BibTeX records: Rami Puzis

download as .bib file

@article{DBLP:journals/corr/abs-2402-11543,
  author       = {Dov Shirtz and
                  Inna Koberman and
                  Aviad Elyashar and
                  Rami Puzis and
                  Yuval Elovici},
  title        = {Enhancing Energy Sector Resilience: Integrating Security by Design
                  Principles},
  journal      = {CoRR},
  volume       = {abs/2402.11543},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.11543},
  doi          = {10.48550/ARXIV.2402.11543},
  eprinttype    = {arXiv},
  eprint       = {2402.11543},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-11543.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TayouriBSP23,
  author       = {David Tayouri and
                  Nick Baum and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {A Survey of MulVAL Extensions and Their Attack Scenarios Coverage},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {27974--27991},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3257721},
  doi          = {10.1109/ACCESS.2023.3257721},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TayouriBSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/RybickiFP23,
  author       = {Jedrzej Rybicki and
                  Tatiana Frenklach and
                  Rami Puzis},
  title        = {{DISCONA:} distributed sample compression for nearest neighbor algorithm},
  journal      = {Appl. Intell.},
  volume       = {53},
  number       = {17},
  pages        = {19976--19989},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10489-023-04482-y},
  doi          = {10.1007/S10489-023-04482-Y},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/RybickiFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LiBP23,
  author       = {Xin Li and
                  Liav Bachar and
                  Rami Puzis},
  title        = {Centrality Learning: Auralization and Route Fitting},
  journal      = {Entropy},
  volume       = {25},
  number       = {8},
  pages        = {1115},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25081115},
  doi          = {10.3390/E25081115},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/LiBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KaiserDEZDWSEP23,
  author       = {Florian Klaus Kaiser and
                  Uriel Dardik and
                  Aviad Elitzur and
                  Polina Zilberman and
                  Nir Daniel and
                  Marcus Wiens and
                  Frank Schultmann and
                  Yuval Elovici and
                  Rami Puzis},
  title        = {Attack Hypotheses Generation Based on Threat Intelligence Knowledge
                  Graph},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {4793--4809},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3233703},
  doi          = {10.1109/TDSC.2022.3233703},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/KaiserDEZDWSEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DekelLZP23,
  author       = {Liad Dekel and
                  Ilia Leybovich and
                  Polina Zilberman and
                  Rami Puzis},
  title        = {{MABAT:} {A} Multi-Armed Bandit Approach for Threat-Hunting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {477--490},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3215010},
  doi          = {10.1109/TIFS.2022.3215010},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DekelLZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ElyasharPF23,
  author       = {Aviad Elyashar and
                  Rami Puzis and
                  Michael Fire},
  title        = {It Runs in the Family: Unsupervised Algorithm for Alternative Name
                  Suggestion Using Digitized Family Trees},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {2},
  pages        = {1651--1666},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2021.3096670},
  doi          = {10.1109/TKDE.2021.3096670},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/ElyasharPF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/AdlerBEP23,
  author       = {Ari Adler and
                  Lior Bass and
                  Yuval Elovici and
                  Rami Puzis},
  title        = {How Polynomial Regression Improves DeNATing},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {4},
  pages        = {5000--5011},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3266390},
  doi          = {10.1109/TNSM.2023.3266390},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/AdlerBEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/OfferZSEP23,
  author       = {Adi Offer and
                  Aviram Zilberman and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Rami Puzis},
  editor       = {Francesco Regazzoni and
                  Apostolos P. Fournaris},
  title        = {CDGeB: Cloud Data Geolocation Benchmark},
  booktitle    = {Proceedings of the 2023 on Cloud Computing Security Workshop, {CCSW}
                  2023, Copenhagen, Denmark, 26 November 2023},
  pages        = {69--74},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605763.3625273},
  doi          = {10.1145/3605763.3625273},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/OfferZSEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DanielKDEP23,
  author       = {Nir Daniel and
                  Florian Klaus Kaiser and
                  Anton Dzega and
                  Aviad Elyashar and
                  Rami Puzis},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Labeling {NIDS} Rules with {MITRE} {ATT} {\&}CK Techniques Using
                  ChatGPT},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_5},
  doi          = {10.1007/978-3-031-54129-2\_5},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DanielKDEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CohenBSP23,
  author       = {Ofir Cohen and
                  Ron Bitton and
                  Asaf Shabtai and
                  Rami Puzis},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {ConGISATA: {A} Framework for Continuous Gamified Information Security
                  Awareness Training and Assessment},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_22},
  doi          = {10.1007/978-3-031-51479-1\_22},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CohenBSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideas/FirePKE23,
  author       = {Michael Fire and
                  Rami Puzis and
                  Dima Kagan and
                  Yuval Elovici},
  editor       = {Richard Chbeir and
                  Mirjana Ivanovic and
                  Yannis Manolopoulos and
                  Peter Z. Revesz},
  title        = {Large-Scale Shill Bidder Detection in E-commerce},
  booktitle    = {Proceedings of the International Database Engineered Applications
                  Symposium Conference, {IDEAS} 2023, Heraklion, Crete, Greece, May
                  5-7, 2023},
  pages        = {79--86},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589462.3589479},
  doi          = {10.1145/3589462.3589479},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ideas/FirePKE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/FreundPS23,
  author       = {Alon Freund and
                  Rami Puzis and
                  Michael Segal},
  title        = {Link2speed: {VANET} speed assessment via link-state analysis},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2023,
                  Glasgow, UK, March 26-29, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WCNC55385.2023.10119086},
  doi          = {10.1109/WCNC55385.2023.10119086},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/FreundPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-06786,
  author       = {Natan Semyonov and
                  Rami Puzis and
                  Asaf Shabtai and
                  Gilad Katz},
  title        = {ReMark: Receptive Field based Spatial WaterMark Embedding Optimization
                  using Deep Network},
  journal      = {CoRR},
  volume       = {abs/2305.06786},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.06786},
  doi          = {10.48550/ARXIV.2305.06786},
  eprinttype    = {arXiv},
  eprint       = {2305.06786},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-06786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/GrolmanCFSP22,
  author       = {Edita Grolman and
                  Dvir Cohen and
                  Tatiana Frenklach and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {How and when to stop the co-training process},
  journal      = {Expert Syst. Appl.},
  volume       = {187},
  pages        = {115841},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2021.115841},
  doi          = {10.1016/J.ESWA.2021.115841},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/GrolmanCFSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/OlswangGPSST22,
  author       = {Amir Olswang and
                  Tom Gonda and
                  Rami Puzis and
                  Guy Shani and
                  Bracha Shapira and
                  Noam Tractinsky},
  title        = {Prioritizing vulnerability patches in large networks},
  journal      = {Expert Syst. Appl.},
  volume       = {193},
  pages        = {116467},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2021.116467},
  doi          = {10.1016/J.ESWA.2021.116467},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/OlswangGPSST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ReubenEP22,
  author       = {Maor Reuben and
                  Aviad Elyashar and
                  Rami Puzis},
  title        = {Iterative query selection for opaque search engines with pseudo relevance
                  feedback},
  journal      = {Expert Syst. Appl.},
  volume       = {201},
  pages        = {117027},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.117027},
  doi          = {10.1016/J.ESWA.2022.117027},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/ReubenEP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/SolomonMBSRPS22,
  author       = {Adir Solomon and
                  Michael Michaelshvili and
                  Ron Bitton and
                  Bracha Shapira and
                  Lior Rokach and
                  Rami Puzis and
                  Asaf Shabtai},
  title        = {Contextual security awareness: {A} context-based approach for assessing
                  the security awareness of users},
  journal      = {Knowl. Based Syst.},
  volume       = {246},
  pages        = {108709},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.knosys.2022.108709},
  doi          = {10.1016/J.KNOSYS.2022.108709},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/SolomonMBSRPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complexnetworks/Puzis22,
  author       = {Rami Puzis},
  editor       = {Hocine Cherifi and
                  Rosario Nunzio Mantegna and
                  Luis M. Rocha and
                  Chantal Cherifi and
                  Salvatore Miccich{\`{e}}},
  title        = {Can One Hear the Position of Nodes?},
  booktitle    = {Complex Networks and Their Applications {XI} - Proceedings of The
                  Eleventh International Conference on Complex Networks and Their Applications:
                  {COMPLEX} {NETWORKS} 2022, Palermo, Italy, 8-10 November, 2022, Volume
                  2},
  series       = {Studies in Computational Intelligence},
  volume       = {1078},
  pages        = {649--660},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21131-7\_50},
  doi          = {10.1007/978-3-031-21131-7\_50},
  timestamp    = {Tue, 16 Apr 2024 10:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/complexnetworks/Puzis22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/ElyasharBP22,
  author       = {Aviad Elyashar and
                  Jorge Bendahan and
                  Rami Puzis},
  editor       = {Shlomi Dolev and
                  Jonathan Katz and
                  Amnon Meisels},
  title        = {Detecting Clickbait in Online Social Media: You Won't Believe How
                  We Did It},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 6th International
                  Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13301},
  pages        = {377--387},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07689-3\_28},
  doi          = {10.1007/978-3-031-07689-3\_28},
  timestamp    = {Fri, 24 Jun 2022 18:23:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/ElyasharBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/DekelZPDE22,
  author       = {Liad Dekel and
                  Polina Zilberman and
                  Rami Puzis and
                  Uriel Dardik and
                  Aviad Elitzur},
  title        = {Attack {DB} {OTX-XFORCE-VT}},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = may,
  howpublished = {\url{https://doi.org/10.21227/f74t-gh08}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/f74t-gh08},
  doi          = {10.21227/F74T-GH08},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/DekelZPDE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/TayouriBSP22,
  author       = {David Tayouri and
                  Nick Baum and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {MulVAL Interaction Rules Mapped to {MITRE} ATT{\&}CK},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = jul,
  howpublished = {\url{https://doi.org/10.21227/bvkn-4119}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/bvkn-4119},
  doi          = {10.21227/BVKN-4119},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/TayouriBSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-02057,
  author       = {Michael Fire and
                  Rami Puzis and
                  Dima Kagan and
                  Yuval Elovici},
  title        = {Large-Scale Shill Bidder Detection in E-commerce},
  journal      = {CoRR},
  volume       = {abs/2204.02057},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.02057},
  doi          = {10.48550/ARXIV.2204.02057},
  eprinttype    = {arXiv},
  eprint       = {2204.02057},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-02057.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-05750,
  author       = {David Tayouri and
                  Nick Baum and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {A Survey of MulVAL Extensions and Their Attack Scenarios Coverage},
  journal      = {CoRR},
  volume       = {abs/2208.05750},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.05750},
  doi          = {10.48550/ARXIV.2208.05750},
  eprinttype    = {arXiv},
  eprint       = {2208.05750},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-05750.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-06325,
  author       = {Rami Puzis},
  title        = {Can one hear the position of nodes?},
  journal      = {CoRR},
  volume       = {abs/2211.06325},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.06325},
  doi          = {10.48550/ARXIV.2211.06325},
  eprinttype    = {arXiv},
  eprint       = {2211.06325},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-06325.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-14404,
  author       = {Moti Cohen and
                  Lior Rokach and
                  Rami Puzis},
  title        = {Cross Version Defect Prediction with Class Dependency Embeddings},
  journal      = {CoRR},
  volume       = {abs/2212.14404},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.14404},
  doi          = {10.48550/ARXIV.2212.14404},
  eprinttype    = {arXiv},
  eprint       = {2212.14404},
  timestamp    = {Sun, 08 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-14404.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrenklachCSP21,
  author       = {Tatiana Frenklach and
                  Dvir Cohen and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Android malware detection via an app similarity graph},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102386},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102386},
  doi          = {10.1016/J.COSE.2021.102386},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FrenklachCSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LandauPN20,
  author       = {Ofir Landau and
                  Rami Puzis and
                  Nir Nissim},
  title        = {Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security
                  in Cyber Space},
  journal      = {{ACM} Comput. Surv.},
  volume       = {53},
  number       = {1},
  pages        = {17:1--17:38},
  year         = {2021},
  url          = {https://doi.org/10.1145/3372043},
  doi          = {10.1145/3372043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/LandauPN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/FarshteindikerP21,
  author       = {Adi Farshteindiker and
                  Rami Puzis},
  title        = {Leadership Hijacking in Docker Swarm and Its Consequences},
  journal      = {Entropy},
  volume       = {23},
  number       = {7},
  pages        = {914},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23070914},
  doi          = {10.3390/E23070914},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/FarshteindikerP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/ElyasharPF21,
  author       = {Aviad Elyashar and
                  Rami Puzis and
                  Michael Fire},
  title        = {How does that name sound? Name representation learning using accent-specific
                  speech generation},
  journal      = {Knowl. Based Syst.},
  volume       = {227},
  pages        = {107229},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.knosys.2021.107229},
  doi          = {10.1016/J.KNOSYS.2021.107229},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/ElyasharPF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ploscb/GuersteinRDMDPP21,
  author       = {Sharon Guerstein and
                  Victoria Romeo{-}Aznar and
                  Ma'ayan Dekel and
                  Oren Miron and
                  Nadav Davidovitch and
                  Rami Puzis and
                  Shai Pilosof},
  title        = {The interplay between vaccination and social distancing strategies
                  affects {COVID19} population-level outcomes},
  journal      = {PLoS Comput. Biol.},
  volume       = {17},
  number       = {8},
  year         = {2021},
  url          = {https://doi.org/10.1371/journal.pcbi.1009319},
  doi          = {10.1371/JOURNAL.PCBI.1009319},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ploscb/GuersteinRDMDPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/RapaportPZHP21,
  author       = {Elad Rapaport and
                  Ingmar Poese and
                  Polina Zilberman and
                  Oliver Holschke and
                  Rami Puzis},
  title        = {Spillover Today? Predicting Traffic Overflows on Private Peering of
                  Major Content Providers},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {4},
  pages        = {4169--4182},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2021.3126643},
  doi          = {10.1109/TNSM.2021.3126643},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/RapaportPZHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complexnetworks/BacharEP21,
  author       = {Liav Bachar and
                  Aviad Elyashar and
                  Rami Puzis},
  editor       = {Rosa Mar{\'{\i}}a Benito and
                  Chantal Cherifi and
                  Hocine Cherifi and
                  Esteban Moro and
                  Luis M. Rocha and
                  Marta Sales{-}Pardo},
  title        = {Learning Centrality by Learning to Route},
  booktitle    = {Complex Networks {\&} Their Applications {X} - Volume 1, Proceedings
                  of the Tenth International Conference on Complex Networks and Their
                  Applications {COMPLEX} {NETWORKS} 2021, Madrid, Spain, November 30
                  - December 2, 2021},
  series       = {Studies in Computational Intelligence},
  volume       = {1015},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93409-5\_21},
  doi          = {10.1007/978-3-030-93409-5\_21},
  timestamp    = {Mon, 26 Jun 2023 20:46:27 +0200},
  biburl       = {https://dblp.org/rec/conf/complexnetworks/BacharEP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/WagnerP21,
  author       = {Assaf Wagner and
                  Rami Puzis},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Lawful Interception in WebRTC Peer-To-Peer Communication},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {153--170},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_12},
  doi          = {10.1007/978-3-030-78086-9\_12},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/WagnerP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SidikPZE20,
  author       = {Bronislav Sidik and
                  Rami Puzis and
                  Polina Zilberman and
                  Yuval Elovici},
  title        = {{PALE:} Time Bounded Practical Agile Leader Election},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {31},
  number       = {2},
  pages        = {470--485},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPDS.2019.2933620},
  doi          = {10.1109/TPDS.2019.2933620},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/SidikPZE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BittonBPS20,
  author       = {Ron Bitton and
                  Kobi Boymgold and
                  Rami Puzis and
                  Asaf Shabtai},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {Evaluating the Information Security Awareness of Smartphone Users},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376385},
  doi          = {10.1145/3313831.3376385},
  timestamp    = {Wed, 04 May 2022 13:02:17 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/BittonBPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/SiboniGPSE20,
  author       = {Shachar Siboni and
                  Chanan Glezer and
                  Rami Puzis and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Shlomi Dolev and
                  Vladimir Kolesnikov and
                  Sachin Lodha and
                  Gera Weiss},
  title        = {Security Ranking of IoT Devices Using an {AHP} Model},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Fourth International
                  Symposium, {CSCML} 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12161},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49785-9\_3},
  doi          = {10.1007/978-3-030-49785-9\_3},
  timestamp    = {Thu, 25 Jun 2020 16:11:03 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/SiboniGPSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CohenMKMEPS20,
  author       = {Dvir Cohen and
                  Yisroel Mirsky and
                  Manuel Kamp and
                  Tobias Martin and
                  Yuval Elovici and
                  Rami Puzis and
                  Asaf Shabtai},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {{DANTE:} {A} Framework for Mining and Monitoring Darknet Traffic},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {88--109},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_5},
  doi          = {10.1007/978-3-030-58951-6\_5},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CohenMKMEPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ElyasharUPP20,
  author       = {Aviad Elyashar and
                  Sagi Uziel and
                  Abigail Paradise and
                  Rami Puzis},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {The Chameleon Attack: Manipulating Content Display in Online Social
                  Media},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {848--859},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380165},
  doi          = {10.1145/3366423.3380165},
  timestamp    = {Fri, 25 Dec 2020 01:14:58 +0100},
  biburl       = {https://dblp.org/rec/conf/www/ElyasharUPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-05668,
  author       = {Aviad Elyashar and
                  Sagi Uziel and
                  Abigail Paradise and
                  Rami Puzis},
  title        = {The Chameleon Attack: Manipulating Content Display in Online Social
                  Media},
  journal      = {CoRR},
  volume       = {abs/2001.05668},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.05668},
  eprinttype    = {arXiv},
  eprint       = {2001.05668},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-05668.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-09832,
  author       = {Sigal Shaked and
                  Amos Zamir and
                  Roman Vainshtein and
                  Moshe Unger and
                  Lior Rokach and
                  Rami Puzis and
                  Bracha Shapira},
  title        = {Sequence Preserving Network Traffic Generation},
  journal      = {CoRR},
  volume       = {abs/2002.09832},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.09832},
  eprinttype    = {arXiv},
  eprint       = {2002.09832},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-09832.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-01518,
  author       = {Sunders Bruskin and
                  Polina Zilberman and
                  Rami Puzis and
                  Shay Shwarz},
  title        = {SoK: {A} Survey of Open Source Threat Emulators},
  journal      = {CoRR},
  volume       = {abs/2003.01518},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.01518},
  eprinttype    = {arXiv},
  eprint       = {2003.01518},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-01518.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-02575,
  author       = {Dvir Cohen and
                  Yisroel Mirsky and
                  Yuval Elovici and
                  Rami Puzis and
                  Manuel Kamp and
                  Tobias Martin and
                  Asaf Shabtai},
  title        = {{DANTE:} {A} framework for mining and monitoring darknet traffic},
  journal      = {CoRR},
  volume       = {abs/2003.02575},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.02575},
  eprinttype    = {arXiv},
  eprint       = {2003.02575},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-02575.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-03663,
  author       = {Rami Puzis and
                  Polina Zilberman and
                  Yuval Elovici},
  title        = {{ATHAFI:} Agile Threat Hunting And Forensic Investigation},
  journal      = {CoRR},
  volume       = {abs/2003.03663},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.03663},
  eprinttype    = {arXiv},
  eprint       = {2003.03663},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-03663.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-11838,
  author       = {Aviad Elyashar and
                  Rami Puzis and
                  Michael Fire},
  title        = {How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using
                  Speech Generation and Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2005.11838},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.11838},
  eprinttype    = {arXiv},
  eprint       = {2005.11838},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-11838.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-01380,
  author       = {Elad Rapaport and
                  Ingmar Poese and
                  Polina Zilberman and
                  Oliver Holschke and
                  Rami Puzis},
  title        = {Predicting traffic overflows on private peering},
  journal      = {CoRR},
  volume       = {abs/2010.01380},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.01380},
  eprinttype    = {arXiv},
  eprint       = {2010.01380},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-01380.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-14224,
  author       = {Dor Farbiash and
                  Rami Puzis},
  title        = {Cyberbiosecurity: {DNA} Injection Attack in Synthetic Biology},
  journal      = {CoRR},
  volume       = {abs/2011.14224},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.14224},
  eprinttype    = {arXiv},
  eprint       = {2011.14224},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-14224.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-12498,
  author       = {Aviad Elyashar and
                  Maor Reuben and
                  Rami Puzis},
  title        = {Fake News Data Collection and Classification: Iterative Query Selection
                  for Opaque Search Engines with Pseudo Relevance Feedback},
  journal      = {CoRR},
  volume       = {abs/2012.12498},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.12498},
  eprinttype    = {arXiv},
  eprint       = {2012.12498},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-12498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcb/ToubianaPSB19,
  author       = {David Toubiana and
                  Rami Puzis and
                  Avi Sadka and
                  Eduardo Blumwald},
  title        = {A Genetic Algorithm to Optimize Weighted Gene Co-Expression Network
                  Analysis},
  journal      = {J. Comput. Biol.},
  volume       = {26},
  number       = {12},
  pages        = {1349--1366},
  year         = {2019},
  url          = {https://doi.org/10.1089/cmb.2019.0221},
  doi          = {10.1089/CMB.2019.0221},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcb/ToubianaPSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GuriPCRKE19,
  author       = {Mordechai Guri and
                  Rami Puzis and
                  Kim{-}Kwang Raymond Choo and
                  Sergey Rubinshtein and
                  Gabi Kedma and
                  Yuval Elovici},
  title        = {Using malware for the greater good: Mitigating data leakage},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {145},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2019.07.006},
  doi          = {10.1016/J.JNCA.2019.07.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GuriPCRKE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/PuzisSHSF19,
  author       = {Rami Puzis and
                  Liron Samama{-}Kachko and
                  Barak Hagbi and
                  Roni Stern and
                  Ariel Felner},
  title        = {Target oriented network intelligence collection: effective exploration
                  of social networks},
  journal      = {World Wide Web},
  volume       = {22},
  number       = {4},
  pages        = {1447--1480},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11280-018-0648-0},
  doi          = {10.1007/S11280-018-0648-0},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/PuzisSHSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/PuzisBZL19,
  author       = {Rami Puzis and
                  Guy Barshap and
                  Polina Zilberman and
                  Oded Leiba},
  editor       = {Shlomi Dolev and
                  Danny Hendler and
                  Sachin Lodha and
                  Moti Yung},
  title        = {Controllable Privacy Preserving Blockchain - FiatChain: Distributed
                  Privacy Preserving Cryptocurrency with Law Enforcement Capabilities},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Third International
                  Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11527},
  pages        = {178--197},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20951-3\_16},
  doi          = {10.1007/978-3-030-20951-3\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/PuzisBZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/MirskySMGPF19,
  author       = {Reuth Mirsky and
                  Ya'ar Shalom and
                  Ahmad Majadly and
                  Kobi Gal and
                  Rami Puzis and
                  Ariel Felner},
  editor       = {Shlomi Dolev and
                  Danny Hendler and
                  Sachin Lodha and
                  Moti Yung},
  title        = {New Goal Recognition Algorithms Using Attack Graphs},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Third International
                  Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11527},
  pages        = {260--278},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20951-3\_23},
  doi          = {10.1007/978-3-030-20951-3\_23},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/MirskySMGPF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ElitzurPZ19,
  author       = {Aviad Elitzur and
                  Rami Puzis and
                  Polina Zilberman},
  title        = {Attack Hypothesis Generation},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2019, Oulu, Finland, November 26-27, 2019},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EISIC49498.2019.9108886},
  doi          = {10.1109/EISIC49498.2019.9108886},
  timestamp    = {Tue, 16 Jun 2020 11:41:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/ElitzurPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/RapaportSP19,
  author       = {Elad Rapaport and
                  Oren Shriki and
                  Rami Puzis},
  editor       = {An Zeng and
                  Dan Pan and
                  Tianyong Hao and
                  Daoqiang Zhang and
                  Yiyu Shi and
                  Xiaowei Song},
  title        = {{EEGNAS:} Neural Architecture Search for Electroencephalography Data
                  Analysis and Decoding},
  booktitle    = {Human Brain and Artificial Intelligence - First International Workshop,
                  {HBAI} 2019, Held in Conjunction with {IJCAI} 2019, Macao, China,
                  August 12, 2019, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1072},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-1398-5\_1},
  doi          = {10.1007/978-981-15-1398-5\_1},
  timestamp    = {Thu, 23 Feb 2023 08:27:30 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/RapaportSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PerrySP19,
  author       = {Lior Perry and
                  Bracha Shapira and
                  Rami Puzis},
  title        = {{NO-DOUBT:} Attack Attribution Based On Threat Intelligence Reports},
  booktitle    = {2019 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2019, Shenzhen, China, July 1-3, 2019},
  pages        = {80--85},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISI.2019.8823152},
  doi          = {10.1109/ISI.2019.8823152},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/PerrySP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AgmonSP19,
  author       = {Noga Agmon and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Deployment optimization of IoT devices through attack graph analysis},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {192--202},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323411},
  doi          = {10.1145/3317549.3323411},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AgmonSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-02601,
  author       = {Rami Puzis and
                  Hadar Polad and
                  Bracha Shapira},
  title        = {Attack Graph Obfuscation},
  journal      = {CoRR},
  volume       = {abs/1903.02601},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.02601},
  eprinttype    = {arXiv},
  eprint       = {1903.02601},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-02601.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-05853,
  author       = {Noga Agmon and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Deployment Optimization of IoT Devices through Attack Graph Analysis},
  journal      = {CoRR},
  volume       = {abs/1904.05853},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.05853},
  eprinttype    = {arXiv},
  eprint       = {1904.05853},
  timestamp    = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-05853.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10229,
  author       = {Ron Bitton and
                  Kobi Boymgold and
                  Rami Puzis and
                  Asaf Shabtai},
  title        = {Evaluating the Information Security Awareness of Smartphone Users},
  journal      = {CoRR},
  volume       = {abs/1906.10229},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10229},
  eprinttype    = {arXiv},
  eprint       = {1906.10229},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10229.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10922,
  author       = {Yael Mathov and
                  Noga Agmon and
                  Asaf Shabtai and
                  Rami Puzis and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  title        = {Challenges for Security Assessment of Enterprises in the IoT Era},
  journal      = {CoRR},
  volume       = {abs/1906.10922},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10922},
  eprinttype    = {arXiv},
  eprint       = {1906.10922},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10922.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-04003,
  author       = {Aviad Elyashar and
                  Rami Puzis and
                  Michael Fire},
  title        = {It Runs in the Family: Searching for Similar Names using Digitized
                  Family Trees},
  journal      = {CoRR},
  volume       = {abs/1912.04003},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.04003},
  eprinttype    = {arXiv},
  eprint       = {1912.04003},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-04003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BittonFSPRS18,
  author       = {Ron Bitton and
                  Andrey Finkelshtein and
                  Lior Sidi and
                  Rami Puzis and
                  Lior Rokach and
                  Asaf Shabtai},
  title        = {Taxonomy of mobile users' security awareness},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {266--293},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.015},
  doi          = {10.1016/J.COSE.2017.10.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BittonFSPRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entcom/SteinYPST18,
  author       = {Adi Stein and
                  Yair Yotam and
                  Rami Puzis and
                  Guy Shani and
                  Meirav Taieb{-}Maimon},
  title        = {EEG-triggered dynamic difficulty adjustment for multiplayer games},
  journal      = {Entertain. Comput.},
  volume       = {25},
  pages        = {14--25},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.entcom.2017.11.003},
  doi          = {10.1016/J.ENTCOM.2017.11.003},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcom/SteinYPST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/GrolmanFPSCKR18,
  author       = {Edita Grolman and
                  Andrey Finkelshtein and
                  Rami Puzis and
                  Asaf Shabtai and
                  Gershon Celniker and
                  Ziv Katzir and
                  Liron Rosenfeld},
  title        = {Transfer Learning for User Action Identication in Mobile Apps via
                  Encrypted Trafc Analysis},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {40--53},
  year         = {2018},
  url          = {https://doi.org/10.1109/MIS.2018.111145120},
  doi          = {10.1109/MIS.2018.111145120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/GrolmanFPSCKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/ParadiseCSP18,
  author       = {Abigail Paradise and
                  Dvir Cohen and
                  Asaf Shabtai and
                  Rami Puzis},
  editor       = {Ulrik Brandes and
                  Chandan Reddy and
                  Andrea Tagarelli},
  title        = {ProfileGen: Generation of Automatic and Realistic Artificial Profiles},
  booktitle    = {{IEEE/ACM} 2018 International Conference on Advances in Social Networks
                  Analysis and Mining, {ASONAM} 2018, Barcelona, Spain, August 28-31,
                  2018},
  pages        = {581--583},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ASONAM.2018.8508242},
  doi          = {10.1109/ASONAM.2018.8508242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/ParadiseCSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcai/GondaPPSS18,
  author       = {Tom Gonda and
                  Tal Pascal and
                  Rami Puzis and
                  Guy Shani and
                  Bracha Shapira},
  editor       = {Daniel D. Lee and
                  Alexander Steen and
                  Toby Walsh},
  title        = {Analysis of Attack Graph Representations for Ranking Vulnerability
                  Fixes},
  booktitle    = {GCAI-2018, 4th Global Conference on Artificial Intelligence, Luxembourg,
                  September 18-21, 2018},
  series       = {EPiC Series in Computing},
  volume       = {55},
  pages        = {215--228},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {https://doi.org/10.29007/2c1q},
  doi          = {10.29007/2C1Q},
  timestamp    = {Sun, 15 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gcai/GondaPPSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AgarwalPHZE18,
  author       = {Mayank Agarwal and
                  Rami Puzis and
                  Jawad Haj{-}Yahya and
                  Polina Zilberman and
                  Yuval Elovici},
  editor       = {Lech Jan Janczewski and
                  Miroslaw Kutylowski},
  title        = {Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides
                  Its Network Traffic},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11
                  International Conference, {SEC} 2018, Held at the 24th {IFIP} World
                  Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {529},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99828-2\_16},
  doi          = {10.1007/978-3-319-99828-2\_16},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AgarwalPHZE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socs/LeybovichPSR18,
  author       = {Ilia Leybovich and
                  Rami Puzis and
                  Roni Stern and
                  Maor Reuben},
  editor       = {Vadim Bulitko and
                  Sabine Storandt},
  title        = {Focused {SANA:} Speeding Up Network Alignment},
  booktitle    = {Proceedings of the Eleventh International Symposium on Combinatorial
                  Search, {SOCS} 2018, Stockholm, Sweden - 14-15 July 2018},
  pages        = {168--172},
  publisher    = {{AAAI} Press},
  year         = {2018},
  url          = {https://doi.org/10.1609/socs.v9i1.18466},
  doi          = {10.1609/SOCS.V9I1.18466},
  timestamp    = {Mon, 18 Dec 2023 04:11:03 +0100},
  biburl       = {https://dblp.org/rec/conf/socs/LeybovichPSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/snam/ParadisePS18,
  author       = {Abigail Paradise and
                  Rami Puzis and
                  Asaf Shabtai},
  editor       = {Reda Alhajj and
                  Jon G. Rokne},
  title        = {Socialbots},
  booktitle    = {Encyclopedia of Social Network Analysis and Mining, 2nd Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4939-7131-2\_110212},
  doi          = {10.1007/978-1-4939-7131-2\_110212},
  timestamp    = {Wed, 04 May 2022 13:01:02 +0200},
  biburl       = {https://dblp.org/rec/reference/snam/ParadisePS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/snam/YaakobovichPE18,
  author       = {Elina Yaakobovich and
                  Rami Puzis and
                  Yuval Elovici},
  editor       = {Reda Alhajj and
                  Jon G. Rokne},
  title        = {Incentives in Collaborative Applications},
  booktitle    = {Encyclopedia of Social Network Analysis and Mining, 2nd Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4939-7131-2\_375},
  doi          = {10.1007/978-1-4939-7131-2\_375},
  timestamp    = {Sun, 17 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/snam/YaakobovichPE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-03734,
  author       = {Bronislav Sidik and
                  Rami Puzis and
                  Polina Zilberman and
                  Yuval Elovici},
  title        = {{PALE:} Partially Asynchronous Agile Leader Election},
  journal      = {CoRR},
  volume       = {abs/1801.03734},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.03734},
  eprinttype    = {arXiv},
  eprint       = {1801.03734},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-03734.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-00125,
  author       = {Abigail Paradise and
                  Dvir Cohen and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Generation of Automatic and Realistic Artificial Profiles},
  journal      = {CoRR},
  volume       = {abs/1807.00125},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.00125},
  eprinttype    = {arXiv},
  eprint       = {1807.00125},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-00125.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compnet/MaliahPS17,
  author       = {Shlomi Maliah and
                  Rami Puzis and
                  Guy Shani},
  title        = {Shortest path tree sampling for landmark selection in large networks},
  journal      = {J. Complex Networks},
  volume       = {5},
  number       = {5},
  pages        = {795--815},
  year         = {2017},
  url          = {https://doi.org/10.1093/comnet/cnx008},
  doi          = {10.1093/COMNET/CNX008},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compnet/MaliahPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ParadiseSPEERP17,
  author       = {Abigail Paradise and
                  Asaf Shabtai and
                  Rami Puzis and
                  Aviad Elyashar and
                  Yuval Elovici and
                  Mehran Roshandel and
                  Christoph Peylo},
  title        = {Creation and Management of Social Network Honeypots for Detecting
                  Targeted Cyber Attacks},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {4},
  number       = {3},
  pages        = {65--79},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCSS.2017.2719705},
  doi          = {10.1109/TCSS.2017.2719705},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/ParadiseSPEERP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZilbermanPE17,
  author       = {Polina Zilberman and
                  Rami Puzis and
                  Yuval Elovici},
  title        = {On Network Footprint of Traffic Inspection and Filtering at Global
                  Scrubbing Centers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {521--534},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2494039},
  doi          = {10.1109/TDSC.2015.2494039},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZilbermanPE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/ElyasharBPS17,
  author       = {Aviad Elyashar and
                  Jorge Bendahan and
                  Rami Puzis and
                  Maria{-}Amparo Sanmateu},
  editor       = {Jana Diesner and
                  Elena Ferrari and
                  Guandong Xu},
  title        = {Measurement of Online Discussion Authenticity within Online Social
                  Media},
  booktitle    = {Proceedings of the 2017 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining 2017, Sydney, Australia, July
                  31 - August 03, 2017},
  pages        = {627--629},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3110025.3110115},
  doi          = {10.1145/3110025.3110115},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/ElyasharBPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/GondaPS17,
  author       = {Tom Gonda and
                  Rami Puzis and
                  Bracha Shapira},
  editor       = {Shlomi Dolev and
                  Sachin Lodha},
  title        = {Scalable Attack Path Finding for Increased Security},
  booktitle    = {Cyber Security Cryptography and Machine Learning - First International
                  Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10332},
  pages        = {234--249},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60080-2\_18},
  doi          = {10.1007/978-3-319-60080-2\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/GondaPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/PoladPS17,
  author       = {Hadar Polad and
                  Rami Puzis and
                  Bracha Shapira},
  editor       = {Shlomi Dolev and
                  Sachin Lodha},
  title        = {Attack Graph Obfuscation},
  booktitle    = {Cyber Security Cryptography and Machine Learning - First International
                  Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10332},
  pages        = {269--287},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60080-2\_20},
  doi          = {10.1007/978-3-319-60080-2\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/PoladPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GluckPOS17,
  author       = {Tomer Gluck and
                  Rami Puzis and
                  Yossi Oren and
                  Asaf Shabtai},
  title        = {The Curious Case of the Curious Case: Detecting Touchscreen Events
                  Using a Smartphone Protective Case},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017},
  pages        = {99--103},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSPW.2017.58},
  doi          = {10.1109/EUROSPW.2017.58},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GluckPOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HadadPSOR17,
  author       = {Tal Hadad and
                  Rami Puzis and
                  Bronislav Sidik and
                  Nir Ofek and
                  Lior Rokach},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Application Marketplace Malware Detection by User Feedback Analysis},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_1},
  doi          = {10.1007/978-3-319-93354-2\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HadadPSOR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HadadSOPR17,
  author       = {Tal Hadad and
                  Bronislav Sidik and
                  Nir Ofek and
                  Rami Puzis and
                  Lior Rokach},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {User Feedback Analysis for Mobile Malware Detection},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {83--94},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006131200830094},
  doi          = {10.5220/0006131200830094},
  timestamp    = {Thu, 18 May 2017 14:22:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HadadSOPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/NacshonPZ17,
  author       = {Luiza Nacshon and
                  Rami Puzis and
                  Polina Zilberman},
  title        = {DiscOF: Balanced flow discovery in OpenFlow},
  booktitle    = {2017 {IEEE} Conference on Network Function Virtualization and Software
                  Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NFV-SDN.2017.8169823},
  doi          = {10.1109/NFV-SDN.2017.8169823},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/nfvsdn/NacshonPZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FinkelsteinBPS17,
  author       = {Andrey Finkelstein and
                  Ron Biton and
                  Rami Puzis and
                  Asaf Shabtai},
  title        = {Classification of Smartphone Users Using Internet Traffic},
  journal      = {CoRR},
  volume       = {abs/1701.00220},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.00220},
  eprinttype    = {arXiv},
  eprint       = {1701.00220},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FinkelsteinBPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/OssmyTPRIE17,
  author       = {Ori Ossmy and
                  Ofir Tam and
                  Rami Puzis and
                  Lior Rokach and
                  Ohad Inbar and
                  Yuval Elovici},
  title        = {MindDesktop: a general purpose brain computer interface},
  journal      = {CoRR},
  volume       = {abs/1705.07490},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.07490},
  eprinttype    = {arXiv},
  eprint       = {1705.07490},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/OssmyTPRIE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-02763,
  author       = {Aviad Elyashar and
                  Jorge Bendahan and
                  Rami Puzis},
  title        = {Is the Online Discussion Manipulated? Quantifying the Online Discussion
                  Authenticity within Online Social Media},
  journal      = {CoRR},
  volume       = {abs/1708.02763},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.02763},
  eprinttype    = {arXiv},
  eprint       = {1708.02763},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-02763.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-06699,
  author       = {Aviad Elyashar and
                  Jorge Bendahan and
                  Rami Puzis},
  title        = {Detecting Clickbait in Online Social Media: You Won't Believe How
                  We Did It},
  journal      = {CoRR},
  volume       = {abs/1710.06699},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.06699},
  eprinttype    = {arXiv},
  eprint       = {1710.06699},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-06699.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/PuzisSE16,
  author       = {Rami Puzis and
                  Dov Shirtz and
                  Yuval Elovici},
  title        = {A particle swarm model for estimating reliability and scheduling system
                  maintenance},
  journal      = {Enterp. Inf. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {349--377},
  year         = {2016},
  url          = {https://doi.org/10.1080/17517575.2014.928954},
  doi          = {10.1080/17517575.2014.928954},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eis/PuzisSE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/DolevGPK16,
  author       = {Shlomi Dolev and
                  Jonathan Goldfeld and
                  Rami Puzis and
                  Muni Venkateswarlu K.},
  title        = {Efficient online detection of temporal patterns},
  journal      = {PeerJ Comput. Sci.},
  volume       = {2},
  pages        = {e53},
  year         = {2016},
  url          = {https://doi.org/10.7717/peerj-cs.53},
  doi          = {10.7717/PEERJ-CS.53},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/DolevGPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complenet/GuptaPK16,
  author       = {Sukrit Gupta and
                  Rami Puzis and
                  Konstantin Kilimnik},
  editor       = {Hocine Cherifi and
                  Bruno Gon{\c{c}}alves and
                  Ronaldo Menezes and
                  Roberta Sinatra},
  title        = {Comparative Network Analysis Using KronFit},
  booktitle    = {Complex Networks {VII} - Proceedings of the 7th Workshop on Complex
                  Networks, CompleNet 2016, Dijon, France, March 23-25, 2016},
  series       = {Studies in Computational Intelligence},
  volume       = {644},
  pages        = {363--375},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30569-1\_28},
  doi          = {10.1007/978-3-319-30569-1\_28},
  timestamp    = {Mon, 15 Jun 2020 17:04:35 +0200},
  biburl       = {https://dblp.org/rec/conf/complenet/GuptaPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbp-brims/FinkelshteinPSS16,
  author       = {Andrey Finkelshtein and
                  Rami Puzis and
                  Asaf Shabtai and
                  Bronislav Sidik},
  editor       = {Kevin S. Xu and
                  David Reitter and
                  Dongwon Lee and
                  Nathaniel Osgood},
  title        = {Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic},
  booktitle    = {Social, Cultural, and Behavioral Modeling, 9th International Conference,
                  SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9708},
  pages        = {239--249},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39931-7\_23},
  doi          = {10.1007/978-3-319-39931-7\_23},
  timestamp    = {Tue, 29 Dec 2020 18:35:21 +0100},
  biburl       = {https://dblp.org/rec/conf/sbp-brims/FinkelshteinPSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swste/RubinshteinP16,
  author       = {Sergey Rubinshtein and
                  Rami Puzis},
  title        = {Modeling and Reconstruction of Multi-stage Attacks},
  booktitle    = {2016 {IEEE} International Conference on Software Science, Technology
                  and Engineering, {SWSTE} 2016, Beer Sheva, Israel, June 23-24, 2016},
  pages        = {135--137},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SWSTE.2016.27},
  doi          = {10.1109/SWSTE.2016.27},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/swste/RubinshteinP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FeherSSP16,
  author       = {Ben Feher and
                  Lior Sidi and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {The Security of WebRTC},
  journal      = {CoRR},
  volume       = {abs/1601.00184},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.00184},
  eprinttype    = {arXiv},
  eprint       = {1601.00184},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FeherSSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NacshonPZ16,
  author       = {Luiza Nacshon and
                  Rami Puzis and
                  Polina Zilberman},
  title        = {Floware: Balanced Flow Monitoring in Software Defined Networks},
  journal      = {CoRR},
  volume       = {abs/1608.03307},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.03307},
  eprinttype    = {arXiv},
  eprint       = {1608.03307},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NacshonPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NacshonPS16,
  author       = {Luiza Nacshon and
                  Rami Puzis and
                  Amparo Sanmateho},
  title        = {Pinpoint Influential Posts and Authors},
  journal      = {CoRR},
  volume       = {abs/1609.02945},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.02945},
  eprinttype    = {arXiv},
  eprint       = {1609.02945},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NacshonPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compnet/PuzisEZDB15,
  author       = {Rami Puzis and
                  Yuval Elovici and
                  Polina Zilberman and
                  Shlomi Dolev and
                  Ulrik Brandes},
  title        = {Topology manipulations for speeding betweenness centrality computation},
  journal      = {J. Complex Networks},
  volume       = {3},
  number       = {1},
  pages        = {84--112},
  year         = {2015},
  url          = {https://doi.org/10.1093/comnet/cnu015},
  doi          = {10.1093/COMNET/CNU015},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compnet/PuzisEZDB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/BokobzaPRPSS15,
  author       = {Yasmin Bokobza and
                  Abigail Paradise and
                  Guy Rapaport and
                  Rami Puzis and
                  Bracha Shapira and
                  Asaf Shabtai},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Leak Sinks: The Threat of Targeted Social Eavesdropping},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {375--382},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2808891},
  doi          = {10.1145/2808797.2808891},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/BokobzaPRPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/ParadiseSP15,
  author       = {Abigail Paradise and
                  Asaf Shabtai and
                  Rami Puzis},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Hunting Organization-Targeted Socialbots},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {537--540},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2809396},
  doi          = {10.1145/2808797.2809396},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/ParadiseSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/SternKPFR15,
  author       = {Roni Stern and
                  Scott Kiesel and
                  Rami Puzis and
                  Ariel Felner and
                  Wheeler Ruml},
  editor       = {Qiang Yang and
                  Michael J. Wooldridge},
  title        = {Max Is More than Min: Solving Maximization Problems with Heuristic
                  Search},
  booktitle    = {Proceedings of the Twenty-Fourth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July
                  25-31, 2015},
  pages        = {4324--4330},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {http://ijcai.org/Abstract/15/615},
  timestamp    = {Tue, 20 Aug 2019 16:16:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/SternKPFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socs/PalomboSPFKR15,
  author       = {Alon Palombo and
                  Roni Stern and
                  Rami Puzis and
                  Ariel Felner and
                  Scott Kiesel and
                  Wheeler Ruml},
  editor       = {Levi Lelis and
                  Roni Stern},
  title        = {Solving the Snake in the Box Problem with Heuristic Search: First
                  Results},
  booktitle    = {Proceedings of the Eighth Annual Symposium on Combinatorial Search,
                  {SOCS} 2015, 11-13 June 2015, Ein Gedi, the Dead Sea, Israel},
  pages        = {96--104},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {https://doi.org/10.1609/socs.v6i1.18357},
  doi          = {10.1609/SOCS.V6I1.18357},
  timestamp    = {Mon, 18 Dec 2023 04:11:03 +0100},
  biburl       = {https://dblp.org/rec/conf/socs/PalomboSPFKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socs/BnayaPPF15,
  author       = {Zahy Bnaya and
                  Alon Palombo and
                  Rami Puzis and
                  Ariel Felner},
  editor       = {Levi Lelis and
                  Roni Stern},
  title        = {Confidence Backup Updates for Aggregating {MDP} State Values in Monte-Carlo
                  Tree Search},
  booktitle    = {Proceedings of the Eighth Annual Symposium on Combinatorial Search,
                  {SOCS} 2015, 11-13 June 2015, Ein Gedi, the Dead Sea, Israel},
  pages        = {156--160},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {https://doi.org/10.1609/socs.v6i1.18378},
  doi          = {10.1609/SOCS.V6I1.18378},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socs/BnayaPPF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PuzisE15,
  author       = {Rami Puzis and
                  Yuval Elovici},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Active Discovery of Hidden Profiles in Social Networks Using Malware},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {221--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_11},
  doi          = {10.1007/978-3-319-14039-1\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PuzisE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/SternFBPSG14,
  author       = {Roni Stern and
                  Ariel Felner and
                  Jur van den Berg and
                  Rami Puzis and
                  Rajat Shah and
                  Ken Goldberg},
  title        = {Potential-based bounded-cost search and Anytime Non-Parametric A\({}^{\mbox{*}}\)},
  journal      = {Artif. Intell.},
  volume       = {214},
  pages        = {1--25},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.artint.2014.05.002},
  doi          = {10.1016/J.ARTINT.2014.05.002},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/SternFBPSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ParadisePS14,
  author       = {Abigail Paradise and
                  Rami Puzis and
                  Asaf Shabtai},
  title        = {Anti-Reconnaissance Tools: Detecting Targeted Socialbots},
  journal      = {{IEEE} Internet Comput.},
  volume       = {18},
  number       = {5},
  pages        = {11--19},
  year         = {2014},
  url          = {https://doi.org/10.1109/MIC.2014.81},
  doi          = {10.1109/MIC.2014.81},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ParadisePS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socs/Samama-KachkoPSF14,
  author       = {Liron Samama{-}Kachko and
                  Rami Puzis and
                  Roni Stern and
                  Ariel Felner},
  editor       = {Stefan Edelkamp and
                  Roman Bart{\'{a}}k},
  title        = {Extended Framework for Target Oriented Network Intelligence Collection},
  booktitle    = {Proceedings of the Seventh Annual Symposium on Combinatorial Search,
                  {SOCS} 2014, Prague, Czech Republic, 15-17 August 2014},
  pages        = {131--138},
  publisher    = {{AAAI} Press},
  year         = {2014},
  url          = {https://doi.org/10.1609/socs.v5i1.18317},
  doi          = {10.1609/SOCS.V5I1.18317},
  timestamp    = {Mon, 18 Dec 2023 04:11:03 +0100},
  biburl       = {https://dblp.org/rec/conf/socs/Samama-KachkoPSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socs/SternKPFR14,
  author       = {Roni Tzvi Stern and
                  Scott Kiesel and
                  Rami Puzis and
                  Ariel Felner and
                  Wheeler Ruml},
  editor       = {Stefan Edelkamp and
                  Roman Bart{\'{a}}k},
  title        = {Max is More than Min: Solving Maximization Problems with Heuristic
                  Search},
  booktitle    = {Proceedings of the Seventh Annual Symposium on Combinatorial Search,
                  {SOCS} 2014, Prague, Czech Republic, 15-17 August 2014},
  pages        = {148--156},
  publisher    = {{AAAI} Press},
  year         = {2014},
  url          = {https://doi.org/10.1609/socs.v5i1.18322},
  doi          = {10.1609/SOCS.V5I1.18322},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socs/SternKPFR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jits/PuzisAEBSP13,
  author       = {Rami Puzis and
                  Yaniv Altshuler and
                  Yuval Elovici and
                  Shlomo Bekhor and
                  Yoram Shiftan and
                  Alex Pentland},
  title        = {Augmented Betweenness Centrality for Environmentally Aware Traffic
                  Monitoring in Transportation Networks},
  journal      = {J. Intell. Transp. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {91--105},
  year         = {2013},
  url          = {https://doi.org/10.1080/15472450.2012.716663},
  doi          = {10.1080/15472450.2012.716663},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jits/PuzisAEBSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/socnet/PuzisPS13,
  author       = {Rami Puzis and
                  Manish Purohit and
                  V. S. Subrahmanian},
  title        = {Betweenness computation in the single graph representation of hypergraphs},
  journal      = {Soc. Networks},
  volume       = {35},
  number       = {4},
  pages        = {561--572},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.socnet.2013.07.006},
  doi          = {10.1016/J.SOCNET.2013.07.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/socnet/PuzisPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/FireTPLRE13,
  author       = {Michael Fire and
                  Lena Tenenboim{-}Chekina and
                  Rami Puzis and
                  Ofrit Lesser and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {Computationally efficient link prediction in a variety of social networks},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {5},
  number       = {1},
  pages        = {10:1--10:25},
  year         = {2013},
  url          = {https://doi.org/10.1145/2542182.2542192},
  doi          = {10.1145/2542182.2542192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tist/FireTPLRE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BnayaPSF13,
  author       = {Zahy Bnaya and
                  Rami Puzis and
                  Roni Stern and
                  Ariel Felner},
  title        = {Volatile Multi-Armed Bandits for Guaranteed Targeted Social Crawling},
  booktitle    = {Late-Breaking Developments in the Field of Artificial Intelligence,
                  Bellevue, Washington, USA, July 14-18, 2013},
  series       = {{AAAI} Technical Report},
  volume       = {{WS-13-17}},
  publisher    = {{AAAI}},
  year         = {2013},
  url          = {http://www.aaai.org/ocs/index.php/WS/AAAIW13/paper/view/7030},
  timestamp    = {Tue, 05 Sep 2023 08:59:27 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BnayaPSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/SternSPBBF13,
  author       = {Roni Tzvi Stern and
                  Liron Samama and
                  Rami Puzis and
                  Tal Beja and
                  Zahy Bnaya and
                  Ariel Felner},
  editor       = {Marie desJardins and
                  Michael L. Littman},
  title        = {{TONIC:} Target Oriented Network Intelligence Collection for the Social
                  Web},
  booktitle    = {Proceedings of the Twenty-Seventh {AAAI} Conference on Artificial
                  Intelligence, July 14-18, 2013, Bellevue, Washington, {USA}},
  pages        = {1184--1190},
  publisher    = {{AAAI} Press},
  year         = {2013},
  url          = {https://doi.org/10.1609/aaai.v27i1.8466},
  doi          = {10.1609/AAAI.V27I1.8466},
  timestamp    = {Mon, 04 Sep 2023 15:56:33 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/SternSPBBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/BnayaPSF13,
  author       = {Zahy Bnaya and
                  Rami Puzis and
                  Roni Stern and
                  Ariel Felner},
  title        = {Bandit Algorithms for Social Network Queries},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {148--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.29},
  doi          = {10.1109/SOCIALCOM.2013.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/BnayaPSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/PuzisBPR13,
  author       = {Yury Puzis and
                  Yevgen Borodin and
                  Rami Puzis and
                  I. V. Ramakrishnan},
  editor       = {Daniel Schwabe and
                  Virg{\'{\i}}lio A. F. Almeida and
                  Hartmut Glaser and
                  Ricardo Baeza{-}Yates and
                  Sue B. Moon},
  title        = {Predictive web automation assistant for people with vision impairments},
  booktitle    = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
                  Brazil, May 13-17, 2013},
  pages        = {1031--1040},
  publisher    = {International World Wide Web Conferences Steering Committee / {ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488388.2488478},
  doi          = {10.1145/2488388.2488478},
  timestamp    = {Sun, 22 Sep 2019 18:15:38 +0200},
  biburl       = {https://dblp.org/rec/conf/www/PuzisBPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-3741,
  author       = {Michael Fire and
                  Rami Puzis and
                  Yuval Elovici},
  title        = {Organization Mining Using Online Social Networks},
  journal      = {CoRR},
  volume       = {abs/1303.3741},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.3741},
  eprinttype    = {arXiv},
  eprint       = {1303.3741},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-3741.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MenahemPE12,
  author       = {Eitan Menahem and
                  Rami Puzis and
                  Yuval Elovici},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Detecting Spammers via Aggregated Historical Data Set},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_19},
  doi          = {10.1007/978-3-642-34601-9\_19},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MenahemPE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/PuzisZEDB12,
  author       = {Rami Puzis and
                  Polina Zilberman and
                  Yuval Elovici and
                  Shlomi Dolev and
                  Ulrik Brandes},
  title        = {Heuristics for Speeding Up Betweenness Centrality Computation},
  booktitle    = {2012 International Conference on Privacy, Security, Risk and Trust,
                  {PASSAT} 2012, and 2012 International Confernece on Social Computing,
                  SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},
  pages        = {302--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SocialCom-PASSAT.2012.66},
  doi          = {10.1109/SOCIALCOM-PASSAT.2012.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/PuzisZEDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-1357,
  author       = {Eitan Menahem and
                  Rami Puzis},
  title        = {Detecting Spammers via Aggregated Historical Data Set},
  journal      = {CoRR},
  volume       = {abs/1205.1357},
  year         = {2012},
  url          = {http://arxiv.org/abs/1205.1357},
  eprinttype    = {arXiv},
  eprint       = {1205.1357},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1205-1357.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomacs/PuzisTEGD11,
  author       = {Rami Puzis and
                  Meytal Tubi and
                  Yuval Elovici and
                  Chanan Glezer and
                  Shlomi Dolev},
  title        = {A Decision Support System for Placement of Intrusion Detection and
                  Prevention Devices in Large-Scale Networks},
  journal      = {{ACM} Trans. Model. Comput. Simul.},
  volume       = {22},
  number       = {1},
  pages        = {5:1--5:26},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043635.2043640},
  doi          = {10.1145/2043635.2043640},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomacs/PuzisTEGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aips/SternPF11,
  author       = {Roni Tzvi Stern and
                  Rami Puzis and
                  Ariel Felner},
  editor       = {Fahiem Bacchus and
                  Carmel Domshlak and
                  Stefan Edelkamp and
                  Malte Helmert},
  title        = {Potential Search: {A} Bounded-Cost Search Algorithm},
  booktitle    = {Proceedings of the 21st International Conference on Automated Planning
                  and Scheduling, {ICAPS} 2011, Freiburg, Germany June 11-16, 2011},
  publisher    = {{AAAI}},
  year         = {2011},
  url          = {http://aaai.org/ocs/index.php/ICAPS/ICAPS11/paper/view/2687},
  timestamp    = {Tue, 28 Jun 2011 14:20:04 +0200},
  biburl       = {https://dblp.org/rec/conf/aips/SternPF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/PoratRPE11,
  author       = {Talya Porat and
                  Inbal Rief and
                  Rami Puzis and
                  Yuval Elovici},
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {LoOkie - it feels like being there},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Extended Abstracts Volume, Vancouver, BC, Canada,
                  May 7-12, 2011},
  pages        = {1873--1878},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1979742.1979884},
  doi          = {10.1145/1979742.1979884},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/PoratRPE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hvc/DolevGP11,
  author       = {Shlomi Dolev and
                  Jonathan Goldfeld and
                  Rami Puzis},
  editor       = {Kerstin Eder and
                  Jo{\~{a}}o Louren{\c{c}}o and
                  Onn Shehory},
  title        = {On-Line Detection and Prediction of Temporal Patterns},
  booktitle    = {Hardware and Software: Verification and Testing - 7th International
                  Haifa Verification Conference, {HVC} 2011, Haifa, Israel, December
                  6-8, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7261},
  pages        = {254--256},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34188-5\_23},
  doi          = {10.1007/978-3-642-34188-5\_23},
  timestamp    = {Fri, 27 Mar 2020 08:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/hvc/DolevGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/OssmyTPRIE11,
  author       = {Ori Ossmy and
                  Ofir Tam and
                  Rami Puzis and
                  Lior Rokach and
                  Ohad Inbar and
                  Yuval Elovici},
  editor       = {Runtong Zhang and
                  Jos{\'{e}} Cordeiro and
                  Xuewei Li and
                  Zhenji Zhang and
                  Juliang Zhang},
  title        = {MindDesktop - Computer Accessibility for Severely Handicapped},
  booktitle    = {{ICEIS} 2011 - Proceedings of the 13th International Conference on
                  Enterprise Information Systems, Volume 4, Beijing, China, 8-11 June,
                  2011},
  pages        = {316--320},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 28 Sep 2011 15:19:28 +0200},
  biburl       = {https://dblp.org/rec/conf/iceis/OssmyTPRIE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/FireTLPRE11,
  author       = {Michael Fire and
                  Lena Tenenboim and
                  Ofrit Lesser and
                  Rami Puzis and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {Link Prediction in Social Networks Using Computationally Efficient
                  Topological Features},
  booktitle    = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
                  2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
                  International Conference on Social Computing (SocialCom), Boston,
                  MA, USA, 9-11 Oct., 2011},
  pages        = {73--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PASSAT/SocialCom.2011.20},
  doi          = {10.1109/PASSAT/SOCIALCOM.2011.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/FireTLPRE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/DolevEP10,
  author       = {Shlomi Dolev and
                  Yuval Elovici and
                  Rami Puzis},
  title        = {Routing betweenness centrality},
  journal      = {J. {ACM}},
  volume       = {57},
  number       = {4},
  pages        = {25:1--25:27},
  year         = {2010},
  url          = {https://doi.org/10.1145/1734213.1734219},
  doi          = {10.1145/1734213.1734219},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/DolevEP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Rozenshine-KemelmakherPFE10,
  author       = {Emily Rozenshine{-}Kemelmakher and
                  Rami Puzis and
                  Ariel Felner and
                  Yuval Elovici},
  title        = {Cost Benefit Deployment of {DNIPS}},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502182},
  doi          = {10.1109/ICC.2010.5502182},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Rozenshine-KemelmakherPFE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osc/CohenDFPR10,
  author       = {Eyal Cohen and
                  Shlomi Dolev and
                  Sergey Frenkel and
                  Rami Puzis and
                  Michael Rosenblit},
  editor       = {Shlomi Dolev and
                  Mihai Oltean},
  title        = {Nanotechnology Based Optical Solution for NP-Hard Problems},
  booktitle    = {Optical Supercomputing - Third International Workshop, {OSC} 2010,
                  Bertinoro, Italy, November 17-19, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6748},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22494-2\_10},
  doi          = {10.1007/978-3-642-22494-2\_10},
  timestamp    = {Sat, 19 Oct 2019 19:58:35 +0200},
  biburl       = {https://dblp.org/rec/conf/osc/CohenDFPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socs/SternPF10,
  author       = {Roni Tzvi Stern and
                  Rami Puzis and
                  Ariel Felner},
  editor       = {Ariel Felner and
                  Nathan R. Sturtevant},
  title        = {Potential Search: {A} New Greedy Anytime Heuristic Search},
  booktitle    = {Proceedings of the Third Annual Symposium on Combinatorial Search,
                  {SOCS} 2010, Stone Mountain, Atlanta, Georgia, USA, July 8-10, 2010},
  pages        = {119--120},
  publisher    = {{AAAI} Press},
  year         = {2010},
  url          = {https://doi.org/10.1609/socs.v1i1.18177},
  doi          = {10.1609/SOCS.V1I1.18177},
  timestamp    = {Mon, 18 Dec 2023 04:11:03 +0100},
  biburl       = {https://dblp.org/rec/conf/socs/SternPF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/social/PuzisTE10,
  author       = {Rami Puzis and
                  Meytal Tubi and
                  Yuval Elovici},
  editor       = {Borko Furht},
  title        = {Optimizing Targeting of Intrusion Detection Systems in Social Networks},
  booktitle    = {Handbook of Social Network Technologies and Applications},
  pages        = {549--568},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7142-5\_25},
  doi          = {10.1007/978-1-4419-7142-5\_25},
  timestamp    = {Wed, 26 Jun 2019 12:55:10 +0200},
  biburl       = {https://dblp.org/rec/reference/social/PuzisTE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/PuzisYEB09,
  author       = {Rami Puzis and
                  Dana Yagil and
                  Yuval Elovici and
                  Dan Braha},
  title        = {Collaborative attack on Internet users' anonymity},
  journal      = {Internet Res.},
  volume       = {19},
  number       = {1},
  pages        = {60--77},
  year         = {2009},
  url          = {https://doi.org/10.1108/10662240910927821},
  doi          = {10.1108/10662240910927821},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/PuzisYEB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DolevEPZ09,
  author       = {Shlomi Dolev and
                  Yuval Elovici and
                  Rami Puzis and
                  Polina Zilberman},
  title        = {Incremental deployment of network monitors based on Group Betweenness
                  Centrality},
  journal      = {Inf. Process. Lett.},
  volume       = {109},
  number       = {20},
  pages        = {1172--1176},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ipl.2009.07.019},
  doi          = {10.1016/J.IPL.2009.07.019},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/DolevEPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mc/ShmueliKPEEG09,
  author       = {Erez Shmueli and
                  Alexander Kruglov and
                  Rami Puzis and
                  Yuval Elovici and
                  Roman Englert and
                  Chanan Glezer},
  editor       = {Saskia Kain and
                  Doreen Struve and
                  Hartmut Wandke},
  title        = {An Attentive Digital Signage System},
  booktitle    = {Workshop-Proceedings der Tagung Mensch {\&} Computer 2009, Berlin,
                  Germany, September 6-9, 2009},
  pages        = {10--15},
  publisher    = {Logos Verlag},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/7148},
  timestamp    = {Thu, 07 Dec 2023 20:49:07 +0100},
  biburl       = {https://dblp.org/rec/conf/mc/ShmueliKPEEG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0904-0352,
  author       = {Shlomi Dolev and
                  Yuval Elovici and
                  Rami Puzis and
                  Polina Zilberman},
  title        = {Incremental Deployment of Network Monitors Based on Group Betweenness
                  Centrality},
  journal      = {CoRR},
  volume       = {abs/0904.0352},
  year         = {2009},
  url          = {http://arxiv.org/abs/0904.0352},
  eprinttype    = {arXiv},
  eprint       = {0904.0352},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0904-0352.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euroisi/PuzisKED08,
  author       = {Rami Puzis and
                  Marius David Klippel and
                  Yuval Elovici and
                  Shlomi Dolev},
  editor       = {Daniel Ortiz Arroyo and
                  Henrik Legind Larsen and
                  Daniel Dajun Zeng and
                  David L. Hicks and
                  Gerhard Wagner},
  title        = {Optimization of {NIDS} Placement for Protection of Intercommunicating
                  Critical Infrastructures},
  booktitle    = {Intelligence and Security Informatics, First European Conference,
                  EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5376},
  pages        = {191--203},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89900-6\_20},
  doi          = {10.1007/978-3-540-89900-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/euroisi/PuzisKED08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aicom/PuzisED07,
  author       = {Rami Puzis and
                  Yuval Elovici and
                  Shlomi Dolev},
  title        = {Finding the most prominent group in complex networks},
  journal      = {{AI} Commun.},
  volume       = {20},
  number       = {4},
  pages        = {287--296},
  year         = {2007},
  url          = {http://content.iospress.com/articles/ai-communications/aic411},
  timestamp    = {Fri, 15 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aicom/PuzisED07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/TubiPE07,
  author       = {Meytal Tubi and
                  Rami Puzis and
                  Yuval Elovici},
  title        = {Deployment of {DNIDS} in Social Networks},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings},
  pages        = {59--65},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISI.2007.379534},
  doi          = {10.1109/ISI.2007.379534},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/TubiPE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PuzisTTE07,
  author       = {Rami Puzis and
                  Meytal Tubi and
                  Gil Tahan and
                  Yuval Elovici},
  title        = {Simulating Threats Propagation within the {NSP} Infrastructure},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings},
  pages        = {380},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISI.2007.379526},
  doi          = {10.1109/ISI.2007.379526},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PuzisTTE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics