrid, Spain, November 30 - December 2, 2021}, series = {Studies in Computational Intelligence}, volume = {1015}, pages = {247--259}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93409-5\_21}, doi = {10.1007/978-3-030-93409-5\_21}, timestamp = {Mon, 26 Jun 2023 20:46:27 +0200}, biburl = {https://dblp.org/rec/conf/complexnetworks/BacharEP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/WagnerP21, author = {Assaf Wagner and Rami Puzis}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Lawful Interception in WebRTC Peer-To-Peer Communication}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {153--170}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_12}, doi = {10.1007/978-3-030-78086-9\_12}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/WagnerP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SidikPZE20, author = {Bronislav Sidik and Rami Puzis and Polina Zilberman and Yuval Elovici}, title = {{PALE:} Time Bounded Practical Agile Leader Election}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {31}, number = {2}, pages = {470--485}, year = {2020}, url = {https://doi.org/10.1109/TPDS.2019.2933620}, doi = {10.1109/TPDS.2019.2933620}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SidikPZE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BittonBPS20, author = {Ron Bitton and Kobi Boymgold and Rami Puzis and Asaf Shabtai}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Evaluating the Information Security Awareness of Smartphone Users}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--13}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376385}, doi = {10.1145/3313831.3376385}, timestamp = {Wed, 04 May 2022 13:02:17 +0200}, biburl = {https://dblp.org/rec/conf/chi/BittonBPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/SiboniGPSE20, author = {Shachar Siboni and Chanan Glezer and Rami Puzis and Asaf Shabtai and Yuval Elovici}, editor = {Shlomi Dolev and Vladimir Kolesnikov and Sachin Lodha and Gera Weiss}, title = {Security Ranking of IoT Devices Using an {AHP} Model}, booktitle = {Cyber Security Cryptography and Machine Learning - Fourth International Symposium, {CSCML} 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12161}, pages = {29--44}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49785-9\_3}, doi = {10.1007/978-3-030-49785-9\_3}, timestamp = {Thu, 25 Jun 2020 16:11:03 +0200}, biburl = {https://dblp.org/rec/conf/cscml/SiboniGPSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CohenMKMEPS20, author = {Dvir Cohen and Yisroel Mirsky and Manuel Kamp and Tobias Martin and Yuval Elovici and Rami Puzis and Asaf Shabtai}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {{DANTE:} {A} Framework for Mining and Monitoring Darknet Traffic}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {88--109}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_5}, doi = {10.1007/978-3-030-58951-6\_5}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CohenMKMEPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ElyasharUPP20, author = {Aviad Elyashar and Sagi Uziel and Abigail Paradise and Rami Puzis}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {The Chameleon Attack: Manipulating Content Display in Online Social Media}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {848--859}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380165}, doi = {10.1145/3366423.3380165}, timestamp = {Fri, 25 Dec 2020 01:14:58 +0100}, biburl = {https://dblp.org/rec/conf/www/ElyasharUPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-05668, author = {Aviad Elyashar and Sagi Uziel and Abigail Paradise and Rami Puzis}, title = {The Chameleon Attack: Manipulating Content Display in Online Social Media}, journal = {CoRR}, volume = {abs/2001.05668}, year = {2020}, url = {https://arxiv.org/abs/2001.05668}, eprinttype = {arXiv}, eprint = {2001.05668}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-05668.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-09832, author = {Sigal Shaked and Amos Zamir and Roman Vainshtein and Moshe Unger and Lior Rokach and Rami Puzis and Bracha Shapira}, title = {Sequence Preserving Network Traffic Generation}, journal = {CoRR}, volume = {abs/2002.09832}, year = {2020}, url = {https://arxiv.org/abs/2002.09832}, eprinttype = {arXiv}, eprint = {2002.09832}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-09832.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-01518, author = {Sunders Bruskin and Polina Zilberman and Rami Puzis and Shay Shwarz}, title = {SoK: {A} Survey of Open Source Threat Emulators}, journal = {CoRR}, volume = {abs/2003.01518}, year = {2020}, url = {https://arxiv.org/abs/2003.01518}, eprinttype = {arXiv}, eprint = {2003.01518}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-01518.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-02575, author = {Dvir Cohen and Yisroel Mirsky and Yuval Elovici and Rami Puzis and Manuel Kamp and Tobias Martin and Asaf Shabtai}, title = {{DANTE:} {A} framework for mining and monitoring darknet traffic}, journal = {CoRR}, volume = {abs/2003.02575}, year = {2020}, url = {https://arxiv.org/abs/2003.02575}, eprinttype = {arXiv}, eprint = {2003.02575}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-02575.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-03663, author = {Rami Puzis and Polina Zilberman and Yuval Elovici}, title = {{ATHAFI:} Agile Threat Hunting And Forensic Investigation}, journal = {CoRR}, volume = {abs/2003.03663}, year = {2020}, url = {https://arxiv.org/abs/2003.03663}, eprinttype = {arXiv}, eprint = {2003.03663}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-03663.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-11838, author = {Aviad Elyashar and Rami Puzis and Michael Fire}, title = {How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning}, journal = {CoRR}, volume = {abs/2005.11838}, year = {2020}, url = {https://arxiv.org/abs/2005.11838}, eprinttype = {arXiv}, eprint = {2005.11838}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-11838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-01380, author = {Elad Rapaport and Ingmar Poese and Polina Zilberman and Oliver Holschke and Rami Puzis}, title = {Predicting traffic overflows on private peering}, journal = {CoRR}, volume = {abs/2010.01380}, year = {2020}, url = {https://arxiv.org/abs/2010.01380}, eprinttype = {arXiv}, eprint = {2010.01380}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-01380.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-14224, author = {Dor Farbiash and Rami Puzis}, title = {Cyberbiosecurity: {DNA} Injection Attack in Synthetic Biology}, journal = {CoRR}, volume = {abs/2011.14224}, year = {2020}, url = {https://arxiv.org/abs/2011.14224}, eprinttype = {arXiv}, eprint = {2011.14224}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-14224.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12498, author = {Aviad Elyashar and Maor Reuben and Rami Puzis}, title = {Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback}, journal = {CoRR}, volume = {abs/2012.12498}, year = {2020}, url = {https://arxiv.org/abs/2012.12498}, eprinttype = {arXiv}, eprint = {2012.12498}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcb/ToubianaPSB19, author = {David Toubiana and Rami Puzis and Avi Sadka and Eduardo Blumwald}, title = {A Genetic Algorithm to Optimize Weighted Gene Co-Expression Network Analysis}, journal = {J. Comput. Biol.}, volume = {26}, number = {12}, pages = {1349--1366}, year = {2019}, url = {https://doi.org/10.1089/cmb.2019.0221}, doi = {10.1089/CMB.2019.0221}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcb/ToubianaPSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuriPCRKE19, author = {Mordechai Guri and Rami Puzis and Kim{-}Kwang Raymond Choo and Sergey Rubinshtein and Gabi Kedma and Yuval Elovici}, title = {Using malware for the greater good: Mitigating data leakage}, journal = {J. Netw. Comput. Appl.}, volume = {145}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.07.006}, doi = {10.1016/J.JNCA.2019.07.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuriPCRKE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/PuzisSHSF19, author = {Rami Puzis and Liron Samama{-}Kachko and Barak Hagbi and Roni Stern and Ariel Felner}, title = {Target oriented network intelligence collection: effective exploration of social networks}, journal = {World Wide Web}, volume = {22}, number = {4}, pages = {1447--1480}, year = {2019}, url = {https://doi.org/10.1007/s11280-018-0648-0}, doi = {10.1007/S11280-018-0648-0}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/PuzisSHSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/PuzisBZL19, author = {Rami Puzis and Guy Barshap and Polina Zilberman and Oded Leiba}, editor = {Shlomi Dolev and Danny Hendler and Sachin Lodha and Moti Yung}, title = {Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities}, booktitle = {Cyber Security Cryptography and Machine Learning - Third International Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11527}, pages = {178--197}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-20951-3\_16}, doi = {10.1007/978-3-030-20951-3\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/PuzisBZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/MirskySMGPF19, author = {Reuth Mirsky and Ya'ar Shalom and Ahmad Majadly and Kobi Gal and Rami Puzis and Ariel Felner}, editor = {Shlomi Dolev and Danny Hendler and Sachin Lodha and Moti Yung}, title = {New Goal Recognition Algorithms Using Attack Graphs}, booktitle = {Cyber Security Cryptography and Machine Learning - Third International Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11527}, pages = {260--278}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-20951-3\_23}, doi = {10.1007/978-3-030-20951-3\_23}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscml/MirskySMGPF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ElitzurPZ19, author = {Aviad Elitzur and Rami Puzis and Polina Zilberman}, title = {Attack Hypothesis Generation}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2019, Oulu, Finland, November 26-27, 2019}, pages = {40--47}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EISIC49498.2019.9108886}, doi = {10.1109/EISIC49498.2019.9108886}, timestamp = {Tue, 16 Jun 2020 11:41:28 +0200}, biburl = {https://dblp.org/rec/conf/eisic/ElitzurPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/RapaportSP19, author = {Elad Rapaport and Oren Shriki and Rami Puzis}, editor = {An Zeng and Dan Pan and Tianyong Hao and Daoqiang Zhang and Yiyu Shi and Xiaowei Song}, title = {{EEGNAS:} Neural Architecture Search for Electroencephalography Data Analysis and Decoding}, booktitle = {Human Brain and Artificial Intelligence - First International Workshop, {HBAI} 2019, Held in Conjunction with {IJCAI} 2019, Macao, China, August 12, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1072}, pages = {3--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-1398-5\_1}, doi = {10.1007/978-981-15-1398-5\_1}, timestamp = {Thu, 23 Feb 2023 08:27:30 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/RapaportSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PerrySP19, author = {Lior Perry and Bracha Shapira and Rami Puzis}, title = {{NO-DOUBT:} Attack Attribution Based On Threat Intelligence Reports}, booktitle = {2019 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2019, Shenzhen, China, July 1-3, 2019}, pages = {80--85}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISI.2019.8823152}, doi = {10.1109/ISI.2019.8823152}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/PerrySP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AgmonSP19, author = {Noga Agmon and Asaf Shabtai and Rami Puzis}, title = {Deployment optimization of IoT devices through attack graph analysis}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {192--202}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323411}, doi = {10.1145/3317549.3323411}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AgmonSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-02601, author = {Rami Puzis and Hadar Polad and Bracha Shapira}, title = {Attack Graph Obfuscation}, journal = {CoRR}, volume = {abs/1903.02601}, year = {2019}, url = {http://arxiv.org/abs/1903.02601}, eprinttype = {arXiv}, eprint = {1903.02601}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-02601.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-05853, author = {Noga Agmon and Asaf Shabtai and Rami Puzis}, title = {Deployment Optimization of IoT Devices through Attack Graph Analysis}, journal = {CoRR}, volume = {abs/1904.05853}, year = {2019}, url = {http://arxiv.org/abs/1904.05853}, eprinttype = {arXiv}, eprint = {1904.05853}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-05853.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10229, author = {Ron Bitton and Kobi Boymgold and Rami Puzis and Asaf Shabtai}, title = {Evaluating the Information Security Awareness of Smartphone Users}, journal = {CoRR}, volume = {abs/1906.10229}, year = {2019}, url = {http://arxiv.org/abs/1906.10229}, eprinttype = {arXiv}, eprint = {1906.10229}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10922, author = {Yael Mathov and Noga Agmon and Asaf Shabtai and Rami Puzis and Nils Ole Tippenhauer and Yuval Elovici}, title = {Challenges for Security Assessment of Enterprises in the IoT Era}, journal = {CoRR}, volume = {abs/1906.10922}, year = {2019}, url = {http://arxiv.org/abs/1906.10922}, eprinttype = {arXiv}, eprint = {1906.10922}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10922.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-04003, author = {Aviad Elyashar and Rami Puzis and Michael Fire}, title = {It Runs in the Family: Searching for Similar Names using Digitized Family Trees}, journal = {CoRR}, volume = {abs/1912.04003}, year = {2019}, url = {http://arxiv.org/abs/1912.04003}, eprinttype = {arXiv}, eprint = {1912.04003}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-04003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BittonFSPRS18, author = {Ron Bitton and Andrey Finkelshtein and Lior Sidi and Rami Puzis and Lior Rokach and Asaf Shabtai}, title = {Taxonomy of mobile users' security awareness}, journal = {Comput. Secur.}, volume = {73}, pages = {266--293}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.015}, doi = {10.1016/J.COSE.2017.10.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BittonFSPRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entcom/SteinYPST18, author = {Adi Stein and Yair Yotam and Rami Puzis and Guy Shani and Meirav Taieb{-}Maimon}, title = {EEG-triggered dynamic difficulty adjustment for multiplayer games}, journal = {Entertain. Comput.}, volume = {25}, pages = {14--25}, year = {2018}, url = {https://doi.org/10.1016/j.entcom.2017.11.003}, doi = {10.1016/J.ENTCOM.2017.11.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcom/SteinYPST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/GrolmanFPSCKR18, author = {Edita Grolman and Andrey Finkelshtein and Rami Puzis and Asaf Shabtai and Gershon Celniker and Ziv Katzir and Liron Rosenfeld}, title = {Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis}, journal = {{IEEE} Intell. Syst.}, volume = {33}, number = {2}, pages = {40--53}, year = {2018}, url = {https://doi.org/10.1109/MIS.2018.111145120}, doi = {10.1109/MIS.2018.111145120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/expert/GrolmanFPSCKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/ParadiseCSP18, author = {Abigail Paradise and Dvir Cohen and Asaf Shabtai and Rami Puzis}, editor = {Ulrik Brandes and Chandan Reddy and Andrea Tagarelli}, title = {ProfileGen: Generation of Automatic and Realistic Artificial Profiles}, booktitle = {{IEEE/ACM} 2018 International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2018, Barcelona, Spain, August 28-31, 2018}, pages = {581--583}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ASONAM.2018.8508242}, doi = {10.1109/ASONAM.2018.8508242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/ParadiseCSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcai/GondaPPSS18, author = {Tom Gonda and Tal Pascal and Rami Puzis and Guy Shani and Bracha Shapira}, editor = {Daniel D. Lee and Alexander Steen and Toby Walsh}, title = {Analysis of Attack Graph Representations for Ranking Vulnerability Fixes}, booktitle = {GCAI-2018, 4th Global Conference on Artificial Intelligence, Luxembourg, September 18-21, 2018}, series = {EPiC Series in Computing}, volume = {55}, pages = {215--228}, publisher = {EasyChair}, year = {2018}, url = {https://doi.org/10.29007/2c1q}, doi = {10.29007/2C1Q}, timestamp = {Sun, 15 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gcai/GondaPPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AgarwalPHZE18, author = {Mayank Agarwal and Rami Puzis and Jawad Haj{-}Yahya and Polina Zilberman and Yuval Elovici}, editor = {Lech Jan Janczewski and Miroslaw Kutylowski}, title = {Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic}, booktitle = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11 International Conference, {SEC} 2018, Held at the 24th {IFIP} World Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {529}, pages = {216--230}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99828-2\_16}, doi = {10.1007/978-3-319-99828-2\_16}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AgarwalPHZE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socs/LeybovichPSR18, author = {Ilia Leybovich and Rami Puzis and Roni Stern and Maor Reuben}, editor = {Vadim Bulitko and Sabine Storandt}, title = {Focused {SANA:} Speeding Up Network Alignment}, booktitle = {Proceedings of the Eleventh International Symposium on Combinatorial Search, {SOCS} 2018, Stockholm, Sweden - 14-15 July 2018}, pages = {168--172}, publisher = {{AAAI} Press}, year = {2018}, url = {https://doi.org/10.1609/socs.v9i1.18466}, doi = {10.1609/SOCS.V9I1.18466}, timestamp = {Mon, 18 Dec 2023 04:11:03 +0100}, biburl = {https://dblp.org/rec/conf/socs/LeybovichPSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/snam/ParadisePS18, author = {Abigail Paradise and Rami Puzis and Asaf Shabtai}, editor = {Reda Alhajj and Jon G. Rokne}, title = {Socialbots}, booktitle = {Encyclopedia of Social Network Analysis and Mining, 2nd Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4939-7131-2\_110212}, doi = {10.1007/978-1-4939-7131-2\_110212}, timestamp = {Wed, 04 May 2022 13:01:02 +0200}, biburl = {https://dblp.org/rec/reference/snam/ParadisePS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/snam/YaakobovichPE18, author = {Elina Yaakobovich and Rami Puzis and Yuval Elovici}, editor = {Reda Alhajj and Jon G. Rokne}, title = {Incentives in Collaborative Applications}, booktitle = {Encyclopedia of Social Network Analysis and Mining, 2nd Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4939-7131-2\_375}, doi = {10.1007/978-1-4939-7131-2\_375}, timestamp = {Sun, 17 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/snam/YaakobovichPE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-03734, author = {Bronislav Sidik and Rami Puzis and Polina Zilberman and Yuval Elovici}, title = {{PALE:} Partially Asynchronous Agile Leader Election}, journal = {CoRR}, volume = {abs/1801.03734}, year = {2018}, url = {http://arxiv.org/abs/1801.03734}, eprinttype = {arXiv}, eprint = {1801.03734}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-03734.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-00125, author = {Abigail Paradise and Dvir Cohen and Asaf Shabtai and Rami Puzis}, title = {Generation of Automatic and Realistic Artificial Profiles}, journal = {CoRR}, volume = {abs/1807.00125}, year = {2018}, url = {http://arxiv.org/abs/1807.00125}, eprinttype = {arXiv}, eprint = {1807.00125}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-00125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compnet/MaliahPS17, author = {Shlomi Maliah and Rami Puzis and Guy Shani}, title = {Shortest path tree sampling for landmark selection in large networks}, journal = {J. Complex Networks}, volume = {5}, number = {5}, pages = {795--815}, year = {2017}, url = {https://doi.org/10.1093/comnet/cnx008}, doi = {10.1093/COMNET/CNX008}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compnet/MaliahPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ParadiseSPEERP17, author = {Abigail Paradise and Asaf Shabtai and Rami Puzis and Aviad Elyashar and Yuval Elovici and Mehran Roshandel and Christoph Peylo}, title = {Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {4}, number = {3}, pages = {65--79}, year = {2017}, url = {https://doi.org/10.1109/TCSS.2017.2719705}, doi = {10.1109/TCSS.2017.2719705}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/ParadiseSPEERP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZilbermanPE17, author = {Polina Zilberman and Rami Puzis and Yuval Elovici}, title = {On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {521--534}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2494039}, doi = {10.1109/TDSC.2015.2494039}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZilbermanPE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/ElyasharBPS17, author = {Aviad Elyashar and Jorge Bendahan and Rami Puzis and Maria{-}Amparo Sanmateu}, editor = {Jana Diesner and Elena Ferrari and Guandong Xu}, title = {Measurement of Online Discussion Authenticity within Online Social Media}, booktitle = {Proceedings of the 2017 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31 - August 03, 2017}, pages = {627--629}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3110025.3110115}, doi = {10.1145/3110025.3110115}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/ElyasharBPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/GondaPS17, author = {Tom Gonda and Rami Puzis and Bracha Shapira}, editor = {Shlomi Dolev and Sachin Lodha}, title = {Scalable Attack Path Finding for Increased Security}, booktitle = {Cyber Security Cryptography and Machine Learning - First International Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10332}, pages = {234--249}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60080-2\_18}, doi = {10.1007/978-3-319-60080-2\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscml/GondaPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/PoladPS17, author = {Hadar Polad and Rami Puzis and Bracha Shapira}, editor = {Shlomi Dolev and Sachin Lodha}, title = {Attack Graph Obfuscation}, booktitle = {Cyber Security Cryptography and Machine Learning - First International Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10332}, pages = {269--287}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60080-2\_20}, doi = {10.1007/978-3-319-60080-2\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscml/PoladPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GluckPOS17, author = {Tomer Gluck and Rami Puzis and Yossi Oren and Asaf Shabtai}, title = {The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017}, pages = {99--103}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSPW.2017.58}, doi = {10.1109/EUROSPW.2017.58}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/GluckPOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HadadPSOR17, author = {Tal Hadad and Rami Puzis and Bronislav Sidik and Nir Ofek and Lior Rokach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Application Marketplace Malware Detection by User Feedback Analysis}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {1--19}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_1}, doi = {10.1007/978-3-319-93354-2\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HadadPSOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HadadSOPR17, author = {Tal Hadad and Bronislav Sidik and Nir Ofek and Rami Puzis and Lior Rokach}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {User Feedback Analysis for Mobile Malware Detection}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {83--94}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006131200830094}, doi = {10.5220/0006131200830094}, timestamp = {Thu, 18 May 2017 14:22:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HadadSOPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfvsdn/NacshonPZ17, author = {Luiza Nacshon and Rami Puzis and Polina Zilberman}, title = {DiscOF: Balanced flow discovery in OpenFlow}, booktitle = {2017 {IEEE} Conference on Network Function Virtualization and Software Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NFV-SDN.2017.8169823}, doi = {10.1109/NFV-SDN.2017.8169823}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/nfvsdn/NacshonPZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FinkelsteinBPS17, author = {Andrey Finkelstein and Ron Biton and Rami Puzis and Asaf Shabtai}, title = {Classification of Smartphone Users Using Internet Traffic}, journal = {CoRR}, volume = {abs/1701.00220}, year = {2017}, url = {http://arxiv.org/abs/1701.00220}, eprinttype = {arXiv}, eprint = {1701.00220}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FinkelsteinBPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/OssmyTPRIE17, author = {Ori Ossmy and Ofir Tam and Rami Puzis and Lior Rokach and Ohad Inbar and Yuval Elovici}, title = {MindDesktop: a general purpose brain computer interface}, journal = {CoRR}, volume = {abs/1705.07490}, year = {2017}, url = {http://arxiv.org/abs/1705.07490}, eprinttype = {arXiv}, eprint = {1705.07490}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/OssmyTPRIE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-02763, author = {Aviad Elyashar and Jorge Bendahan and Rami Puzis}, title = {Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media}, journal = {CoRR}, volume = {abs/1708.02763}, year = {2017}, url = {http://arxiv.org/abs/1708.02763}, eprinttype = {arXiv}, eprint = {1708.02763}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-02763.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-06699, author = {Aviad Elyashar and Jorge Bendahan and Rami Puzis}, title = {Detecting Clickbait in Online Social Media: You Won't Believe How We Did It}, journal = {CoRR}, volume = {abs/1710.06699}, year = {2017}, url = {http://arxiv.org/abs/1710.06699}, eprinttype = {arXiv}, eprint = {1710.06699}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-06699.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eis/PuzisSE16, author = {Rami Puzis and Dov Shirtz and Yuval Elovici}, title = {A particle swarm model for estimating reliability and scheduling system maintenance}, journal = {Enterp. Inf. Syst.}, volume = {10}, number = {4}, pages = {349--377}, year = {2016}, url = {https://doi.org/10.1080/17517575.2014.928954}, doi = {10.1080/17517575.2014.928954}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eis/PuzisSE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/DolevGPK16, author = {Shlomi Dolev and Jonathan Goldfeld and Rami Puzis and Muni Venkateswarlu K.}, title = {Efficient online detection of temporal patterns}, journal = {PeerJ Comput. Sci.}, volume = {2}, pages = {e53}, year = {2016}, url = {https://doi.org/10.7717/peerj-cs.53}, doi = {10.7717/PEERJ-CS.53}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/DolevGPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complenet/GuptaPK16, author = {Sukrit Gupta and Rami Puzis and Konstantin Kilimnik}, editor = {Hocine Cherifi and Bruno Gon{\c{c}}alves and Ronaldo Menezes and Roberta Sinatra}, title = {Comparative Network Analysis Using KronFit}, booktitle = {Complex Networks {VII} - Proceedings of the 7th Workshop on Complex Networks, CompleNet 2016, Dijon, France, March 23-25, 2016}, series = {Studies in Computational Intelligence}, volume = {644}, pages = {363--375}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30569-1\_28}, doi = {10.1007/978-3-319-30569-1\_28}, timestamp = {Mon, 15 Jun 2020 17:04:35 +0200}, biburl = {https://dblp.org/rec/conf/complenet/GuptaPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbp-brims/FinkelshteinPSS16, author = {Andrey Finkelshtein and Rami Puzis and Asaf Shabtai and Bronislav Sidik}, editor = {Kevin S. Xu and David Reitter and Dongwon Lee and Nathaniel Osgood}, title = {Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic}, booktitle = {Social, Cultural, and Behavioral Modeling, 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9708}, pages = {239--249}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39931-7\_23}, doi = {10.1007/978-3-319-39931-7\_23}, timestamp = {Tue, 29 Dec 2020 18:35:21 +0100}, biburl = {https://dblp.org/rec/conf/sbp-brims/FinkelshteinPSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swste/RubinshteinP16, author = {Sergey Rubinshtein and Rami Puzis}, title = {Modeling and Reconstruction of Multi-stage Attacks}, booktitle = {2016 {IEEE} International Conference on Software Science, Technology and Engineering, {SWSTE} 2016, Beer Sheva, Israel, June 23-24, 2016}, pages = {135--137}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SWSTE.2016.27}, doi = {10.1109/SWSTE.2016.27}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/swste/RubinshteinP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FeherSSP16, author = {Ben Feher and Lior Sidi and Asaf Shabtai and Rami Puzis}, title = {The Security of WebRTC}, journal = {CoRR}, volume = {abs/1601.00184}, year = {2016}, url = {http://arxiv.org/abs/1601.00184}, eprinttype = {arXiv}, eprint = {1601.00184}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FeherSSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NacshonPZ16, author = {Luiza Nacshon and Rami Puzis and Polina Zilberman}, title = {Floware: Balanced Flow Monitoring in Software Defined Networks}, journal = {CoRR}, volume = {abs/1608.03307}, year = {2016}, url = {http://arxiv.org/abs/1608.03307}, eprinttype = {arXiv}, eprint = {1608.03307}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NacshonPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NacshonPS16, author = {Luiza Nacshon and Rami Puzis and Amparo Sanmateho}, title = {Pinpoint Influential Posts and Authors}, journal = {CoRR}, volume = {abs/1609.02945}, year = {2016}, url = {http://arxiv.org/abs/1609.02945}, eprinttype = {arXiv}, eprint = {1609.02945}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NacshonPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compnet/PuzisEZDB15, author = {Rami Puzis and Yuval Elovici and Polina Zilberman and Shlomi Dolev and Ulrik Brandes}, title = {Topology manipulations for speeding betweenness centrality computation}, journal = {J. Complex Networks}, volume = {3}, number = {1}, pages = {84--112}, year = {2015}, url = {https://doi.org/10.1093/comnet/cnu015}, doi = {10.1093/COMNET/CNU015}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compnet/PuzisEZDB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/BokobzaPRPSS15, author = {Yasmin Bokobza and Abigail Paradise and Guy Rapaport and Rami Puzis and Bracha Shapira and Asaf Shabtai}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Leak Sinks: The Threat of Targeted Social Eavesdropping}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {375--382}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2808891}, doi = {10.1145/2808797.2808891}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/BokobzaPRPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/ParadiseSP15, author = {Abigail Paradise and Asaf Shabtai and Rami Puzis}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Hunting Organization-Targeted Socialbots}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {537--540}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2809396}, doi = {10.1145/2808797.2809396}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/ParadiseSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/SternKPFR15, author = {Roni Stern and Scott Kiesel and Rami Puzis and Ariel Felner and Wheeler Ruml}, editor = {Qiang Yang and Michael J. Wooldridge}, title = {Max Is More than Min: Solving Maximization Problems with Heuristic Search}, booktitle = {Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July 25-31, 2015}, pages = {4324--4330}, publisher = {{AAAI} Press}, year = {2015}, url = {http://ijcai.org/Abstract/15/615}, timestamp = {Tue, 20 Aug 2019 16:16:43 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/SternKPFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socs/PalomboSPFKR15, author = {Alon Palombo and Roni Stern and Rami Puzis and Ariel Felner and Scott Kiesel and Wheeler Ruml}, editor = {Levi Lelis and Roni Stern}, title = {Solving the Snake in the Box Problem with Heuristic Search: First Results}, booktitle = {Proceedings of the Eighth Annual Symposium on Combinatorial Search, {SOCS} 2015, 11-13 June 2015, Ein Gedi, the Dead Sea, Israel}, pages = {96--104}, publisher = {{AAAI} Press}, year = {2015}, url = {https://doi.org/10.1609/socs.v6i1.18357}, doi = {10.1609/SOCS.V6I1.18357}, timestamp = {Mon, 18 Dec 2023 04:11:03 +0100}, biburl = {https://dblp.org/rec/conf/socs/PalomboSPFKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socs/BnayaPPF15, author = {Zahy Bnaya and Alon Palombo and Rami Puzis and Ariel Felner}, editor = {Levi Lelis and Roni Stern}, title = {Confidence Backup Updates for Aggregating {MDP} State Values in Monte-Carlo Tree Search}, booktitle = {Proceedings of the Eighth Annual Symposium on Combinatorial Search, {SOCS} 2015, 11-13 June 2015, Ein Gedi, the Dead Sea, Israel}, pages = {156--160}, publisher = {{AAAI} Press}, year = {2015}, url = {https://doi.org/10.1609/socs.v6i1.18378}, doi = {10.1609/SOCS.V6I1.18378}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socs/BnayaPPF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PuzisE15, author = {Rami Puzis and Yuval Elovici}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Active Discovery of Hidden Profiles in Social Networks Using Malware}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {221--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_11}, doi = {10.1007/978-3-319-14039-1\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PuzisE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/SternFBPSG14, author = {Roni Stern and Ariel Felner and Jur van den Berg and Rami Puzis and Rajat Shah and Ken Goldberg}, title = {Potential-based bounded-cost search and Anytime Non-Parametric A\({}^{\mbox{*}}\)}, journal = {Artif. Intell.}, volume = {214}, pages = {1--25}, year = {2014}, url = {https://doi.org/10.1016/j.artint.2014.05.002}, doi = {10.1016/J.ARTINT.2014.05.002}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/SternFBPSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ParadisePS14, author = {Abigail Paradise and Rami Puzis and Asaf Shabtai}, title = {Anti-Reconnaissance Tools: Detecting Targeted Socialbots}, journal = {{IEEE} Internet Comput.}, volume = {18}, number = {5}, pages = {11--19}, year = {2014}, url = {https://doi.org/10.1109/MIC.2014.81}, doi = {10.1109/MIC.2014.81}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ParadisePS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socs/Samama-KachkoPSF14, author = {Liron Samama{-}Kachko and Rami Puzis and Roni Stern and Ariel Felner}, editor = {Stefan Edelkamp and Roman Bart{\'{a}}k}, title = {Extended Framework for Target Oriented Network Intelligence Collection}, booktitle = {Proceedings of the Seventh Annual Symposium on Combinatorial Search, {SOCS} 2014, Prague, Czech Republic, 15-17 August 2014}, pages = {131--138}, publisher = {{AAAI} Press}, year = {2014}, url = {https://doi.org/10.1609/socs.v5i1.18317}, doi = {10.1609/SOCS.V5I1.18317}, timestamp = {Mon, 18 Dec 2023 04:11:03 +0100}, biburl = {https://dblp.org/rec/conf/socs/Samama-KachkoPSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socs/SternKPFR14, author = {Roni Tzvi Stern and Scott Kiesel and Rami Puzis and Ariel Felner and Wheeler Ruml}, editor = {Stefan Edelkamp and Roman Bart{\'{a}}k}, title = {Max is More than Min: Solving Maximization Problems with Heuristic Search}, booktitle = {Proceedings of the Seventh Annual Symposium on Combinatorial Search, {SOCS} 2014, Prague, Czech Republic, 15-17 August 2014}, pages = {148--156}, publisher = {{AAAI} Press}, year = {2014}, url = {https://doi.org/10.1609/socs.v5i1.18322}, doi = {10.1609/SOCS.V5I1.18322}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socs/SternKPFR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jits/PuzisAEBSP13, author = {Rami Puzis and Yaniv Altshuler and Yuval Elovici and Shlomo Bekhor and Yoram Shiftan and Alex Pentland}, title = {Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks}, journal = {J. Intell. Transp. Syst.}, volume = {17}, number = {1}, pages = {91--105}, year = {2013}, url = {https://doi.org/10.1080/15472450.2012.716663}, doi = {10.1080/15472450.2012.716663}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jits/PuzisAEBSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/socnet/PuzisPS13, author = {Rami Puzis and Manish Purohit and V. S. Subrahmanian}, title = {Betweenness computation in the single graph representation of hypergraphs}, journal = {Soc. Networks}, volume = {35}, number = {4}, pages = {561--572}, year = {2013}, url = {https://doi.org/10.1016/j.socnet.2013.07.006}, doi = {10.1016/J.SOCNET.2013.07.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/socnet/PuzisPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/FireTPLRE13, author = {Michael Fire and Lena Tenenboim{-}Chekina and Rami Puzis and Ofrit Lesser and Lior Rokach and Yuval Elovici}, title = {Computationally efficient link prediction in a variety of social networks}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {5}, number = {1}, pages = {10:1--10:25}, year = {2013}, url = {https://doi.org/10.1145/2542182.2542192}, doi = {10.1145/2542182.2542192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tist/FireTPLRE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BnayaPSF13, author = {Zahy Bnaya and Rami Puzis and Roni Stern and Ariel Felner}, title = {Volatile Multi-Armed Bandits for Guaranteed Targeted Social Crawling}, booktitle = {Late-Breaking Developments in the Field of Artificial Intelligence, Bellevue, Washington, USA, July 14-18, 2013}, series = {{AAAI} Technical Report}, volume = {{WS-13-17}}, publisher = {{AAAI}}, year = {2013}, url = {http://www.aaai.org/ocs/index.php/WS/AAAIW13/paper/view/7030}, timestamp = {Tue, 05 Sep 2023 08:59:27 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BnayaPSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/SternSPBBF13, author = {Roni Tzvi Stern and Liron Samama and Rami Puzis and Tal Beja and Zahy Bnaya and Ariel Felner}, editor = {Marie desJardins and Michael L. Littman}, title = {{TONIC:} Target Oriented Network Intelligence Collection for the Social Web}, booktitle = {Proceedings of the Twenty-Seventh {AAAI} Conference on Artificial Intelligence, July 14-18, 2013, Bellevue, Washington, {USA}}, pages = {1184--1190}, publisher = {{AAAI} Press}, year = {2013}, url = {https://doi.org/10.1609/aaai.v27i1.8466}, doi = {10.1609/AAAI.V27I1.8466}, timestamp = {Mon, 04 Sep 2023 15:56:33 +0200}, biburl = {https://dblp.org/rec/conf/aaai/SternSPBBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/BnayaPSF13, author = {Zahy Bnaya and Rami Puzis and Roni Stern and Ariel Felner}, title = {Bandit Algorithms for Social Network Queries}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {148--153}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.29}, doi = {10.1109/SOCIALCOM.2013.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/BnayaPSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/PuzisBPR13, author = {Yury Puzis and Yevgen Borodin and Rami Puzis and I. V. Ramakrishnan}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Predictive web automation assistant for people with vision impairments}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {1031--1040}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488478}, doi = {10.1145/2488388.2488478}, timestamp = {Sun, 22 Sep 2019 18:15:38 +0200}, biburl = {https://dblp.org/rec/conf/www/PuzisBPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-3741, author = {Michael Fire and Rami Puzis and Yuval Elovici}, title = {Organization Mining Using Online Social Networks}, journal = {CoRR}, volume = {abs/1303.3741}, year = {2013}, url = {http://arxiv.org/abs/1303.3741}, eprinttype = {arXiv}, eprint = {1303.3741}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-3741.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MenahemPE12, author = {Eitan Menahem and Rami Puzis and Yuval Elovici}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Detecting Spammers via Aggregated Historical Data Set}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {248--262}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_19}, doi = {10.1007/978-3-642-34601-9\_19}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MenahemPE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/PuzisZEDB12, author = {Rami Puzis and Polina Zilberman and Yuval Elovici and Shlomi Dolev and Ulrik Brandes}, title = {Heuristics for Speeding Up Betweenness Centrality Computation}, booktitle = {2012 International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2012, and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012}, pages = {302--311}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SocialCom-PASSAT.2012.66}, doi = {10.1109/SOCIALCOM-PASSAT.2012.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/PuzisZEDB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-1357, author = {Eitan Menahem and Rami Puzis}, title = {Detecting Spammers via Aggregated Historical Data Set}, journal = {CoRR}, volume = {abs/1205.1357}, year = {2012}, url = {http://arxiv.org/abs/1205.1357}, eprinttype = {arXiv}, eprint = {1205.1357}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-1357.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomacs/PuzisTEGD11, author = {Rami Puzis and Meytal Tubi and Yuval Elovici and Chanan Glezer and Shlomi Dolev}, title = {A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks}, journal = {{ACM} Trans. Model. Comput. Simul.}, volume = {22}, number = {1}, pages = {5:1--5:26}, year = {2011}, url = {https://doi.org/10.1145/2043635.2043640}, doi = {10.1145/2043635.2043640}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tomacs/PuzisTEGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aips/SternPF11, author = {Roni Tzvi Stern and Rami Puzis and Ariel Felner}, editor = {Fahiem Bacchus and Carmel Domshlak and Stefan Edelkamp and Malte Helmert}, title = {Potential Search: {A} Bounded-Cost Search Algorithm}, booktitle = {Proceedings of the 21st International Conference on Automated Planning and Scheduling, {ICAPS} 2011, Freiburg, Germany June 11-16, 2011}, publisher = {{AAAI}}, year = {2011}, url = {http://aaai.org/ocs/index.php/ICAPS/ICAPS11/paper/view/2687}, timestamp = {Tue, 28 Jun 2011 14:20:04 +0200}, biburl = {https://dblp.org/rec/conf/aips/SternPF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/PoratRPE11, author = {Talya Porat and Inbal Rief and Rami Puzis and Yuval Elovici}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {LoOkie - it feels like being there}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Extended Abstracts Volume, Vancouver, BC, Canada, May 7-12, 2011}, pages = {1873--1878}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1979742.1979884}, doi = {10.1145/1979742.1979884}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/PoratRPE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hvc/DolevGP11, author = {Shlomi Dolev and Jonathan Goldfeld and Rami Puzis}, editor = {Kerstin Eder and Jo{\~{a}}o Louren{\c{c}}o and Onn Shehory}, title = {On-Line Detection and Prediction of Temporal Patterns}, booktitle = {Hardware and Software: Verification and Testing - 7th International Haifa Verification Conference, {HVC} 2011, Haifa, Israel, December 6-8, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7261}, pages = {254--256}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34188-5\_23}, doi = {10.1007/978-3-642-34188-5\_23}, timestamp = {Fri, 27 Mar 2020 08:58:09 +0100}, biburl = {https://dblp.org/rec/conf/hvc/DolevGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/OssmyTPRIE11, author = {Ori Ossmy and Ofir Tam and Rami Puzis and Lior Rokach and Ohad Inbar and Yuval Elovici}, editor = {Runtong Zhang and Jos{\'{e}} Cordeiro and Xuewei Li and Zhenji Zhang and Juliang Zhang}, title = {MindDesktop - Computer Accessibility for Severely Handicapped}, booktitle = {{ICEIS} 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems, Volume 4, Beijing, China, 8-11 June, 2011}, pages = {316--320}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 28 Sep 2011 15:19:28 +0200}, biburl = {https://dblp.org/rec/conf/iceis/OssmyTPRIE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/FireTLPRE11, author = {Michael Fire and Lena Tenenboim and Ofrit Lesser and Rami Puzis and Lior Rokach and Yuval Elovici}, title = {Link Prediction in Social Networks Using Computationally Efficient Topological Features}, booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 {IEEE} Third International Conference on and 2011 {IEEE} Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011}, pages = {73--80}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PASSAT/SocialCom.2011.20}, doi = {10.1109/PASSAT/SOCIALCOM.2011.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/FireTLPRE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/DolevEP10, author = {Shlomi Dolev and Yuval Elovici and Rami Puzis}, title = {Routing betweenness centrality}, journal = {J. {ACM}}, volume = {57}, number = {4}, pages = {25:1--25:27}, year = {2010}, url = {https://doi.org/10.1145/1734213.1734219}, doi = {10.1145/1734213.1734219}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/DolevEP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Rozenshine-KemelmakherPFE10, author = {Emily Rozenshine{-}Kemelmakher and Rami Puzis and Ariel Felner and Yuval Elovici}, title = {Cost Benefit Deployment of {DNIPS}}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502182}, doi = {10.1109/ICC.2010.5502182}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/Rozenshine-KemelmakherPFE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osc/CohenDFPR10, author = {Eyal Cohen and Shlomi Dolev and Sergey Frenkel and Rami Puzis and Michael Rosenblit}, editor = {Shlomi Dolev and Mihai Oltean}, title = {Nanotechnology Based Optical Solution for NP-Hard Problems}, booktitle = {Optical Supercomputing - Third International Workshop, {OSC} 2010, Bertinoro, Italy, November 17-19, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6748}, pages = {86--99}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22494-2\_10}, doi = {10.1007/978-3-642-22494-2\_10}, timestamp = {Sat, 19 Oct 2019 19:58:35 +0200}, biburl = {https://dblp.org/rec/conf/osc/CohenDFPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socs/SternPF10, author = {Roni Tzvi Stern and Rami Puzis and Ariel Felner}, editor = {Ariel Felner and Nathan R. Sturtevant}, title = {Potential Search: {A} New Greedy Anytime Heuristic Search}, booktitle = {Proceedings of the Third Annual Symposium on Combinatorial Search, {SOCS} 2010, Stone Mountain, Atlanta, Georgia, USA, July 8-10, 2010}, pages = {119--120}, publisher = {{AAAI} Press}, year = {2010}, url = {https://doi.org/10.1609/socs.v1i1.18177}, doi = {10.1609/SOCS.V1I1.18177}, timestamp = {Mon, 18 Dec 2023 04:11:03 +0100}, biburl = {https://dblp.org/rec/conf/socs/SternPF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/social/PuzisTE10, author = {Rami Puzis and Meytal Tubi and Yuval Elovici}, editor = {Borko Furht}, title = {Optimizing Targeting of Intrusion Detection Systems in Social Networks}, booktitle = {Handbook of Social Network Technologies and Applications}, pages = {549--568}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7142-5\_25}, doi = {10.1007/978-1-4419-7142-5\_25}, timestamp = {Wed, 26 Jun 2019 12:55:10 +0200}, biburl = {https://dblp.org/rec/reference/social/PuzisTE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/PuzisYEB09, author = {Rami Puzis and Dana Yagil and Yuval Elovici and Dan Braha}, title = {Collaborative attack on Internet users' anonymity}, journal = {Internet Res.}, volume = {19}, number = {1}, pages = {60--77}, year = {2009}, url = {https://doi.org/10.1108/10662240910927821}, doi = {10.1108/10662240910927821}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/PuzisYEB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DolevEPZ09, author = {Shlomi Dolev and Yuval Elovici and Rami Puzis and Polina Zilberman}, title = {Incremental deployment of network monitors based on Group Betweenness Centrality}, journal = {Inf. Process. Lett.}, volume = {109}, number = {20}, pages = {1172--1176}, year = {2009}, url = {https://doi.org/10.1016/j.ipl.2009.07.019}, doi = {10.1016/J.IPL.2009.07.019}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/DolevEPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mc/ShmueliKPEEG09, author = {Erez Shmueli and Alexander Kruglov and Rami Puzis and Yuval Elovici and Roman Englert and Chanan Glezer}, editor = {Saskia Kain and Doreen Struve and Hartmut Wandke}, title = {An Attentive Digital Signage System}, booktitle = {Workshop-Proceedings der Tagung Mensch {\&} Computer 2009, Berlin, Germany, September 6-9, 2009}, pages = {10--15}, publisher = {Logos Verlag}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/7148}, timestamp = {Thu, 07 Dec 2023 20:49:07 +0100}, biburl = {https://dblp.org/rec/conf/mc/ShmueliKPEEG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0904-0352, author = {Shlomi Dolev and Yuval Elovici and Rami Puzis and Polina Zilberman}, title = {Incremental Deployment of Network Monitors Based on Group Betweenness Centrality}, journal = {CoRR}, volume = {abs/0904.0352}, year = {2009}, url = {http://arxiv.org/abs/0904.0352}, eprinttype = {arXiv}, eprint = {0904.0352}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0904-0352.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euroisi/PuzisKED08, author = {Rami Puzis and Marius David Klippel and Yuval Elovici and Shlomi Dolev}, editor = {Daniel Ortiz Arroyo and Henrik Legind Larsen and Daniel Dajun Zeng and David L. Hicks and Gerhard Wagner}, title = {Optimization of {NIDS} Placement for Protection of Intercommunicating Critical Infrastructures}, booktitle = {Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5376}, pages = {191--203}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89900-6\_20}, doi = {10.1007/978-3-540-89900-6\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/euroisi/PuzisKED08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aicom/PuzisED07, author = {Rami Puzis and Yuval Elovici and Shlomi Dolev}, title = {Finding the most prominent group in complex networks}, journal = {{AI} Commun.}, volume = {20}, number = {4}, pages = {287--296}, year = {2007}, url = {http://content.iospress.com/articles/ai-communications/aic411}, timestamp = {Fri, 15 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aicom/PuzisED07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/TubiPE07, author = {Meytal Tubi and Rami Puzis and Yuval Elovici}, title = {Deployment of {DNIDS} in Social Networks}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings}, pages = {59--65}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISI.2007.379534}, doi = {10.1109/ISI.2007.379534}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/TubiPE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PuzisTTE07, author = {Rami Puzis and Meytal Tubi and Gil Tahan and Yuval Elovici}, title = {Simulating Threats Propagation within the {NSP} Infrastructure}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings}, pages = {380}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISI.2007.379526}, doi = {10.1109/ISI.2007.379526}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PuzisTTE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.