Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Asaf Shabtai
@article{DBLP:journals/csur/HablerBS24, author = {Edan Habler and Ron Bitton and Asaf Shabtai}, title = {Assessing Aircraft Security: {A} Comprehensive Survey and Methodology for Evaluation}, journal = {{ACM} Comput. Surv.}, volume = {56}, number = {4}, pages = {96:1--96:40}, year = {2024}, url = {https://doi.org/10.1145/3610772}, doi = {10.1145/3610772}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HablerBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LavieSK24, author = {Orel Lavie and Asaf Shabtai and Gilad Katz}, title = {Cost effective transfer of reinforcement learning policies}, journal = {Expert Syst. Appl.}, volume = {237}, number = {Part {A}}, pages = {121380}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.121380}, doi = {10.1016/J.ESWA.2023.121380}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/LavieSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/GiloniGHFFES24, author = {Amit Giloni and Edita Grolman and Tanja Hagemann and Ronald Fromm and Sebastian Fischer and Yuval Elovici and Asaf Shabtai}, title = {{BENN:} Bias Estimation Using a Deep Neural Network}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {1}, pages = {117--131}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2022.3172365}, doi = {10.1109/TNNLS.2022.3172365}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/GiloniGHFFES24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-09075, author = {Sagiv Antebi and Noam Azulay and Edan Habler and Ben Ganon and Asaf Shabtai and Yuval Elovici}, title = {{GPT} in Sheep's Clothing: The Risk of Customized GPTs}, journal = {CoRR}, volume = {abs/2401.09075}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.09075}, doi = {10.48550/ARXIV.2401.09075}, eprinttype = {arXiv}, eprint = {2401.09075}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-09075.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-02554, author = {Oryan Yehezkel and Alon Zolfi and Amit Baras and Yuval Elovici and Asaf Shabtai}, title = {DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers}, journal = {CoRR}, volume = {abs/2402.02554}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.02554}, doi = {10.48550/ARXIV.2402.02554}, eprinttype = {arXiv}, eprint = {2402.02554}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-02554.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-08309, author = {Daniel Nahmias and Gal Engelberg and Dan Klein and Asaf Shabtai}, title = {Prompted Contextual Vectors for Spear-Phishing Detection}, journal = {CoRR}, volume = {abs/2402.08309}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.08309}, doi = {10.48550/ARXIV.2402.08309}, eprinttype = {arXiv}, eprint = {2402.08309}, timestamp = {Mon, 19 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-08309.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TayouriBSP23, author = {David Tayouri and Nick Baum and Asaf Shabtai and Rami Puzis}, title = {A Survey of MulVAL Extensions and Their Attack Scenarios Coverage}, journal = {{IEEE} Access}, volume = {11}, pages = {27974--27991}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3257721}, doi = {10.1109/ACCESS.2023.3257721}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TayouriBSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MeidanBBAS23, author = {Yair Meidan and Daniel Benatar and Ron Bitton and Dan Avraham and Asaf Shabtai}, title = {D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks}, journal = {Comput. Secur.}, volume = {126}, pages = {103073}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103073}, doi = {10.1016/J.COSE.2022.103073}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MeidanBBAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BittonMSMES23, author = {Ron Bitton and Nadav Maman and Inderjeet Singh and Satoru Momiyama and Yuval Elovici and Asaf Shabtai}, title = {Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {9}, pages = {183:1--183:36}, year = {2023}, url = {https://doi.org/10.1145/3559104}, doi = {10.1145/3559104}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BittonMSMES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MeidanALS23, author = {Yair Meidan and Dan Avraham and Hanan Libhaber and Asaf Shabtai}, title = {CADeSH: Collaborative Anomaly Detection for Smart Homes}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {10}, pages = {8514--8532}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3194813}, doi = {10.1109/JIOT.2022.3194813}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/MeidanALS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KotakHBSE23, author = {Jaidip Kotak and Edan Habler and Oleg Brodt and Asaf Shabtai and Yuval Elovici}, title = {Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions}, journal = {Sensors}, volume = {23}, number = {8}, pages = {4018}, year = {2023}, url = {https://doi.org/10.3390/s23084018}, doi = {10.3390/S23084018}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KotakHBSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LevySGME23, author = {Efrat Levy and Asaf Shabtai and Bogdan Groza and Pal{-}Stefan Murvay and Yuval Elovici}, title = {{CAN-LOC:} Spoofing Detection and Physical Intrusion Localization on an In-Vehicle {CAN} Bus Based on Deep Features of Voltage Signals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4800--4814}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3297444}, doi = {10.1109/TIFS.2023.3297444}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LevySGME23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/BerdichGMLSE23, author = {Adriana Berdich and Bogdan Groza and Ren{\'{e}} Mayrhofer and Efrat Levy and Asaf Shabtai and Yuval Elovici}, title = {Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {4}, pages = {2417--2434}, year = {2023}, url = {https://doi.org/10.1109/TMC.2021.3119987}, doi = {10.1109/TMC.2021.3119987}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/BerdichGMLSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccsw-ws/OfferZSEP23, author = {Adi Offer and Aviram Zilberman and Asaf Shabtai and Yuval Elovici and Rami Puzis}, editor = {Francesco Regazzoni and Apostolos P. Fournaris}, title = {CDGeB: Cloud Data Geolocation Benchmark}, booktitle = {Proceedings of the 2023 on Cloud Computing Security Workshop, {CCSW} 2023, Copenhagen, Denmark, 26 November 2023}, pages = {69--74}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605763.3625273}, doi = {10.1145/3605763.3625273}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccsw-ws/OfferZSEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CohenBSP23, author = {Ofir Cohen and Ron Bitton and Asaf Shabtai and Rami Puzis}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {ConGISATA: {A} Framework for Continuous Gamified Information Security Awareness Training and Assessment}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {431--451}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_22}, doi = {10.1007/978-3-031-51479-1\_22}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CohenBSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/KodaZGSME23, author = {Satoru Koda and Alon Zolfi and Edita Grolman and Asaf Shabtai and Ikuya Morikawa and Yuval Elovici}, title = {Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2023, Gold Coast, Australia, June 18-23, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IJCNN54540.2023.10191141}, doi = {10.1109/IJCNN54540.2023.10191141}, timestamp = {Wed, 09 Aug 2023 16:25:09 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/KodaZGSME23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MallahES23, author = {Yakov Mallah and Yuval Elovici and Asaf Shabtai}, title = {Risk Oriented Resource Allocation in Robotic Swarm}, booktitle = {20th Annual International Conference on Privacy, Security and Trust, {PST} 2023, Copenhagen, Denmark, August 21-23, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/PST58708.2023.10320163}, doi = {10.1109/PST58708.2023.10320163}, timestamp = {Thu, 07 Dec 2023 14:16:22 +0100}, biburl = {https://dblp.org/rec/conf/pst/MallahES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wacv/ShapiraZDBS23, author = {Avishag Shapira and Alon Zolfi and Luca Demetrio and Battista Biggio and Asaf Shabtai}, title = {Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors}, booktitle = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV} 2023, Waikoloa, HI, USA, January 2-7, 2023}, pages = {4560--4569}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WACV56688.2023.00455}, doi = {10.1109/WACV56688.2023.00455}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wacv/ShapiraZDBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-01021, author = {Yair Meidan and Dan Avraham and Hanan Libhaber and Asaf Shabtai}, title = {CADeSH: Collaborative Anomaly Detection for Smart Homes}, journal = {CoRR}, volume = {abs/2303.01021}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.01021}, doi = {10.48550/ARXIV.2303.01021}, eprinttype = {arXiv}, eprint = {2303.01021}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-01021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-01041, author = {Yair Meidan and Daniel Benatar and Ron Bitton and Dan Avraham and Asaf Shabtai}, title = {D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks}, journal = {CoRR}, volume = {abs/2303.01041}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.01041}, doi = {10.48550/ARXIV.2303.01041}, eprinttype = {arXiv}, eprint = {2303.01041}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-01041.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-06786, author = {Natan Semyonov and Rami Puzis and Asaf Shabtai and Gilad Katz}, title = {ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network}, journal = {CoRR}, volume = {abs/2305.06786}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.06786}, doi = {10.48550/ARXIV.2305.06786}, eprinttype = {arXiv}, eprint = {2305.06786}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-06786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08422, author = {Omer Hofman and Amit Giloni and Yarin Hayun and Ikuya Morikawa and Toshiya Shimizu and Yuval Elovici and Asaf Shabtai}, title = {X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail}, journal = {CoRR}, volume = {abs/2306.08422}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08422}, doi = {10.48550/ARXIV.2306.08422}, eprinttype = {arXiv}, eprint = {2306.08422}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08422.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-02614, author = {Yarin Ozery and Asaf Nadler and Asaf Shabtai}, title = {Information-Based Heavy Hitters for Real-Time {DNS} Data Exfiltration Detection and Prevention}, journal = {CoRR}, volume = {abs/2307.02614}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.02614}, doi = {10.48550/ARXIV.2307.02614}, eprinttype = {arXiv}, eprint = {2307.02614}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-02614.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-03565, author = {David Tayouri and Telem Nachum and Asaf Shabtai}, title = {{MIRAGE:} Multi-Binary Image Risk Assessment with Attack Graph Employment}, journal = {CoRR}, volume = {abs/2311.03565}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.03565}, doi = {10.48550/ARXIV.2311.03565}, eprinttype = {arXiv}, eprint = {2311.03565}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-03565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-03809, author = {Priyanka Prakash Surve and Oleg Brodt and Mark Yampolskiy and Yuval Elovici and Asaf Shabtai}, title = {SoK: Security Below the {OS} - {A} Security Analysis of {UEFI}}, journal = {CoRR}, volume = {abs/2311.03809}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.03809}, doi = {10.48550/ARXIV.2311.03809}, eprinttype = {arXiv}, eprint = {2311.03809}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-03809.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-03825, author = {Ryuta Kremer and Prasanna N. Wudali and Satoru Momiyama and Toshinori Araki and Jun Furukawa and Yuval Elovici and Asaf Shabtai}, title = {{IC-SECURE:} Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response}, journal = {CoRR}, volume = {abs/2311.03825}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.03825}, doi = {10.48550/ARXIV.2311.03825}, eprinttype = {arXiv}, eprint = {2311.03825}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-03825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-18525, author = {Yizhak Vaisman and Gilad Katz and Yuval Elovici and Asaf Shabtai}, title = {Detecting Anomalous Network Communication Patterns Using Graph Convolutional Networks}, journal = {CoRR}, volume = {abs/2311.18525}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.18525}, doi = {10.48550/ARXIV.2311.18525}, eprinttype = {arXiv}, eprint = {2311.18525}, timestamp = {Tue, 05 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-18525.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-01200, author = {Chen Doytshman and Satoru Momiyama and Inderjeet Singh and Yuval Elovici and Asaf Shabtai}, title = {FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning}, journal = {CoRR}, volume = {abs/2312.01200}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.01200}, doi = {10.48550/ARXIV.2312.01200}, eprinttype = {arXiv}, eprint = {2312.01200}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-01200.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-01330, author = {Roy Peled and Eran Aizikovich and Edan Habler and Yuval Elovici and Asaf Shabtai}, title = {Evaluating the Security of Satellite Systems}, journal = {CoRR}, volume = {abs/2312.01330}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.01330}, doi = {10.48550/ARXIV.2312.01330}, eprinttype = {arXiv}, eprint = {2312.01330}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-01330.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-02220, author = {Amit Baras and Alon Zolfi and Yuval Elovici and Asaf Shabtai}, title = {QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers}, journal = {CoRR}, volume = {abs/2312.02220}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.02220}, doi = {10.48550/ARXIV.2312.02220}, eprinttype = {arXiv}, eprint = {2312.02220}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-02220.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BerdichGLSEM22, author = {Adriana Berdich and Bogdan Groza and Efrat Levy and Asaf Shabtai and Yuval Elovici and Ren{\'{e}} Mayrhofer}, title = {Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings}, journal = {{IEEE} Access}, volume = {10}, pages = {122399--122413}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3223375}, doi = {10.1109/ACCESS.2022.3223375}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BerdichGLSEM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NadlerBBS22, author = {Asaf Nadler and Ron Bitton and Oleg Brodt and Asaf Shabtai}, title = {On the vulnerability of anti-malware solutions to {DNS} attacks}, journal = {Comput. Secur.}, volume = {116}, pages = {102687}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102687}, doi = {10.1016/J.COSE.2022.102687}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NadlerBBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MathovSSE22, author = {Yael Mathov and Tal Ben Senior and Asaf Shabtai and Yuval Elovici}, title = {Stop bugging me! Evading modern-day wiretapping using adversarial perturbations}, journal = {Comput. Secur.}, volume = {121}, pages = {102841}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102841}, doi = {10.1016/J.COSE.2022.102841}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MathovSSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MimranBKKBLES22, author = {Dudu Mimran and Ron Bitton and Yehonatan Kfir and Eitan Klevansky and Oleg Brodt and Heiko Lehmann and Yuval Elovici and Asaf Shabtai}, title = {Security of Open Radio Access Networks}, journal = {Comput. Secur.}, volume = {122}, pages = {102890}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102890}, doi = {10.1016/J.COSE.2022.102890}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MimranBKKBLES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KravchikDBS22, author = {Moshe Kravchik and Luca Demetrio and Battista Biggio and Asaf Shabtai}, title = {Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems}, journal = {Comput. Secur.}, volume = {122}, pages = {102901}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102901}, doi = {10.1016/J.COSE.2022.102901}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KravchikDBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/RosenbergSER21, author = {Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach}, title = {Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {5}, pages = {108:1--108:36}, year = {2022}, url = {https://doi.org/10.1145/3453158}, doi = {10.1145/3453158}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/RosenbergSER21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/GrolmanCFSP22, author = {Edita Grolman and Dvir Cohen and Tatiana Frenklach and Asaf Shabtai and Rami Puzis}, title = {How and when to stop the co-training process}, journal = {Expert Syst. Appl.}, volume = {187}, pages = {115841}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2021.115841}, doi = {10.1016/J.ESWA.2021.115841}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/GrolmanCFSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/BirmanHKS22, author = {Yoni Birman and Shaked Hindi and Gilad Katz and Asaf Shabtai}, title = {Cost-effective ensemble models selection using deep reinforcement learning}, journal = {Inf. Fusion}, volume = {77}, pages = {133--148}, year = {2022}, url = {https://doi.org/10.1016/j.inffus.2021.07.011}, doi = {10.1016/J.INFFUS.2021.07.011}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/BirmanHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/MathovLKSE22, author = {Yael Mathov and Eden Levy and Ziv Katzir and Asaf Shabtai and Yuval Elovici}, title = {Not all datasets are born equal: On heterogeneous tabular data and adversarial examples}, journal = {Knowl. Based Syst.}, volume = {242}, pages = {108377}, year = {2022}, url = {https://doi.org/10.1016/j.knosys.2022.108377}, doi = {10.1016/J.KNOSYS.2022.108377}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/MathovLKSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/SolomonMBSRPS22, author = {Adir Solomon and Michael Michaelshvili and Ron Bitton and Bracha Shapira and Lior Rokach and Rami Puzis and Asaf Shabtai}, title = {Contextual security awareness: {A} context-based approach for assessing the security awareness of users}, journal = {Knowl. Based Syst.}, volume = {246}, pages = {108709}, year = {2022}, url = {https://doi.org/10.1016/j.knosys.2022.108709}, doi = {10.1016/J.KNOSYS.2022.108709}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/SolomonMBSRPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/CohenLSCES22, author = {Shai Cohen and Efrat Levy and Avi Shaked and Tair Cohen and Yuval Elovici and Asaf Shabtai}, title = {RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks}, journal = {Sensors}, volume = {22}, number = {11}, pages = {4259}, year = {2022}, url = {https://doi.org/10.3390/s22114259}, doi = {10.3390/S22114259}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/CohenLSCES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taes/HablerS22, author = {Edan Habler and Asaf Shabtai}, title = {Analyzing Sequences of Airspace States to Detect Anomalous Traffic Conditions}, journal = {{IEEE} Trans. Aerosp. Electron. Syst.}, volume = {58}, number = {3}, pages = {1843--1857}, year = {2022}, url = {https://doi.org/10.1109/TAES.2021.3124199}, doi = {10.1109/TAES.2021.3124199}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taes/HablerS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/StanBEDIOYES22, author = {Orly Stan and Ron Bitton and Michal Ezrets and Moran Dadon and Masaki Inokuchi and Yoshinobu Ohta and Tomohiko Yagyu and Yuval Elovici and Asaf Shabtai}, title = {Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern {IT} Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1936--1954}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3041999}, doi = {10.1109/TDSC.2020.3041999}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/StanBEDIOYES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KravchikS22, author = {Moshe Kravchik and Asaf Shabtai}, title = {Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and {PCA}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2179--2197}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3050101}, doi = {10.1109/TDSC.2021.3050101}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KravchikS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SharonBLSE22, author = {Yam Sharon and David Berend and Yang Liu and Asaf Shabtai and Yuval Elovici}, title = {{TANTRA:} Timing-Based Adversarial Network Traffic Reshaping Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3225--3237}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3201377}, doi = {10.1109/TIFS.2022.3201377}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SharonBLSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SakaziES22, author = {Shay Sakazi and Yuval Elovici and Asaf Shabtai}, editor = {Lorenzo Cavallaro and Daniel Gruss and Giancarlo Pellegrino and Giorgio Giacinto}, title = {Prioritizing Antivirus Alerts on Internal Enterprise Machines}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13358}, pages = {75--95}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09484-2\_5}, doi = {10.1007/978-3-031-09484-2\_5}, timestamp = {Fri, 01 Jul 2022 15:28:37 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SakaziES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GrozaPAMSE22, author = {Bogdan Groza and Lucian Popa and Tudor Andreica and Pal{-}Stefan Murvay and Asaf Shabtai and Yuval Elovici}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {658--679}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_32}, doi = {10.1007/978-3-031-17143-7\_32}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GrozaPAMSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/GiloniGES22, author = {Amit Giloni and Edita Grolman and Yuval Elovici and Asaf Shabtai}, title = {{FEPC:} Fairness Estimation Using Prototypes and Critics for Tabular Data}, booktitle = {26th International Conference on Pattern Recognition, {ICPR} 2022, Montreal, QC, Canada, August 21-25, 2022}, pages = {4877--4884}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICPR56361.2022.9956582}, doi = {10.1109/ICPR56361.2022.9956582}, timestamp = {Thu, 01 Dec 2022 13:56:03 +0100}, biburl = {https://dblp.org/rec/conf/icpr/GiloniGES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/ZolfiAES22, author = {Alon Zolfi and Shai Avidan and Yuval Elovici and Asaf Shabtai}, editor = {Massih{-}Reza Amini and St{\'{e}}phane Canu and Asja Fischer and Tias Guns and Petra Kralj Novak and Grigorios Tsoumakas}, title = {Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models}, booktitle = {Machine Learning and Knowledge Discovery in Databases - European Conference, {ECML} {PKDD} 2022, Grenoble, France, September 19-23, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13715}, pages = {304--320}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26409-2\_19}, doi = {10.1007/978-3-031-26409-2\_19}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/ZolfiAES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/TapasB0PSE22, author = {Nachiket Tapas and Sofia Belikovetsky and Francesco Longo and Antonio Puliafito and Asaf Shabtai and Yuval Elovici}, title = {3D Marketplace: Distributed Attestation of 3D Designs on Blockchain}, booktitle = {2022 {IEEE} International Conference on Smart Computing, {SMARTCOMP} 2022, Helsinki, Finland, June 20-24, 2022}, pages = {311--316}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SMARTCOMP55677.2022.00073}, doi = {10.1109/SMARTCOMP55677.2022.00073}, timestamp = {Tue, 19 Jul 2022 18:42:29 +0200}, biburl = {https://dblp.org/rec/conf/smartcomp/TapasB0PSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/GrolmanBSEMS22, author = {Edita Grolman and Hodaya Binyamini and Asaf Shabtai and Yuval Elovici and Ikuya Morikawa and Toshiya Shimizu}, editor = {Alejandro Bellog{\'{\i}}n and Ludovico Boratto and Olga C. Santos and Liliana Ardissono and Bart P. Knijnenburg}, title = {HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter}, booktitle = {{UMAP} '22: 30th {ACM} Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4 - 7, 2022}, pages = {143--152}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3503252.3531309}, doi = {10.1145/3503252.3531309}, timestamp = {Wed, 28 Dec 2022 14:29:13 +0100}, biburl = {https://dblp.org/rec/conf/um/GrolmanBSEMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wacv/CaoBTAL0SE22, author = {Yushi Cao and David Berend and Palina Tolmach and Guy Amit and Moshe Levy and Yang Liu and Asaf Shabtai and Yuval Elovici}, title = {Fair and accurate age prediction using distribution aware data curation and augmentation}, booktitle = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV} 2022, Waikoloa, HI, USA, January 3-8, 2022}, pages = {2867--2877}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WACV51458.2022.00292}, doi = {10.1109/WACV51458.2022.00292}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wacv/CaoBTAL0SE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/TayouriBSP22, author = {David Tayouri and Nick Baum and Asaf Shabtai and Rami Puzis}, title = {MulVAL Interaction Rules Mapped to {MITRE} ATT{\&}CK}, publisher = {{IEEE} DataPort}, year = {2022}, month = jul, howpublished = {\url{https://doi.org/10.21227/bvkn-4119}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/bvkn-4119}, doi = {10.21227/BVKN-4119}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/TayouriBSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-06080, author = {Dudu Mimran and Ron Bitton and Yehonatan Kfir and Eitan Klevansky and Oleg Brodt and Heiko Lehmann and Yuval Elovici and Asaf Shabtai}, title = {Evaluating the Security of Open Radio Access Networks}, journal = {CoRR}, volume = {abs/2201.06080}, year = {2022}, url = {https://arxiv.org/abs/2201.06080}, eprinttype = {arXiv}, eprint = {2201.06080}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-06080.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-06093, author = {Ron Bitton and Dan Avraham and Eitan Klevansky and Dudu Mimran and Oleg Brodt and Heiko Lehmann and Yuval Elovici and Asaf Shabtai}, title = {Adversarial Machine Learning Threat Analysis in Open Radio Access Networks}, journal = {CoRR}, volume = {abs/2201.06093}, year = {2022}, url = {https://arxiv.org/abs/2201.06093}, eprinttype = {arXiv}, eprint = {2201.06093}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-06093.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-06870, author = {Efrat Levy and Nadav Maman and Asaf Shabtai and Yuval Elovici}, title = {AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus}, journal = {CoRR}, volume = {abs/2202.06870}, year = {2022}, url = {https://arxiv.org/abs/2202.06870}, eprinttype = {arXiv}, eprint = {2202.06870}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-06870.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-13618, author = {Avishag Shapira and Alon Zolfi and Luca Demetrio and Battista Biggio and Asaf Shabtai}, title = {Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation}, journal = {CoRR}, volume = {abs/2205.13618}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.13618}, doi = {10.48550/ARXIV.2205.13618}, eprinttype = {arXiv}, eprint = {2205.13618}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-13618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-05750, author = {David Tayouri and Nick Baum and Asaf Shabtai and Rami Puzis}, title = {A Survey of MulVAL Extensions and Their Attack Scenarios Coverage}, journal = {CoRR}, volume = {abs/2208.05750}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.05750}, doi = {10.48550/ARXIV.2208.05750}, eprinttype = {arXiv}, eprint = {2208.05750}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-05750.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-04028, author = {Edan Habler and Ron Bitton and Asaf Shabtai}, title = {Evaluating the Security of Aircraft Systems}, journal = {CoRR}, volume = {abs/2209.04028}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.04028}, doi = {10.48550/ARXIV.2209.04028}, eprinttype = {arXiv}, eprint = {2209.04028}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-04028.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-09033, author = {Orel Lavie and Asaf Shabtai and Gilad Katz}, title = {A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection}, journal = {CoRR}, volume = {abs/2209.09033}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.09033}, doi = {10.48550/ARXIV.2209.09033}, eprinttype = {arXiv}, eprint = {2209.09033}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-09033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-08686, author = {Ofir Moshe and Gil Fidel and Ron Bitton and Asaf Shabtai}, title = {Improving Interpretability via Regularization of Neural Activation Sensitivity}, journal = {CoRR}, volume = {abs/2211.08686}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.08686}, doi = {10.48550/ARXIV.2211.08686}, eprinttype = {arXiv}, eprint = {2211.08686}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-08686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-08859, author = {Avishag Shapira and Ron Bitton and Dan Avraham and Alon Zolfi and Yuval Elovici and Asaf Shabtai}, title = {Attacking Object Detector Using {A} Universal Targeted Label-Switch Patch}, journal = {CoRR}, volume = {abs/2211.08859}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.08859}, doi = {10.48550/ARXIV.2211.08859}, eprinttype = {arXiv}, eprint = {2211.08859}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-08859.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-13644, author = {Jacob Shams and Ben Nassi and Ikuya Morikawa and Toshiya Shimizu and Asaf Shabtai and Yuval Elovici}, title = {Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models}, journal = {CoRR}, volume = {abs/2211.13644}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.13644}, doi = {10.48550/ARXIV.2211.13644}, eprinttype = {arXiv}, eprint = {2211.13644}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-13644.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-14797, author = {Ron Bitton and Alon Malach and Amiel Meiseles and Satoru Momiyama and Toshinori Araki and Jun Furukawa and Yuval Elovici and Asaf Shabtai}, title = {Latent {SHAP:} Toward Practical Human-Interpretable Explanations}, journal = {CoRR}, volume = {abs/2211.14797}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.14797}, doi = {10.48550/ARXIV.2211.14797}, eprinttype = {arXiv}, eprint = {2211.14797}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-14797.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-02081, author = {Alon Zolfi and Guy Amit and Amit Baras and Satoru Koda and Ikuya Morikawa and Yuval Elovici and Asaf Shabtai}, title = {YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection}, journal = {CoRR}, volume = {abs/2212.02081}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.02081}, doi = {10.48550/ARXIV.2212.02081}, eprinttype = {arXiv}, eprint = {2212.02081}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-02081.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HarushMS21, author = {Shimon Harush and Yair Meidan and Asaf Shabtai}, title = {DeepStream: Autoencoder-based stream temporal clustering and anomaly detection}, journal = {Comput. Secur.}, volume = {106}, pages = {102276}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102276}, doi = {10.1016/J.COSE.2021.102276}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HarushMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrenklachCSP21, author = {Tatiana Frenklach and Dvir Cohen and Asaf Shabtai and Rami Puzis}, title = {Android malware detection via an app similarity graph}, journal = {Comput. Secur.}, volume = {109}, pages = {102386}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102386}, doi = {10.1016/J.COSE.2021.102386}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FrenklachCSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AmitSE21, author = {Guy Amit and Asaf Shabtai and Yuval Elovici}, title = {A Self-Healing Mechanism for Internet of Things Devices}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {44--53}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3013207}, doi = {10.1109/MSEC.2020.3013207}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AmitSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BittonS21, author = {Ron Bitton and Asaf Shabtai}, title = {A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1164--1181}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2914035}, doi = {10.1109/TDSC.2019.2914035}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BittonS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/StanBEDIOYES21, author = {Orly Stan and Ron Bitton and Michal Ezrets and Moran Dadon and Masaki Inokuchi and Yoshinobu Ohta and Tomohiko Yagyu and Yuval Elovici and Asaf Shabtai}, title = {Heuristic Approach for Countermeasure Selection Using Attack Graphs}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00003}, doi = {10.1109/CSF51468.2021.00003}, timestamp = {Fri, 13 Aug 2021 09:20:41 +0200}, biburl = {https://dblp.org/rec/conf/csfw/StanBEDIOYES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZolfiKES21, author = {Alon Zolfi and Moshe Kravchik and Yuval Elovici and Asaf Shabtai}, title = {The Translucent Patch: {A} Physical and Universal Attack on Object Detectors}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {15232--15241}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Zolfi\_The\_Translucent\_Patch\_A\_Physical\_and\_Universal\_Attack\_on\_Object\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.01498}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/ZolfiKES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DaihesTNS21, author = {Yael Daihes and Hen Tzaban and Asaf Nadler and Asaf Shabtai}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {{MORTON:} Detection of Malicious Routines in Large-Scale {DNS} Traffic}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {736--756}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_35}, doi = {10.1007/978-3-030-88418-5\_35}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DaihesTNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/AmitLRSE21, author = {Guy Amit and Moshe Levy and Ishai Rosenberg and Asaf Shabtai and Yuval Elovici}, title = {{FOOD:} Fast Out-Of-Distribution Detector}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9533465}, doi = {10.1109/IJCNN52387.2021.9533465}, timestamp = {Wed, 29 Sep 2021 17:00:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/AmitLRSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/BirmanIKS21, author = {Yoni Birman and Ziv Ido and Gilad Katz and Asaf Shabtai}, title = {Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9534433}, doi = {10.1109/IJCNN52387.2021.9534433}, timestamp = {Wed, 29 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/BirmanIKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/RegevRS21, author = {Nir Regev and Lior Rokach and Asaf Shabtai}, title = {Approximating Aggregated {SQL} Queries with {LSTM} Networks}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9533974}, doi = {10.1109/IJCNN52387.2021.9533974}, timestamp = {Wed, 29 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/RegevRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/RosenbergSER21, author = {Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach}, title = {Sequence Squeezing: {A} Defense Method Against Adversarial Examples for {API} Call-Based {RNN} Variants}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9534432}, doi = {10.1109/IJCNN52387.2021.9534432}, timestamp = {Wed, 29 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/RosenbergSER21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/BinyaminiBIYES21, author = {Hodaya Binyamini and Ron Bitton and Masaki Inokuchi and Tomohiko Yagyu and Yuval Elovici and Asaf Shabtai}, editor = {Feida Zhu and Beng Chin Ooi and Chunyan Miao}, title = {A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions}, booktitle = {{KDD} '21: The 27th {ACM} {SIGKDD} Conference on Knowledge Discovery and Data Mining, Virtual Event, Singapore, August 14-18, 2021}, pages = {2574--2583}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447548.3467159}, doi = {10.1145/3447548.3467159}, timestamp = {Mon, 16 Aug 2021 16:18:31 +0200}, biburl = {https://dblp.org/rec/conf/kdd/BinyaminiBIYES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/NehemyaMSE21, author = {Elior Nehemya and Yael Mathov and Asaf Shabtai and Yuval Elovici}, editor = {Yuxiao Dong and Nicolas Kourtellis and Barbara Hammer and Jos{\'{e}} Antonio Lozano}, title = {Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders}, booktitle = {Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track - European Conference, {ECML} {PKDD} 2021, Bilbao, Spain, September 13-17, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12978}, pages = {221--236}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86514-6\_14}, doi = {10.1007/978-3-030-86514-6\_14}, timestamp = {Wed, 28 Jun 2023 16:19:42 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/NehemyaMSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KravchikBS21, author = {Moshe Kravchik and Battista Biggio and Asaf Shabtai}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {Poisoning attacks on cyber attack detectors for industrial control systems}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {116--125}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3441892}, doi = {10.1145/3412841.3441892}, timestamp = {Mon, 03 May 2021 14:34:56 +0200}, biburl = {https://dblp.org/rec/conf/sac/KravchikBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BadashTN0S21, author = {Lital Badash and Nachiket Tapas and Asaf Nadler and Francesco Longo and Asaf Shabtai}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {Blockchain-based bug bounty framework}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {239--248}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3441906}, doi = {10.1145/3412841.3441906}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BadashTN0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/HarushMS21, author = {Shimon Harush and Yair Meidan and Asaf Shabtai}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {DeepStream: autoencoder-based stream temporal clustering}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {445--448}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3442083}, doi = {10.1145/3412841.3442083}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/HarushMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NassiBMSE21, author = {Ben Nassi and Ron Bitton and Ryusuke Masuoka and Asaf Shabtai and Yuval Elovici}, title = {SoK: Security and Privacy in the Age of Commercial Drones}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1434--1451}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00005}, doi = {10.1109/SP40001.2021.00005}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/NassiBMSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Groza0MES21, author = {Bogdan Groza and Lucian Popa and Pal{-}Stefan Murvay and Yuval Elovici and Asaf Shabtai}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CANARY} - a reactive defense mechanism for Controller Area Networks based on Active RelaYs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4259--4276}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/groza}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/Groza0MES21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-06297, author = {Yam Sharon and David Berend and Yang Liu and Asaf Shabtai and Yuval Elovici}, title = {{TANTRA:} Timing-Based Adversarial Network Traffic Reshaping Attack}, journal = {CoRR}, volume = {abs/2103.06297}, year = {2021}, url = {https://arxiv.org/abs/2103.06297}, eprinttype = {arXiv}, eprint = {2103.06297}, timestamp = {Wed, 21 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-06297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-13158, author = {Yair Allouche and Nachiket Tapas and Francesco Longo and Asaf Shabtai and Yaron Wolfsthal}, title = {{TRADE:} TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain Technology}, journal = {CoRR}, volume = {abs/2103.13158}, year = {2021}, url = {https://arxiv.org/abs/2103.13158}, eprinttype = {arXiv}, eprint = {2103.13158}, timestamp = {Tue, 06 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-13158.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-07074, author = {Shai Cohen and Efrat Levy and Avi Shaked and Tair Cohen and Yuval Elovici and Asaf Shabtai}, title = {RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks}, journal = {CoRR}, volume = {abs/2106.07074}, year = {2021}, url = {https://arxiv.org/abs/2106.07074}, eprinttype = {arXiv}, eprint = {2106.07074}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-07074.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-07895, author = {Efrat Levy and Asaf Shabtai and Bogdan Groza and Pal{-}Stefan Murvay and Yuval Elovici}, title = {{CAN-LOC:} Spoofing Detection and Physical Intrusion Localization on an In-Vehicle {CAN} Bus Based on Deep Features of Voltage Signals}, journal = {CoRR}, volume = {abs/2106.07895}, year = {2021}, url = {https://arxiv.org/abs/2106.07895}, eprinttype = {arXiv}, eprint = {2106.07895}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-07895.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-01806, author = {Ron Bitton and Nadav Maman and Inderjeet Singh and Satoru Momiyama and Yuval Elovici and Asaf Shabtai}, title = {A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems}, journal = {CoRR}, volume = {abs/2107.01806}, year = {2021}, url = {https://arxiv.org/abs/2107.01806}, eprinttype = {arXiv}, eprint = {2107.01806}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-01806.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-06467, author = {Nitzan Guetta and Asaf Shabtai and Inderjeet Singh and Satoru Momiyama and Yuval Elovici}, title = {Dodging Attack Using Carefully Crafted Natural Makeup}, journal = {CoRR}, volume = {abs/2109.06467}, year = {2021}, url = {https://arxiv.org/abs/2109.06467}, eprinttype = {arXiv}, eprint = {2109.06467}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-06467.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-11342, author = {Asaf Nadler and Ron Bitton and Oleg Brodt and Asaf Shabtai}, title = {On The Vulnerability of Anti-Malware Solutions to {DNS} Attacks}, journal = {CoRR}, volume = {abs/2109.11342}, year = {2021}, url = {https://arxiv.org/abs/2109.11342}, eprinttype = {arXiv}, eprint = {2109.11342}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-11342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-10759, author = {Alon Zolfi and Shai Avidan and Yuval Elovici and Asaf Shabtai}, title = {Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models}, journal = {CoRR}, volume = {abs/2111.10759}, year = {2021}, url = {https://arxiv.org/abs/2111.10759}, eprinttype = {arXiv}, eprint = {2111.10759}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-10759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SidiNS20, author = {Lior Sidi and Asaf Nadler and Asaf Shabtai}, title = {MaskDGA: An Evasion Attack Against {DGA} Classifiers and Adversarial Defenses}, journal = {{IEEE} Access}, volume = {8}, pages = {161580--161592}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3020964}, doi = {10.1109/ACCESS.2020.3020964}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SidiNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShwartzCSO20, author = {Omer Shwartz and Amir Cohen and Asaf Shabtai and Yossi Oren}, title = {Inner conflict: How smart device components can cause harm}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101665}, doi = {10.1016/J.COSE.2019.101665}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShwartzCSO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArendSIKB20, author = {Isabel Arend and Asaf Shabtai and Tali Idan and Ruty Keinan and Yoella Bereby{-}Meyer}, title = {Passive- and not active-risk tendencies predict cyber security behavior}, journal = {Comput. Secur.}, volume = {96}, pages = {101929}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101929}, doi = {10.1016/J.COSE.2020.101929}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArendSIKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArendSIKB20a, author = {Isabel Arend and Asaf Shabtai and Tali Idan and Ruty Keinan and Yoella Bereby{-}Meyer}, title = {Passive- and not active-risk tendencies predict cyber security behavior}, journal = {Comput. Secur.}, volume = {97}, pages = {101964}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101964}, doi = {10.1016/J.COSE.2020.101964}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArendSIKB20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MeidanSPSES20, author = {Yair Meidan and Vinay Sachidananda and Hongyi Peng and Racheli Sagron and Yuval Elovici and Asaf Shabtai}, title = {A novel approach for detecting vulnerable IoT devices connected behind a home {NAT}}, journal = {Comput. Secur.}, volume = {97}, pages = {101968}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101968}, doi = {10.1016/J.COSE.2020.101968}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MeidanSPSES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TapasYLPS20, author = {Nachiket Tapas and Yechiav Yitzchak and Francesco Longo and Antonio Puliafito and Asaf Shabtai}, title = {P4UIoT: Pay-Per-Piece Patch Update Delivery for IoT Using Gradual Release}, journal = {Sensors}, volume = {20}, number = {7}, pages = {2156}, year = {2020}, url = {https://doi.org/10.3390/s20072156}, doi = {10.3390/S20072156}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/TapasYLPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KalboMSE20, author = {Naor Kalbo and Yisroel Mirsky and Asaf Shabtai and Yuval Elovici}, title = {The Security of IP-Based Video Surveillance Systems}, journal = {Sensors}, volume = {20}, number = {17}, pages = {4806}, year = {2020}, url = {https://doi.org/10.3390/s20174806}, doi = {10.3390/S20174806}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/KalboMSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GluckKCES20, author = {Tomer Gluck and Moshe Kravchik and Samuel Chocron and Yuval Elovici and Asaf Shabtai}, title = {Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal}, journal = {Sensors}, volume = {20}, number = {21}, pages = {6157}, year = {2020}, url = {https://doi.org/10.3390/s20216157}, doi = {10.3390/S20216157}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/GluckKCES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taes/StanCES20, author = {Orly Stan and Adi Cohen and Yuval Elovici and Asaf Shabtai}, title = {Intrusion Detection System for the {MIL-STD-1553} Communication Bus}, journal = {{IEEE} Trans. Aerosp. Electron. Syst.}, volume = {56}, number = {4}, pages = {3010--3027}, year = {2020}, url = {https://doi.org/10.1109/TAES.2019.2961824}, doi = {10.1109/TAES.2019.2961824}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taes/StanCES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RosenbergSER20, author = {Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach}, title = {Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {611--626}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427230}, doi = {10.1145/3427228.3427230}, timestamp = {Tue, 15 Dec 2020 12:22:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RosenbergSER20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/BirmanHKS20, author = {Yoni Birman and Shaked Hindi and Gilad Katz and Asaf Shabtai}, title = {Cost-Effective Malware Detection as a Service Over Serverless Cloud Using Deep Reinforcement Learning}, booktitle = {20th {IEEE/ACM} International Symposium on Cluster, Cloud and Internet Computing, {CCGRID} 2020, Melbourne, Australia, May 11-14, 2020}, pages = {420--429}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CCGrid49817.2020.00-51}, doi = {10.1109/CCGRID49817.2020.00-51}, timestamp = {Wed, 22 Jul 2020 16:50:17 +0200}, biburl = {https://dblp.org/rec/conf/ccgrid/BirmanHKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BittonBPS20, author = {Ron Bitton and Kobi Boymgold and Rami Puzis and Asaf Shabtai}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Evaluating the Information Security Awareness of Smartphone Users}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--13}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376385}, doi = {10.1145/3313831.3376385}, timestamp = {Wed, 04 May 2022 13:02:17 +0200}, biburl = {https://dblp.org/rec/conf/chi/BittonBPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/SidiMNES20, author = {Lior Sidi and Yisroel Mirsky and Asaf Nadler and Yuval Elovici and Asaf Shabtai}, editor = {Mathieu d'Aquin and Stefan Dietze and Claudia Hauff and Edward Curry and Philippe Cudr{\'{e}}{-}Mauroux}, title = {Helix: {DGA} Domain Embeddings for Tracking and Exploring Botnets}, booktitle = {{CIKM} '20: The 29th {ACM} International Conference on Information and Knowledge Management, Virtual Event, Ireland, October 19-23, 2020}, pages = {2741--2748}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3340531.3416022}, doi = {10.1145/3340531.3416022}, timestamp = {Fri, 25 Dec 2020 01:15:14 +0100}, biburl = {https://dblp.org/rec/conf/cikm/SidiMNES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/SiboniGPSE20, author = {Shachar Siboni and Chanan Glezer and Rami Puzis and Asaf Shabtai and Yuval Elovici}, editor = {Shlomi Dolev and Vladimir Kolesnikov and Sachin Lodha and Gera Weiss}, title = {Security Ranking of IoT Devices Using an {AHP} Model}, booktitle = {Cyber Security Cryptography and Machine Learning - Fourth International Symposium, {CSCML} 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12161}, pages = {29--44}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49785-9\_3}, doi = {10.1007/978-3-030-49785-9\_3}, timestamp = {Thu, 25 Jun 2020 16:11:03 +0200}, biburl = {https://dblp.org/rec/conf/cscml/SiboniGPSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LukachGS20, author = {Amir Lukach and Ehud Gudes and Asaf Shabtai}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {{PUA} Detection Based on Bundle Installer Characteristics}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {261--273}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_15}, doi = {10.1007/978-3-030-49669-2\_15}, timestamp = {Thu, 18 Jun 2020 13:44:27 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LukachGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CohenMKMEPS20, author = {Dvir Cohen and Yisroel Mirsky and Manuel Kamp and Tobias Martin and Yuval Elovici and Rami Puzis and Asaf Shabtai}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {{DANTE:} {A} Framework for Mining and Monitoring Darknet Traffic}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {88--109}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_5}, doi = {10.1007/978-3-030-58951-6\_5}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CohenMKMEPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/FidelBS20, author = {Gil Fidel and Ron Bitton and Asaf Shabtai}, title = {When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using {SHAP} Signatures}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9207637}, doi = {10.1109/IJCNN48605.2020.9207637}, timestamp = {Tue, 06 Oct 2020 15:44:04 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/FidelBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-02176, author = {Guy Amit and Ishai Rosenberg and Moshe Levy and Ron Bitton and Asaf Shabtai and Yuval Elovici}, title = {Neural Network Representation Control: Gaussian Isolation Machines and {CVC} Regularization}, journal = {CoRR}, volume = {abs/2002.02176}, year = {2020}, url = {https://arxiv.org/abs/2002.02176}, eprinttype = {arXiv}, eprint = {2002.02176}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-02176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-02741, author = {Moshe Kravchik and Asaf Shabtai}, title = {Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks}, journal = {CoRR}, volume = {abs/2002.02741}, year = {2020}, url = {https://arxiv.org/abs/2002.02741}, eprinttype = {arXiv}, eprint = {2002.02741}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-02741.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-02575, author = {Dvir Cohen and Yisroel Mirsky and Yuval Elovici and Rami Puzis and Manuel Kamp and Tobias Martin and Asaf Shabtai}, title = {{DANTE:} {A} framework for mining and monitoring darknet traffic}, journal = {CoRR}, volume = {abs/2003.02575}, year = {2020}, url = {https://arxiv.org/abs/2003.02575}, eprinttype = {arXiv}, eprint = {2003.02575}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-02575.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-00059, author = {Noam Moscovich and Ron Bitton and Yakov Mallah and Masaki Inokuchi and Tomohiko Yagyu and Meir Kalech and Yuval Elovici and Asaf Shabtai}, title = {Autosploit: {A} Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities}, journal = {CoRR}, volume = {abs/2007.00059}, year = {2020}, url = {https://arxiv.org/abs/2007.00059}, eprinttype = {arXiv}, eprint = {2007.00059}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-00059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-02407, author = {Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach}, title = {Adversarial Learning in the Cyber Security Domain}, journal = {CoRR}, volume = {abs/2007.02407}, year = {2020}, url = {https://arxiv.org/abs/2007.02407}, eprinttype = {arXiv}, eprint = {2007.02407}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-02407.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-09256, author = {Yoni Birman and Ziv Ido and Gilad Katz and Asaf Shabtai}, title = {Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes}, journal = {CoRR}, volume = {abs/2007.09256}, year = {2020}, url = {https://arxiv.org/abs/2007.09256}, eprinttype = {arXiv}, eprint = {2007.09256}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-09256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-02003, author = {Hen Tzaban and Asaf Nadler and Yael Daihes and Asaf Shabtai}, title = {{MORTON:} Detection of Malicious Routines in Large-Scale {DNS} Traffic}, journal = {CoRR}, volume = {abs/2008.02003}, year = {2020}, url = {https://arxiv.org/abs/2008.02003}, eprinttype = {arXiv}, eprint = {2008.02003}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-02003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-04377, author = {Hodaya Binyamini and Ron Bitton and Masaki Inokuchi and Tomohiko Yagyu and Yuval Elovici and Asaf Shabtai}, title = {An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions}, journal = {CoRR}, volume = {abs/2008.04377}, year = {2020}, url = {https://arxiv.org/abs/2008.04377}, eprinttype = {arXiv}, eprint = {2008.04377}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-04377.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-06856, author = {Guy Amit and Moshe Levy and Ishai Rosenberg and Asaf Shabtai and Yuval Elovici}, title = {{GLOD:} Gaussian Likelihood Out of Distribution Detector}, journal = {CoRR}, volume = {abs/2008.06856}, year = {2020}, url = {https://arxiv.org/abs/2008.06856}, eprinttype = {arXiv}, eprint = {2008.06856}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-06856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-05283, author = {Yushi Cao and David Berend and Palina Tolmach and Moshe Levy and Guy Amit and Asaf Shabtai and Yuval Elovici and Yang Liu}, title = {Fairness Matters - {A} Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems}, journal = {CoRR}, volume = {abs/2009.05283}, year = {2020}, url = {https://arxiv.org/abs/2009.05283}, eprinttype = {arXiv}, eprint = {2009.05283}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-05283.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-11349, author = {Gil Fidel and Ron Bitton and Ziv Katzir and Asaf Shabtai}, title = {Adversarial robustness via stochastic regularization of neural activation sensitivity}, journal = {CoRR}, volume = {abs/2009.11349}, year = {2020}, url = {https://arxiv.org/abs/2009.11349}, eprinttype = {arXiv}, eprint = {2009.11349}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-11349.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-03180, author = {Eden Levy and Yael Mathov and Ziv Katzir and Asaf Shabtai and Yuval Elovici}, title = {Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples}, journal = {CoRR}, volume = {abs/2010.03180}, year = {2020}, url = {https://arxiv.org/abs/2010.03180}, eprinttype = {arXiv}, eprint = {2010.03180}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-03180.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-09246, author = {Elior Nehemya and Yael Mathov and Asaf Shabtai and Yuval Elovici}, title = {When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders}, journal = {CoRR}, volume = {abs/2010.09246}, year = {2020}, url = {https://arxiv.org/abs/2010.09246}, eprinttype = {arXiv}, eprint = {2010.09246}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-09246.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12809, author = {Tal Ben Senior and Yael Mathov and Asaf Shabtai and Yuval Elovici}, title = {Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations}, journal = {CoRR}, volume = {abs/2010.12809}, year = {2020}, url = {https://arxiv.org/abs/2010.12809}, eprinttype = {arXiv}, eprint = {2010.12809}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12809.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-13070, author = {Shahar Hoory and Tzvika Shapira and Asaf Shabtai and Yuval Elovici}, title = {Dynamic Adversarial Patch for Evading Object Detection Models}, journal = {CoRR}, volume = {abs/2010.13070}, year = {2020}, url = {https://arxiv.org/abs/2010.13070}, eprinttype = {arXiv}, eprint = {2010.13070}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-13070.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-13149, author = {Nir Regev and Lior Rokach and Asaf Shabtai}, title = {Approximating Aggregated {SQL} Queries With {LSTM} Networks}, journal = {CoRR}, volume = {abs/2010.13149}, year = {2020}, url = {https://arxiv.org/abs/2010.13149}, eprinttype = {arXiv}, eprint = {2010.13149}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-13149.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-16323, author = {Tzvika Shapira and David Berend and Ishai Rosenberg and Yang Liu and Asaf Shabtai and Yuval Elovici}, title = {Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers}, journal = {CoRR}, volume = {abs/2010.16323}, year = {2020}, url = {https://arxiv.org/abs/2010.16323}, eprinttype = {arXiv}, eprint = {2010.16323}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-16323.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12528, author = {Alon Zolfi and Moshe Kravchik and Yuval Elovici and Asaf Shabtai}, title = {The Translucent Patch: {A} Physical and Universal Attack on Object Detectors}, journal = {CoRR}, volume = {abs/2012.12528}, year = {2020}, url = {https://arxiv.org/abs/2012.12528}, eprinttype = {arXiv}, eprint = {2012.12528}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12537, author = {Amit Giloni and Edita Grolman and Tanja Hagemann and Ronald Fromm and Sebastian Fischer and Yuval Elovici and Asaf Shabtai}, title = {{BENN:} Bias Estimation Using Deep Neural Network}, journal = {CoRR}, volume = {abs/2012.12537}, year = {2020}, url = {https://arxiv.org/abs/2012.12537}, eprinttype = {arXiv}, eprint = {2012.12537}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12537.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-15740, author = {Moshe Kravchik and Battista Biggio and Asaf Shabtai}, title = {Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems}, journal = {CoRR}, volume = {abs/2012.15740}, year = {2020}, url = {https://arxiv.org/abs/2012.15740}, eprinttype = {arXiv}, eprint = {2012.15740}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-15740.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NassiMNSE20, author = {Ben Nassi and Yair Meidan and Dudi Nassi and Asaf Shabtai and Yuval Elovici}, title = {Botnet {IND:} About Botnets of Botless IoT Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1518}, year = {2020}, url = {https://eprint.iacr.org/2020/1518}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NassiMNSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HazanS19, author = {Itay Hazan and Asaf Shabtai}, title = {Improving Grid-Based Location Prediction Algorithms by Speed and Direction Based Boosting}, journal = {{IEEE} Access}, volume = {7}, pages = {21211--21219}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2894809}, doi = {10.1109/ACCESS.2019.2894809}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HazanS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/SchweitzerSHMS19, author = {Nadav Schweitzer and Ariel Stulman and Tirza Hirst and Roy David Margalit and Asaf Shabtai}, title = {Network bottlenecks in {OLSR} based ad-hoc networks}, journal = {Ad Hoc Networks}, volume = {88}, pages = {36--54}, year = {2019}, url = {https://doi.org/10.1016/j.adhoc.2018.12.002}, doi = {10.1016/J.ADHOC.2018.12.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/SchweitzerSHMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NadlerAS19, author = {Asaf Nadler and Avi Aminov and Asaf Shabtai}, title = {Detection of malicious and low throughput data exfiltration over the {DNS} protocol}, journal = {Comput. Secur.}, volume = {80}, pages = {36--53}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.09.006}, doi = {10.1016/J.COSE.2018.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NadlerAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/IsraeliRS19, author = {Abraham Israeli and Lior Rokach and Asaf Shabtai}, title = {Constraint learning based gradient boosting trees}, journal = {Expert Syst. Appl.}, volume = {128}, pages = {287--300}, year = {2019}, url = {https://doi.org/10.1016/j.eswa.2019.03.011}, doi = {10.1016/J.ESWA.2019.03.011}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/IsraeliRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/LeibaBYNKS19, author = {Oded Leiba and Ron Bitton and Yechiav Yitzchak and Asaf Nadler and Davidoz Kashi and Asaf Shabtai}, title = {IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution}, journal = {Pervasive Mob. Comput.}, volume = {58}, year = {2019}, url = {https://doi.org/10.1016/j.pmcj.2019.04.010}, doi = {10.1016/J.PMCJ.2019.04.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/LeibaBYNKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MirskyKES19, author = {Yisroel Mirsky and Naor Kalbo and Yuval Elovici and Asaf Shabtai}, title = {Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {6}, pages = {1638--1653}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2883177}, doi = {10.1109/TIFS.2018.2883177}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MirskyKES19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/SiboniSMBMBSE19, author = {Shachar Siboni and Vinay Sachidananda and Yair Meidan and Michael Bohadana and Yael Mathov and Suhas Bhairav and Asaf Shabtai and Yuval Elovici}, title = {Security Testbed for Internet-of-Things Devices}, journal = {{IEEE} Trans. Reliab.}, volume = {68}, number = {1}, pages = {23--44}, year = {2019}, url = {https://doi.org/10.1109/TR.2018.2864536}, doi = {10.1109/TR.2018.2864536}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/SiboniSMBMBSE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CohenGES19, author = {Shai Cohen and Tomer Gluck and Yuval Elovici and Asaf Shabtai}, editor = {Lorenzo Cavallaro and Johannes Kinder and Thorsten Holz}, title = {Security Analysis of Radar Systems}, booktitle = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019}, pages = {3--14}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338499.3357363}, doi = {10.1145/3338499.3357363}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CohenGES19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/InokuchiOKYSBES19, author = {Masaki Inokuchi and Yoshinobu Ohta and Shunichi Kinoshita and Tomohiko Yagyu and Orly Stan and Ron Bitton and Yuval Elovici and Asaf Shabtai}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Design Procedure of Knowledge Base for Practical Attack Graph Generation}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {594--601}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329853}, doi = {10.1145/3321705.3329853}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/InokuchiOKYSBES19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AfrozBCES19, author = {Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {AISec'19: 12th {ACM} Workshop on Artificial Intelligence and Security}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2707--2708}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3353556}, doi = {10.1145/3319535.3353556}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AfrozBCES19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TambeASOTSE19, author = {Amit Tambe and Yan Lin Aung and Ragav Sridharan and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {85--96}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300024}, doi = {10.1145/3292006.3300024}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/TambeASOTSE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SivanBS19, author = {Nir Sivan and Ron Bitton and Asaf Shabtai}, title = {Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {243--260}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/sivan}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/SivanBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/SiboniGSE19, author = {Shachar Siboni and Chanan Glezer and Asaf Shabtai and Yuval Elovici}, editor = {Guojun Wang and Jun Feng and Md. Zakirul Alam Bhuiyan and Rongxing Lu}, title = {A Weighted Risk Score Model for IoT Devices}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11637}, pages = {20--34}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24900-7\_2}, doi = {10.1007/978-3-030-24900-7\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/SiboniGSE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AgmonSP19, author = {Noga Agmon and Asaf Shabtai and Rami Puzis}, title = {Deployment optimization of IoT devices through attack graph analysis}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {192--202}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323411}, doi = {10.1145/3317549.3323411}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AgmonSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019aisec, editor = {Lorenzo Cavallaro and Johannes Kinder and Sadia Afroz and Battista Biggio and Nicholas Carlini and Yuval Elovici and Asaf Shabtai}, title = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338501}, doi = {10.1145/3338501}, isbn = {978-1-4503-6833-9}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2019aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018issa, editor = {Brahim Hamid and Barbara Gallina and Asaf Shabtai and Yuval Elovici and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Security and Safety Interplay of Intelligent Software Systems - {ESORICS} 2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11552}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16874-2}, doi = {10.1007/978-3-030-16874-2}, isbn = {978-3-030-16873-5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2018issa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-09963, author = {Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach}, title = {Defense Methods Against Adversarial Examples for Recurrent Neural Networks}, journal = {CoRR}, volume = {abs/1901.09963}, year = {2019}, url = {http://arxiv.org/abs/1901.09963}, eprinttype = {arXiv}, eprint = {1901.09963}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-09963.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-08909, author = {Lior Sidi and Asaf Nadler and Asaf Shabtai}, title = {MaskDGA: {A} Black-box Evasion Technique Against {DGA} Classifiers and Adversarial Defenses}, journal = {CoRR}, volume = {abs/1902.08909}, year = {2019}, url = {http://arxiv.org/abs/1902.08909}, eprinttype = {arXiv}, eprint = {1902.08909}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-08909.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-05155, author = {Ben Nassi and Asaf Shabtai and Ryusuke Masuoka and Yuval Elovici}, title = {SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps}, journal = {CoRR}, volume = {abs/1903.05155}, year = {2019}, url = {http://arxiv.org/abs/1903.05155}, eprinttype = {arXiv}, eprint = {1903.05155}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-05155.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-05853, author = {Noga Agmon and Asaf Shabtai and Rami Puzis}, title = {Deployment Optimization of IoT Devices through Attack Graph Analysis}, journal = {CoRR}, volume = {abs/1904.05853}, year = {2019}, url = {http://arxiv.org/abs/1904.05853}, eprinttype = {arXiv}, eprint = {1904.05853}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-05853.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-10517, author = {Yoni Birman and Shaked Hindi and Gilad Katz and Asaf Shabtai}, title = {{ASPIRE:} Automated Security Policy Implementation Using Reinforcement Learning}, journal = {CoRR}, volume = {abs/1905.10517}, year = {2019}, url = {http://arxiv.org/abs/1905.10517}, eprinttype = {arXiv}, eprint = {1905.10517}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-10517.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-13430, author = {Yair Meidan and Vinay Sachidananda and Yuval Elovici and Asaf Shabtai}, title = {Privacy-Preserving Detection of IoT Devices Connected Behind a {NAT} in a Smart Home Setup}, journal = {CoRR}, volume = {abs/1905.13430}, year = {2019}, url = {http://arxiv.org/abs/1905.13430}, eprinttype = {arXiv}, eprint = {1905.13430}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-13430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-07921, author = {Sefi Akerman and Edan Habler and Asaf Shabtai}, title = {VizADS-B: Analyzing Sequences of {ADS-B} Images Using Explainable Convolutional {LSTM} Encoder-Decoder to Detect Cyber Attacks}, journal = {CoRR}, volume = {abs/1906.07921}, year = {2019}, url = {http://arxiv.org/abs/1906.07921}, eprinttype = {arXiv}, eprint = {1906.07921}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-07921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-09786, author = {Orly Stan and Ron Bitton and Michal Ezrets and Moran Dadon and Masaki Inokuchi and Yoshinobu Ohta and Yoshiyuki Yamada and Tomohiko Yagyu and Yuval Elovici and Asaf Shabtai}, title = {Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern {IT} Networks}, journal = {CoRR}, volume = {abs/1906.09786}, year = {2019}, url = {http://arxiv.org/abs/1906.09786}, eprinttype = {arXiv}, eprint = {1906.09786}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-09786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10229, author = {Ron Bitton and Kobi Boymgold and Rami Puzis and Asaf Shabtai}, title = {Evaluating the Information Security Awareness of Smartphone Users}, journal = {CoRR}, volume = {abs/1906.10229}, year = {2019}, url = {http://arxiv.org/abs/1906.10229}, eprinttype = {arXiv}, eprint = {1906.10229}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10922, author = {Yael Mathov and Noga Agmon and Asaf Shabtai and Rami Puzis and Nils Ole Tippenhauer and Yuval Elovici}, title = {Challenges for Security Assessment of Enterprises in the IoT Era}, journal = {CoRR}, volume = {abs/1906.10922}, year = {2019}, url = {http://arxiv.org/abs/1906.10922}, eprinttype = {arXiv}, eprint = {1906.10922}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10922.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10943, author = {Orly Stan and Ron Bitton and Michal Ezrets and Moran Dadon and Masaki Inokuchi and Yoshinobu Ohta and Tomohiko Yagyu and Yuval Elovici and Asaf Shabtai}, title = {Heuristic Approach Towards Countermeasure Selection using Attack Graphs}, journal = {CoRR}, volume = {abs/1906.10943}, year = {2019}, url = {http://arxiv.org/abs/1906.10943}, eprinttype = {arXiv}, eprint = {1906.10943}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10943.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01216, author = {Moshe Kravchik and Asaf Shabtai}, title = {Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks}, journal = {CoRR}, volume = {abs/1907.01216}, year = {2019}, url = {http://arxiv.org/abs/1907.01216}, eprinttype = {arXiv}, eprint = {1907.01216}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01216.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-06921, author = {Sofia Belikovetsky and Oded Leiba and Asaf Shabtai and Yuval Elovici}, title = {3D Marketplace: Distributed Attestation of 3D Designs on Blockchain}, journal = {CoRR}, volume = {abs/1908.06921}, year = {2019}, url = {http://arxiv.org/abs/1908.06921}, eprinttype = {arXiv}, eprint = {1908.06921}, timestamp = {Mon, 26 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-06921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-03418, author = {Gil Fidel and Ron Bitton and Asaf Shabtai}, title = {When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using {SHAP} Signatures}, journal = {CoRR}, volume = {abs/1909.03418}, year = {2019}, url = {http://arxiv.org/abs/1909.03418}, eprinttype = {arXiv}, eprint = {1909.03418}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-03418.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-10749, author = {Naor Kalbo and Yisroel Mirsky and Asaf Shabtai and Yuval Elovici}, title = {The Security of IP-based Video Surveillance Systems}, journal = {CoRR}, volume = {abs/1910.10749}, year = {2019}, url = {http://arxiv.org/abs/1910.10749}, eprinttype = {arXiv}, eprint = {1910.10749}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-10749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BittonFSPRS18, author = {Ron Bitton and Andrey Finkelshtein and Lior Sidi and Rami Puzis and Lior Rokach and Asaf Shabtai}, title = {Taxonomy of mobile users' security awareness}, journal = {Comput. Secur.}, volume = {73}, pages = {266--293}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.015}, doi = {10.1016/J.COSE.2017.10.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BittonFSPRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HablerS18, author = {Edan Habler and Asaf Shabtai}, title = {Using {LSTM} encoder-decoder algorithm for detecting anomalous {ADS-B} messages}, journal = {Comput. Secur.}, volume = {78}, pages = {155--173}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.004}, doi = {10.1016/J.COSE.2018.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HablerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/GrolmanFPSCKR18, author = {Edita Grolman and Andrey Finkelshtein and Rami Puzis and Asaf Shabtai and Gershon Celniker and Ziv Katzir and Liron Rosenfeld}, title = {Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis}, journal = {{IEEE} Intell. Syst.}, volume = {33}, number = {2}, pages = {40--53}, year = {2018}, url = {https://doi.org/10.1109/MIS.2018.111145120}, doi = {10.1109/MIS.2018.111145120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/expert/GrolmanFPSCKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/MeidanBMMSBE18, author = {Yair Meidan and Michael Bohadana and Yael Mathov and Yisroel Mirsky and Asaf Shabtai and Dominik Breitenbacher and Yuval Elovici}, title = {N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders}, journal = {{IEEE} Pervasive Comput.}, volume = {17}, number = {3}, pages = {12--22}, year = {2018}, url = {https://doi.org/10.1109/MPRV.2018.03367731}, doi = {10.1109/MPRV.2018.03367731}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/MeidanBMMSBE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/KatzCS18, author = {Gilad Katz and Cornelia Caragea and Asaf Shabtai}, title = {Vertical Ensemble Co-Training for Text Classification}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {9}, number = {2}, pages = {21:1--21:23}, year = {2018}, url = {https://doi.org/10.1145/3137114}, doi = {10.1145/3137114}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/KatzCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/ParadiseCSP18, author = {Abigail Paradise and Dvir Cohen and Asaf Shabtai and Rami Puzis}, editor = {Ulrik Brandes and Chandan Reddy and Andrea Tagarelli}, title = {ProfileGen: Generation of Automatic and Realistic Artificial Profiles}, booktitle = {{IEEE/ACM} 2018 International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2018, Barcelona, Spain, August 28-31, 2018}, pages = {581--583}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ASONAM.2018.8508242}, doi = {10.1109/ASONAM.2018.8508242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/ParadiseCSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KravchikS18, author = {Moshe Kravchik and Asaf Shabtai}, editor = {David Lie and Mohammad Mannan}, title = {Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks}, booktitle = {Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {72--83}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264888.3264896}, doi = {10.1145/3264888.3264896}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KravchikS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AfrozBEFS18, author = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {11th International Workshop on Artificial Intelligence and Security (AISec 2018)}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2166--2167}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243872}, doi = {10.1145/3243734.3243872}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AfrozBEFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shabtai18, author = {Asaf Shabtai}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Session details: {AI} for Detecting Software Vulnerabilities}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285950}, doi = {10.1145/3285950}, timestamp = {Tue, 07 Mar 2023 16:37:45 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Shabtai18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shabtai18a, author = {Asaf Shabtai}, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Session details: {AI} for Detecting Attacks}, booktitle = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3285951}, doi = {10.1145/3285951}, timestamp = {Wed, 09 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Shabtai18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/StanCES18, author = {Orly Stan and Adi Cohen and Yuval Elovici and Asaf Shabtai}, editor = {Brahim Hamid and Barbara Gallina and Asaf Shabtai and Yuval Elovici and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On the Security of {MIL-STD-1553} Communication Bus}, booktitle = {Security and Safety Interplay of Intelligent Software Systems - {ESORICS} 2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11552}, pages = {153--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-16874-2\_11}, doi = {10.1007/978-3-030-16874-2\_11}, timestamp = {Fri, 27 Dec 2019 21:19:58 +0100}, biburl = {https://dblp.org/rec/conf/esorics/StanCES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BittonGSIOYYES18, author = {Ron Bitton and Tomer Gluck and Orly Stan and Masaki Inokuchi and Yoshinobu Ohta and Yoshiyuki Yamada and Tomohiko Yagyu and Yuval Elovici and Asaf Shabtai}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Deriving a Cost-Effective Digital Twin of an {ICS} to Facilitate Security Evaluation}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {533--554}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_26}, doi = {10.1007/978-3-319-99073-6\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BittonGSIOYYES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/LeibaYBNS18, author = {Oded Leiba and Yechiav Yitzchak and Ron Bitton and Asaf Nadler and Asaf Shabtai}, title = {Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2018, London, United Kingdom, April 23-27, 2018}, pages = {29--39}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSPW.2018.00011}, doi = {10.1109/EUROSPW.2018.00011}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/LeibaYBNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MirskyDES18, author = {Yisroel Mirsky and Tomer Doitshman and Yuval Elovici and Asaf Shabtai}, title = {Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03A-3\_Mirsky\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/MirskyDES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RosenbergSRE18, author = {Ishai Rosenberg and Asaf Shabtai and Lior Rokach and Yuval Elovici}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Generic Black-Box End-to-End Attack Against State of the Art {API} Call Based Malware Classifiers}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {490--510}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_23}, doi = {10.1007/978-3-030-00470-5\_23}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/RosenbergSRE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SiboniSE18, author = {Shachar Siboni and Asaf Shabtai and Yuval Elovici}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Leaking data from enterprise networks using a compromised smartwatch device}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {741--750}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167214}, doi = {10.1145/3167132.3167214}, timestamp = {Wed, 25 Sep 2019 18:12:13 +0200}, biburl = {https://dblp.org/rec/conf/sac/SiboniSE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2018aisec, editor = {Sadia Afroz and Battista Biggio and Yuval Elovici and David Freeman and Asaf Shabtai}, title = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3270101}, isbn = {978-1-4503-6004-3}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2018aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/snam/ParadisePS18, author = {Abigail Paradise and Rami Puzis and Asaf Shabtai}, editor = {Reda Alhajj and Jon G. Rokne}, title = {Socialbots}, booktitle = {Encyclopedia of Social Network Analysis and Mining, 2nd Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4939-7131-2\_110212}, doi = {10.1007/978-1-4939-7131-2\_110212}, timestamp = {Wed, 04 May 2022 13:01:02 +0200}, biburl = {https://dblp.org/rec/reference/snam/ParadisePS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/MeidanBMMBSS18, author = {Yair Meidan and Michael Bohadana and Yael Mathov and Yisroel Mirsky and Dominik Breitenbacher and Asaf and Asaf Shabtai}, title = {detection{\_}of{\_}IoT{\_}botnet{\_}attacks{\_}N{\_}BaIoT}, publisher = {{UCI} Machine Learning Repository}, year = {2018}, month = mar, howpublished = {\url{https://doi.org/10.24432/C5RC8J}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.24432/C5RC8J}, doi = {10.24432/C5RC8J}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/MeidanBMMBSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-09089, author = {Yisroel Mirsky and Tomer Doitshman and Yuval Elovici and Asaf Shabtai}, title = {Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection}, journal = {CoRR}, volume = {abs/1802.09089}, year = {2018}, url = {http://arxiv.org/abs/1802.09089}, eprinttype = {arXiv}, eprint = {1802.09089}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-09089.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-02560, author = {Yisroel Mirsky and Naor Kalbo and Yuval Elovici and Asaf Shabtai}, title = {Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs}, journal = {CoRR}, volume = {abs/1803.02560}, year = {2018}, url = {http://arxiv.org/abs/1803.02560}, eprinttype = {arXiv}, eprint = {1803.02560}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-02560.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-08778, author = {Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach}, title = {Low Resource Black-Box End-to-End Attack Against State of the Art {API} Call Based Malware Classifiers}, journal = {CoRR}, volume = {abs/1804.08778}, year = {2018}, url = {http://arxiv.org/abs/1804.08778}, eprinttype = {arXiv}, eprint = {1804.08778}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-08778.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-03409, author = {Yair Meidan and Michael Bohadana and Yael Mathov and Yisroel Mirsky and Dominik Breitenbacher and Asaf Shabtai and Yuval Elovici}, title = {N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders}, journal = {CoRR}, volume = {abs/1805.03409}, year = {2018}, url = {http://arxiv.org/abs/1805.03409}, eprinttype = {arXiv}, eprint = {1805.03409}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-03409.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-04282, author = {Oded Leiba and Yechiav Yitzchak and Ron Bitton and Asaf Nadler and Asaf Shabtai}, title = {Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution}, journal = {CoRR}, volume = {abs/1805.04282}, year = {2018}, url = {http://arxiv.org/abs/1805.04282}, eprinttype = {arXiv}, eprint = {1805.04282}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-04282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-04850, author = {Omer Shwartz and Amir Cohen and Asaf Shabtai and Yossi Oren}, title = {Shattered Trust: When Replacement Smartphone Components Attack}, journal = {CoRR}, volume = {abs/1805.04850}, year = {2018}, url = {http://arxiv.org/abs/1805.04850}, eprinttype = {arXiv}, eprint = {1805.04850}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-04850.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-08110, author = {Moshe Kravchik and Asaf Shabtai}, title = {Anomaly detection; Industrial control systems; convolutional neural networks}, journal = {CoRR}, volume = {abs/1806.08110}, year = {2018}, url = {http://arxiv.org/abs/1806.08110}, eprinttype = {arXiv}, eprint = {1806.08110}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-08110.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-00125, author = {Abigail Paradise and Dvir Cohen and Asaf Shabtai and Rami Puzis}, title = {Generation of Automatic and Realistic Artificial Profiles}, journal = {CoRR}, volume = {abs/1807.00125}, year = {2018}, url = {http://arxiv.org/abs/1807.00125}, eprinttype = {arXiv}, eprint = {1807.00125}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-00125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-02131, author = {Ben Nassi and Moshe Sror and Ido Lavi and Yair Meidan and Asaf Shabtai and Yuval Elovici}, title = {Piping Botnet - Turning Green Technology into a Water Disaster}, journal = {CoRR}, volume = {abs/1808.02131}, year = {2018}, url = {http://arxiv.org/abs/1808.02131}, eprinttype = {arXiv}, eprint = {1808.02131}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-02131.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-05221, author = {Yotam Intrator and Gilad Katz and Asaf Shabtai}, title = {{MDGAN:} Boosting Anomaly Detection Using Multi-Discriminator Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/1810.05221}, year = {2018}, url = {http://arxiv.org/abs/1810.05221}, eprinttype = {arXiv}, eprint = {1810.05221}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-05221.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-04829, author = {Nir Sivan and Ron Bitton and Asaf Shabtai}, title = {Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices}, journal = {CoRR}, volume = {abs/1812.04829}, year = {2018}, url = {http://arxiv.org/abs/1812.04829}, eprinttype = {arXiv}, eprint = {1812.04829}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-04829.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/OfekRSS17, author = {Nir Ofek and Lior Rokach and Roni Stern and Asaf Shabtai}, title = {Fast-CBUS: {A} fast clustering-based undersampling method for addressing the class imbalance problem}, journal = {Neurocomputing}, volume = {243}, pages = {88--102}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2017.03.011}, doi = {10.1016/J.NEUCOM.2017.03.011}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/OfekRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jasis/Greenstein-Messica17, author = {Asnat Greenstein{-}Messica and Lior Rokach and Asaf Shabtai}, title = {Personal-discount sensitivity prediction for mobile coupon conversion optimization}, journal = {J. Assoc. Inf. Sci. Technol.}, volume = {68}, number = {8}, pages = {1940--1952}, year = {2017}, url = {https://doi.org/10.1002/asi.23838}, doi = {10.1002/ASI.23838}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jasis/Greenstein-Messica17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/MirskySSER17, author = {Yisroel Mirsky and Asaf Shabtai and Bracha Shapira and Yuval Elovici and Lior Rokach}, title = {Anomaly detection for smartphone data streams}, journal = {Pervasive Mob. Comput.}, volume = {35}, pages = {83--107}, year = {2017}, url = {https://doi.org/10.1016/j.pmcj.2016.07.006}, doi = {10.1016/J.PMCJ.2016.07.006}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/MirskySSER17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/HazanS17, author = {Itay Hazan and Asaf Shabtai}, title = {Dynamic radius and confidence prediction in grid-based location prediction algorithms}, journal = {Pervasive Mob. Comput.}, volume = {42}, pages = {265--284}, year = {2017}, url = {https://doi.org/10.1016/j.pmcj.2017.10.007}, doi = {10.1016/J.PMCJ.2017.10.007}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/HazanS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ParadiseSPEERP17, author = {Abigail Paradise and Asaf Shabtai and Rami Puzis and Aviad Elyashar and Yuval Elovici and Mehran Roshandel and Christoph Peylo}, title = {Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {4}, number = {3}, pages = {65--79}, year = {2017}, url = {https://doi.org/10.1109/TCSS.2017.2719705}, doi = {10.1109/TCSS.2017.2719705}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/ParadiseSPEERP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/SchweitzerSMS17, author = {Nadav Schweitzer and Ariel Stulman and Roy David Margalit and Asaf Shabtai}, title = {Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {16}, number = {8}, pages = {2174--2183}, year = {2017}, url = {https://doi.org/10.1109/TMC.2016.2622707}, doi = {10.1109/TMC.2016.2622707}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/SchweitzerSMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SachidanandaSST17, author = {Vinay Sachidananda and Shachar Siboni and Asaf Shabtai and Jinghui Toh and Suhas Bhairav and Yuval Elovici}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Let the Cat Out of the Bag: {A} Holistic Approach Towards Security Analysis of the Internet of Things}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {3--10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055245.3055251}, doi = {10.1145/3055245.3055251}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SachidanandaSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuarnizoTBOTSE17, author = {Juan David Guarnizo and Amit Tambe and Suman Sankar Bhunia and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, editor = {Jianying Zhou and Ernesto Damiani}, title = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {57--68}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055186.3055192}, doi = {10.1145/3055186.3055192}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuarnizoTBOTSE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ShwartzSSO17, author = {Omer Shwartz and Guy Shitrit and Asaf Shabtai and Yossi Oren}, title = {From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017}, pages = {94--98}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSPW.2017.57}, doi = {10.1109/EUROSPW.2017.57}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ShwartzSSO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GluckPOS17, author = {Tomer Gluck and Rami Puzis and Yossi Oren and Asaf Shabtai}, title = {The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017}, pages = {99--103}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSPW.2017.58}, doi = {10.1109/EUROSPW.2017.58}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/GluckPOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/BitonFESSTK17, author = {Ron Biton and Clint Feher and Yuval Elovici and Asaf Shabtai and Gaby Shugol and Raz Tikochinski and Shachar Kur}, title = {A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems}, booktitle = {18th {IEEE} International Symposium on High Assurance Systems Engineering, {HASE} 2017, Singapore, January 12-14, 2017}, pages = {153--156}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HASE.2017.38}, doi = {10.1109/HASE.2017.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/BitonFESSTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MeidanBSGOTE17, author = {Yair Meidan and Michael Bohadana and Asaf Shabtai and Juan David Guarnizo and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Yuval Elovici}, editor = {Ahmed Seffah and Birgit Penzenstadler and Carina Alves and Xin Peng}, title = {ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis}, booktitle = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech, Morocco, April 3-7, 2017}, pages = {506--509}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3019612.3019878}, doi = {10.1145/3019612.3019878}, timestamp = {Wed, 01 Feb 2023 17:58:48 +0100}, biburl = {https://dblp.org/rec/conf/sac/MeidanBSGOTE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/ShwartzCSO17, author = {Omer Shwartz and Amir Cohen and Asaf Shabtai and Yossi Oren}, editor = {William Enck and Collin Mulliner}, title = {Shattered Trust: When Replacement Smartphone Components Attack}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/shwartz}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/ShwartzCSO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FinkelsteinBPS17, author = {Andrey Finkelstein and Ron Biton and Rami Puzis and Asaf Shabtai}, title = {Classification of Smartphone Users Using Internet Traffic}, journal = {CoRR}, volume = {abs/1701.00220}, year = {2017}, url = {http://arxiv.org/abs/1701.00220}, eprinttype = {arXiv}, eprint = {1701.00220}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FinkelsteinBPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GuarnizoTBOTSE17, author = {Juan Guarnizo and Amit Tambe and Suman Sankar Bhunia and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, title = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots}, journal = {CoRR}, volume = {abs/1701.02446}, year = {2017}, url = {http://arxiv.org/abs/1701.02446}, eprinttype = {arXiv}, eprint = {1701.02446}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GuarnizoTBOTSE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/StanESSTK17, author = {Orly Stan and Yuval Elovici and Asaf Shabtai and Gaby Shugol and Raz Tikochinski and Shachar Kur}, title = {Protecting Military Avionics Platforms from Attacks on {MIL-STD-1553} Communication Bus}, journal = {CoRR}, volume = {abs/1707.05032}, year = {2017}, url = {http://arxiv.org/abs/1707.05032}, eprinttype = {arXiv}, eprint = {1707.05032}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/StanESSTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RosenbergSRE17, author = {Ishai Rosenberg and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {Generic Black-Box End-to-End Attack against RNNs and Other {API} Calls Based Malware Classifiers}, journal = {CoRR}, volume = {abs/1707.05970}, year = {2017}, url = {http://arxiv.org/abs/1707.05970}, eprinttype = {arXiv}, eprint = {1707.05970}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RosenbergSRE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-04647, author = {Yair Meidan and Michael Bohadana and Asaf Shabtai and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Juan David Guarnizo and Yuval Elovici}, title = {Detection of Unauthorized IoT Devices Using Machine Learning Techniques}, journal = {CoRR}, volume = {abs/1709.04647}, year = {2017}, url = {http://arxiv.org/abs/1709.04647}, eprinttype = {arXiv}, eprint = {1709.04647}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-04647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-08395, author = {Asaf Nadler and Avi Aminov and Asaf Shabtai}, title = {Detection of Malicious and Low Throughput Data Exfiltration Over the {DNS} Protocol}, journal = {CoRR}, volume = {abs/1709.08395}, year = {2017}, url = {http://arxiv.org/abs/1709.08395}, eprinttype = {arXiv}, eprint = {1709.08395}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-08395.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-10192, author = {Edan Habler and Asaf Shabtai}, title = {Using {LSTM} Encoder-Decoder Algorithm for Detecting Anomalous {ADS-B} Messages}, journal = {CoRR}, volume = {abs/1711.10192}, year = {2017}, url = {http://arxiv.org/abs/1711.10192}, eprinttype = {arXiv}, eprint = {1711.10192}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-10192.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cogcom/OfekPRCHS16, author = {Nir Ofek and Soujanya Poria and Lior Rokach and Erik Cambria and Amir Hussain and Asaf Shabtai}, title = {Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis}, journal = {Cogn. Comput.}, volume = {8}, number = {3}, pages = {467--477}, year = {2016}, url = {https://doi.org/10.1007/s12559-015-9375-3}, doi = {10.1007/S12559-015-9375-3}, timestamp = {Tue, 25 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cogcom/OfekPRCHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/NissimCMSEBE16, author = {Nir Nissim and Aviad Cohen and Robert Moskovitch and Asaf Shabtai and Matan Edri and Oren Bar{-}Ad and Yuval Elovici}, title = {Keeping pace with the creation of new malicious {PDF} files using an active-learning based detection framework}, journal = {Secur. Informatics}, volume = {5}, number = {1}, pages = {1}, year = {2016}, url = {https://doi.org/10.1186/s13388-016-0026-3}, doi = {10.1186/S13388-016-0026-3}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/secinf/NissimCMSEBE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShabtaiBRGES16, author = {Asaf Shabtai and Maya Bercovitch and Lior Rokach and Ya'akov (Kobi) Gal and Yuval Elovici and Erez Shmueli}, title = {Behavioral Study of Users When Interacting with Active Honeytokens}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {3}, pages = {9:1--9:21}, year = {2016}, url = {https://doi.org/10.1145/2854152}, doi = {10.1145/2854152}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShabtaiBRGES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/SchweitzerSSM16, author = {Nadav Schweitzer and Ariel Stulman and Asaf Shabtai and Roy David Margalit}, title = {Mitigating Denial of Service Attacks in {OLSR} Protocol Using Fictitious Nodes}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {15}, number = {1}, pages = {163--172}, year = {2016}, url = {https://doi.org/10.1109/TMC.2015.2409877}, doi = {10.1109/TMC.2015.2409877}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/SchweitzerSSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/SiboniSTLE16, author = {Shachar Siboni and Asaf Shabtai and Nils Ole Tippenhauer and Jemin Lee and Yuval Elovici}, title = {Advanced Security Testbed Framework for Wearable IoT Devices}, journal = {{ACM} Trans. Internet Techn.}, volume = {16}, number = {4}, pages = {26:1--26:25}, year = {2016}, url = {https://doi.org/10.1145/2981546}, doi = {10.1145/2981546}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/SiboniSTLE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MirskySRSE16, author = {Yisroel Mirsky and Asaf Shabtai and Lior Rokach and Bracha Shapira and Yuval Elovici}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {SherLock vs Moriarty: {A} Smartphone Dataset for Cybersecurity Research}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {1--12}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996764}, doi = {10.1145/2996758.2996764}, timestamp = {Mon, 26 Jun 2023 20:41:47 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MirskySRSE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SachidanandaTSS16, author = {Vinay Sachidananda and Jinghui Toh and Shachar Siboni and Asaf Shabtai and Yuval Elovici}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{POSTER:} Towards Exposing Internet of Things: {A} Roadmap}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1820--1822}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2989046}, doi = {10.1145/2976749.2989046}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SachidanandaTSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/SchweitzerSS16, author = {Nadav Schweitzer and Ariel Stulman and Asaf Shabtai}, editor = {Albert Y. Zomaya and Geyong Min and Antonio A. F. Loureiro}, title = {Neighbor Contamination to Achieve Complete Bottleneck Control}, booktitle = {Proceedings of the 19th {ACM} International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2016, Malta, November 13-17, 2016}, pages = {247--253}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2988287.2989146}, doi = {10.1145/2988287.2989146}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mswim/SchweitzerSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbp-brims/FinkelshteinPSS16, author = {Andrey Finkelshtein and Rami Puzis and Asaf Shabtai and Bronislav Sidik}, editor = {Kevin S. Xu and David Reitter and Dongwon Lee and Nathaniel Osgood}, title = {Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic}, booktitle = {Social, Cultural, and Behavioral Modeling, 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9708}, pages = {239--249}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39931-7\_23}, doi = {10.1007/978-3-319-39931-7\_23}, timestamp = {Tue, 29 Dec 2020 18:35:21 +0100}, biburl = {https://dblp.org/rec/conf/sbp-brims/FinkelshteinPSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FeherSSP16, author = {Ben Feher and Lior Sidi and Asaf Shabtai and Rami Puzis}, title = {The Security of WebRTC}, journal = {CoRR}, volume = {abs/1601.00184}, year = {2016}, url = {http://arxiv.org/abs/1601.00184}, eprinttype = {arXiv}, eprint = {1601.00184}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FeherSSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SiboniSSE16, author = {Shachar Siboni and Vinay Sachidananda and Asaf Shabtai and Yuval Elovici}, title = {Security Testbed for the Internet of Things}, journal = {CoRR}, volume = {abs/1610.05971}, year = {2016}, url = {http://arxiv.org/abs/1610.05971}, eprinttype = {arXiv}, eprint = {1610.05971}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SiboniSSE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Shabtai16, author = {Asaf Shabtai}, title = {Anomaly Detection Using the Knowledge-based Temporal Abstraction Method}, journal = {CoRR}, volume = {abs/1612.04804}, year = {2016}, url = {http://arxiv.org/abs/1612.04804}, eprinttype = {arXiv}, eprint = {1612.04804}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Shabtai16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/BokobzaPRPSS15, author = {Yasmin Bokobza and Abigail Paradise and Guy Rapaport and Rami Puzis and Bracha Shapira and Asaf Shabtai}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Leak Sinks: The Threat of Targeted Social Eavesdropping}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {375--382}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2808891}, doi = {10.1145/2808797.2808891}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/BokobzaPRPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/ParadiseSP15, author = {Abigail Paradise and Asaf Shabtai and Rami Puzis}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Hunting Organization-Targeted Socialbots}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {537--540}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2809396}, doi = {10.1145/2808797.2809396}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/ParadiseSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/HazanS15, author = {Itay Hazan and Asaf Shabtai}, editor = {Aharon Abadi and Danny Dig and Yael Dubinsky}, title = {Noise Reduction of Mobile Sensors Data in the Prediction of Demographic Attributes}, booktitle = {2nd {ACM} International Conference on Mobile Software Engineering and Systems, MOBILESoft 2015, Florence, Italy, May 16-17, 2015}, pages = {117--120}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MobileSoft.2015.25}, doi = {10.1109/MOBILESOFT.2015.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/HazanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BitonKS15, author = {Ron Biton and Gilad Katz and Asaf Shabtai}, editor = {Aharon Abadi and Danny Dig and Yael Dubinsky}, title = {Sensor-Based Approach for Predicting Departure Time of Smartphone Users}, booktitle = {2nd {ACM} International Conference on Mobile Software Engineering and Systems, MOBILESoft 2015, Florence, Italy, May 16-17, 2015}, pages = {146--147}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MobileSoft.2015.37}, doi = {10.1109/MOBILESOFT.2015.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BitonKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism/LivshitsMPS15, author = {David Livshits and Alexandra Mikityuk and Stefan Pham and Asaf Shabtai}, title = {Towards Security of Native {DRM} Execution in {HTML5}}, booktitle = {2015 {IEEE} International Symposium on Multimedia, {ISM} 2015, Miami, FL, USA, December 14-16, 2015}, pages = {411--416}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ISM.2015.48}, doi = {10.1109/ISM.2015.48}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ism/LivshitsMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MirskyCS15, author = {Yisroel Mirsky and Noam Cohen and Asaf Shabtai}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Up-High to Down-Low: Applying Machine Learning to an Exploit Database}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {184--200}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_13}, doi = {10.1007/978-3-319-27179-8\_13}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MirskyCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MoradS15, author = {Idan Morad and Asaf Shabtai}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Detecting Computers in Cyber Space Maliciously Exploited as {SSH} Proxies}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {201--211}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_14}, doi = {10.1007/978-3-319-27179-8\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MoradS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShabtaiME15, author = {Asaf Shabtai and Dudu Mimran and Yuval Elovici}, title = {Evaluation of Security Solutions for Android Systems}, journal = {CoRR}, volume = {abs/1502.04870}, year = {2015}, url = {http://arxiv.org/abs/1502.04870}, eprinttype = {arXiv}, eprint = {1502.04870}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShabtaiME15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShabtaiTMRSE14, author = {Asaf Shabtai and Lena Tenenboim{-}Chekina and Dudu Mimran and Lior Rokach and Bracha Shapira and Yuval Elovici}, title = {Mobile malware detection through analysis of deviations in application network behavior}, journal = {Comput. Secur.}, volume = {43}, pages = {1--18}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.009}, doi = {10.1016/J.COSE.2014.02.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShabtaiTMRSE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ParadisePS14, author = {Abigail Paradise and Rami Puzis and Asaf Shabtai}, title = {Anti-Reconnaissance Tools: Detecting Targeted Socialbots}, journal = {{IEEE} Internet Comput.}, volume = {18}, number = {5}, pages = {11--19}, year = {2014}, url = {https://doi.org/10.1109/MIC.2014.81}, doi = {10.1109/MIC.2014.81}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ParadisePS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/OfekS14, author = {Nir Ofek and Asaf Shabtai}, title = {Dynamic Latent Expertise Mining in Social Networks}, journal = {{IEEE} Internet Comput.}, volume = {18}, number = {5}, pages = {20--27}, year = {2014}, url = {https://doi.org/10.1109/MIC.2014.83}, doi = {10.1109/MIC.2014.83}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/OfekS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/KatzSRO14, author = {Gilad Katz and Asaf Shabtai and Lior Rokach and Nir Ofek}, title = {ConfDTree: {A} Statistical Method for Improving Decision Trees}, journal = {J. Comput. Sci. Technol.}, volume = {29}, number = {3}, pages = {392--407}, year = {2014}, url = {https://doi.org/10.1007/s11390-014-1438-5}, doi = {10.1007/S11390-014-1438-5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/KatzSRO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VartanianS14, author = {Arik Vartanian and Asaf Shabtai}, title = {TM-Score: {A} Misuseability Weight Measure for Textual Content}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {12}, pages = {2205--2219}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2359370}, doi = {10.1109/TIFS.2014.2359370}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VartanianS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/DrorSRE14, author = {Ma'ayan Dror and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {{OCCT:} {A} One-Class Clustering Tree for Implementing One-to-Many Data Linkage}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {26}, number = {3}, pages = {682--697}, year = {2014}, url = {https://doi.org/10.1109/TKDE.2013.23}, doi = {10.1109/TKDE.2013.23}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/DrorSRE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShabtaiE14, author = {Asaf Shabtai and Yuval Elovici}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Misuseablity Analysis for {IT} Infrastructure}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1496--1498}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662385}, doi = {10.1145/2660267.2662385}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShabtaiE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NissimCMSEBE14, author = {Nir Nissim and Aviad Cohen and Robert Moskovitch and Asaf Shabtai and Mattan Edry and Oren Bar{-}Ad and Yuval Elovici}, title = {{ALPD:} Active Learning Framework for Enhancing the Detection of Malicious {PDF} Files}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {91--98}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.23}, doi = {10.1109/JISIC.2014.23}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/NissimCMSEBE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/KatzSR14, author = {Gilad Katz and Asaf Shabtai and Lior Rokach}, editor = {Andreas Holzinger and Igor Jurisica}, title = {Adapted Features and Instance Selection for Improving Co-training}, booktitle = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics - State-of-the-Art and Future Challenges}, series = {Lecture Notes in Computer Science}, volume = {8401}, pages = {81--100}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43968-5\_5}, doi = {10.1007/978-3-662-43968-5\_5}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/series/lncs/KatzSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jasis/ZilbermanKSE13, author = {Polina Zilberman and Gilad Katz and Asaf Shabtai and Yuval Elovici}, title = {Analyzing group E-mail exchange to detect data leakage}, journal = {J. Assoc. Inf. Sci. Technol.}, volume = {64}, number = {9}, pages = {1780--1790}, year = {2013}, url = {https://doi.org/10.1002/asi.22886}, doi = {10.1002/ASI.22886}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jasis/ZilbermanKSE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkdd/ShabtaiBRE13, author = {Asaf Shabtai and Maya Bercovitch and Lior Rokach and Yuval Elovici}, title = {Optimizing Data Misuse Detection}, journal = {{ACM} Trans. Knowl. Discov. Data}, volume = {8}, number = {3}, pages = {16:1--16:23}, year = {2013}, url = {https://doi.org/10.1145/2611520}, doi = {10.1145/2611520}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkdd/ShabtaiBRE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/ShabtaiMKEVGRE13, author = {Asaf Shabtai and Idan Morad and Eyal Kolman and Ereli Eran and Alex Vaystikh and Eyal Gruss and Lior Rokach and Yuval Elovici}, title = {IP2User - Identifying the Username of an {IP} Address in Network-Related Events}, booktitle = {{IEEE} International Congress on Big Data, BigData Congress 2013, Santa Clara, CA, USA, June 27 2013-July 2, 2013}, pages = {435--436}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/BigData.Congress.2013.73}, doi = {10.1109/BIGDATA.CONGRESS.2013.73}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/bigdata/ShabtaiMKEVGRE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MenahemSL13, author = {Eitan Menahem and Asaf Shabtai and Adi Levhar}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Detecting malware through temporal function-based features}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1379--1382}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512505}, doi = {10.1145/2508859.2512505}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MenahemSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-2028, author = {Yuri Shapira and Bracha Shapira and Asaf Shabtai}, title = {Content-based data leakage detection using extended fingerprinting}, journal = {CoRR}, volume = {abs/1302.2028}, year = {2013}, url = {http://arxiv.org/abs/1302.2028}, eprinttype = {arXiv}, eprint = {1302.2028}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-2028.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/ShabtaiER12, author = {Asaf Shabtai and Yuval Elovici and Lior Rokach}, title = {A Survey of Data Leakage Detection and Prevention Solutions}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-1-4614-2053-8}, doi = {10.1007/978-1-4614-2053-8}, isbn = {978-1-4614-2052-1}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sbcs/ShabtaiER12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/ShabtaiKEGW12, author = {Asaf Shabtai and Uri Kanonov and Yuval Elovici and Chanan Glezer and Yael Weiss}, title = {"Andromaly": a behavioral malware detection framework for android devices}, journal = {J. Intell. Inf. Syst.}, volume = {38}, number = {1}, pages = {161--190}, year = {2012}, url = {https://doi.org/10.1007/s10844-010-0148-x}, doi = {10.1007/S10844-010-0148-X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jiis/ShabtaiKEGW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/ShabtaiSE12, author = {Asaf Shabtai and Yuval Shahar and Yuval Elovici}, title = {A distributed architecture for efficient parallelization and computation of knowledge-based temporal abstractions}, journal = {J. Intell. Inf. Syst.}, volume = {39}, number = {1}, pages = {249--286}, year = {2012}, url = {https://doi.org/10.1007/s10844-011-0190-3}, doi = {10.1007/S10844-011-0190-3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/ShabtaiSE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/ShabtaiMFDE12, author = {Asaf Shabtai and Robert Moskovitch and Clint Feher and Shlomi Dolev and Yuval Elovici}, title = {Detecting unknown malicious code by applying classification techniques on OpCode patterns}, journal = {Secur. Informatics}, volume = {1}, number = {1}, pages = {1}, year = {2012}, url = {https://doi.org/10.1186/2190-8532-1-1}, doi = {10.1186/2190-8532-1-1}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/ShabtaiMFDE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HarelSRE12, author = {Amir Harel and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {M-Score: {A} Misuseability Weight Measure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {3}, pages = {414--428}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.17}, doi = {10.1109/TDSC.2012.17}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HarelSRE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/KatzSRO12, author = {Gilad Katz and Asaf Shabtai and Lior Rokach and Nir Ofek}, editor = {Mohammed Javeed Zaki and Arno Siebes and Jeffrey Xu Yu and Bart Goethals and Geoffrey I. Webb and Xindong Wu}, title = {ConfDTree: Improving Decision Trees Using Confidence Intervals}, booktitle = {12th {IEEE} International Conference on Data Mining, {ICDM} 2012, Brussels, Belgium, December 10-13, 2012}, pages = {339--348}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDM.2012.19}, doi = {10.1109/ICDM.2012.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/KatzSRO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShabtaiPFME11, author = {Asaf Shabtai and Dennis Potashnik and Yuval Fledel and Robert Moskovitch and Yuval Elovici}, title = {Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content}, journal = {Secur. Commun. Networks}, volume = {4}, number = {8}, pages = {947--965}, year = {2011}, url = {https://doi.org/10.1002/sec.229}, doi = {10.1002/SEC.229}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShabtaiPFME11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/ShabtaiME11, author = {Asaf Shabtai and Eitan Menahem and Yuval Elovici}, title = {F-Sign: Automatic, Function-Based Signature Generation for Malware}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {41}, number = {4}, pages = {494--508}, year = {2011}, url = {https://doi.org/10.1109/TSMCC.2010.2068544}, doi = {10.1109/TSMCC.2010.2068544}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/ShabtaiME11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GafnySRE11, author = {Ma'ayan Gafny and Asaf Shabtai and Lior Rokach and Yuval Elovici}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {765--768}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093488}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GafnySRE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZilbermanDKES11, author = {Polina Zilberman and Shlomi Dolev and Gilad Katz and Yuval Elovici and Asaf Shabtai}, title = {Analyzing group communication for preventing data leakage via email}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {37--41}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984047}, doi = {10.1109/ISI.2011.5984047}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZilbermanDKES11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BercovitchRHSRE11, author = {Maya Bercovitch and Meir Renford and Lior Hasson and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {HoneyGen: An automated honeytokens generator}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {131--136}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984063}, doi = {10.1109/ISI.2011.5984063}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/BercovitchRHSRE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HarelSRE11, author = {Amir Harel and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {Dynamic Sensitivity-Based Access Control}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {201--203}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5984080}, doi = {10.1109/ISI.2011.5984080}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HarelSRE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kcap/HarelSRE11, author = {Amir Harel and Asaf Shabtai and Lior Rokach and Yuval Elovici}, editor = {Mark A. Musen and {\'{O}}scar Corcho}, title = {Eliciting domain expert misuseability conceptions}, booktitle = {Proceedings of the 6th International Conference on Knowledge Capture {(K-CAP} 2011), June 26-29, 2011, Banff, Alberta, Canada}, pages = {193--194}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1999676.1999721}, doi = {10.1145/1999676.1999721}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kcap/HarelSRE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShabtaiFKEDG10, author = {Asaf Shabtai and Yuval Fledel and Uri Kanonov and Yuval Elovici and Shlomi Dolev and Chanan Glezer}, title = {Google Android: {A} Comprehensive Security Assessment}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {2}, pages = {35--44}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.2}, doi = {10.1109/MSP.2010.2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ShabtaiFKEDG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShabtaiFE10, author = {Asaf Shabtai and Yuval Fledel and Yuval Elovici}, title = {Securing Android-Powered Mobile Devices Using SELinux}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {3}, pages = {36--44}, year = {2010}, url = {https://doi.org/10.1109/MSP.2009.144}, doi = {10.1109/MSP.2009.144}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ShabtaiFE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ShabtaiKE10, author = {Asaf Shabtai and Uri Kanonov and Yuval Elovici}, title = {Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method}, journal = {J. Syst. Softw.}, volume = {83}, number = {8}, pages = {1524--1537}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2010.03.046}, doi = {10.1016/J.JSS.2010.03.046}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ShabtaiKE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ShabtaiFES10, author = {Asaf Shabtai and Yuval Fledel and Yuval Elovici and Yuval Shahar}, title = {Using the {KBTA} method for inferring computer and network security alerts from time-stamped, raw system metrics}, journal = {J. Comput. Virol.}, volume = {6}, number = {3}, pages = {239--259}, year = {2010}, url = {https://doi.org/10.1007/s11416-009-0125-5}, doi = {10.1007/S11416-009-0125-5}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/ShabtaiFES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GafnySRE10, author = {Ma'ayan Gafny and Asaf Shabtai and Lior Rokach and Yuval Elovici}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Detecting data misuse by applying context-based data linkage}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {3--12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866890}, doi = {10.1145/1866886.1866890}, timestamp = {Thu, 17 Feb 2022 15:07:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GafnySRE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HarelSRE10, author = {Amir Harel and Asaf Shabtai and Lior Rokach and Yuval Elovici}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {M-score: estimating the potential damage of data leakage incident by assigning misuseability weight}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {13--20}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866891}, doi = {10.1145/1866886.1866891}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HarelSRE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShabtaiFE10, author = {Asaf Shabtai and Yuval Fledel and Yuval Elovici}, editor = {Muren Liu and Yuping Wang and Ping Guo}, title = {Automated Static Code Analysis for Classifying Android Applications Using Machine Learning}, booktitle = {2010 International Conference on Computational Intelligence and Security, {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010}, pages = {329--333}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIS.2010.77}, doi = {10.1109/CIS.2010.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShabtaiFE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/Shabtai10, author = {Asaf Shabtai}, editor = {Takahiro Hara and Christian S. Jensen and Vijay Kumar and Sanjay Madria and Demetrios Zeinalipour{-}Yazti}, title = {Malware Detection on Mobile Devices}, booktitle = {Eleventh International Conference on Mobile Data Management, {MDM} 2010, Kanas City, Missouri, USA, 23-26 May 2010}, pages = {289--290}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MDM.2010.28}, doi = {10.1109/MDM.2010.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/Shabtai10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicase/FledelSPE10, author = {Yuval Fledel and Asaf Shabtai and Dennis Potashnik and Yuval Elovici}, editor = {Martin L. Griss and Guang Yang}, title = {Google Android: An Updated Security Review}, booktitle = {Mobile Computing, Applications, and Services - Second International {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {76}, pages = {401--414}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-29336-8\_29}, doi = {10.1007/978-3-642-29336-8\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicase/FledelSPE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobilware/ShabtaiE10, author = {Asaf Shabtai and Yuval Elovici}, editor = {Ying Cai and Thomas Magedanz and Minglu Li and Jinchun Xia and Carlo Giannelli}, title = {Applying Behavioral Detection on Android-Based Devices}, booktitle = {Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30 - July 2, 2010. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {48}, pages = {235--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17758-3\_17}, doi = {10.1007/978-3-642-17758-3\_17}, timestamp = {Fri, 27 Oct 2017 16:28:24 +0200}, biburl = {https://dblp.org/rec/conf/mobilware/ShabtaiE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZilbermanSR10, author = {Polina Zilberman and Asaf Shabtai and Lior Rokach}, editor = {Nadav Aharony and Yaniv Altshuler and Yuval Elovici}, title = {Analyzing Group Communication for Preventing Accidental Data Leakage via Email}, booktitle = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/collsec10/analyzing-group-communication-preventing-accidental-data-leakage-email}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZilbermanSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csda/MenahemSRE09, author = {Eitan Menahem and Asaf Shabtai and Lior Rokach and Yuval Elovici}, title = {Improving malware detection by applying multi-inducer ensemble}, journal = {Comput. Stat. Data Anal.}, volume = {53}, number = {4}, pages = {1483--1494}, year = {2009}, url = {https://doi.org/10.1016/j.csda.2008.10.015}, doi = {10.1016/J.CSDA.2008.10.015}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csda/MenahemSRE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShabtaiMEG09, author = {Asaf Shabtai and Robert Moskovitch and Yuval Elovici and Chanan Glezer}, title = {Detection of malicious code by applying machine learning classifiers on static features: {A} state-of-the-art survey}, journal = {Inf. Secur. Tech. Rep.}, volume = {14}, number = {1}, pages = {16--29}, year = {2009}, url = {https://doi.org/10.1016/j.istr.2009.03.003}, doi = {10.1016/J.ISTR.2009.03.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ShabtaiMEG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShabtaiKE09, author = {Asaf Shabtai and Uri Kanonov and Yuval Elovici}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {357--358}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_23}, doi = {10.1007/978-3-642-04342-0\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShabtaiKE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-5101, author = {Asaf Shabtai and Yuval Fledel and Uri Kanonov and Yuval Elovici and Shlomi Dolev}, title = {Google Android: {A} State-of-the-Art Review of Security Mechanisms}, journal = {CoRR}, volume = {abs/0912.5101}, year = {2009}, url = {http://arxiv.org/abs/0912.5101}, eprinttype = {arXiv}, eprint = {0912.5101}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-5101.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kcap/ShabtaiASE07, author = {Asaf Shabtai and Maor Atlas and Yuval Shahar and Yuval Elovici}, editor = {Derek H. Sleeman and Ken Barker}, title = {Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain}, booktitle = {Proceedings of the 4th International Conference on Knowledge Capture {(K-CAP} 2007), October 28-31, 2007, Whistler, BC, Canada}, pages = {7--14}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1298406.1298410}, doi = {10.1145/1298406.1298410}, timestamp = {Mon, 24 Aug 2020 15:16:10 +0200}, biburl = {https://dblp.org/rec/conf/kcap/ShabtaiASE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ki/EloviciSMTG07, author = {Yuval Elovici and Asaf Shabtai and Robert Moskovitch and Gil Tahan and Chanan Glezer}, editor = {Joachim Hertzberg and Michael Beetz and Roman Englert}, title = {Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic}, booktitle = {{KI} 2007: Advances in Artificial Intelligence, 30th Annual German Conference on AI, {KI} 2007, Osnabr{\"{u}}ck, Germany, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4667}, pages = {44--50}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74565-5\_5}, doi = {10.1007/978-3-540-74565-5\_5}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ki/EloviciSMTG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ShabtaiKSE06, author = {Asaf Shabtai and Denis Klimov and Yuval Shahar and Yuval Elovici}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {An intelligent, interactive tool for exploration and visualization of time-oriented security data}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {15--22}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179580}, doi = {10.1145/1179576.1179580}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ShabtaiKSE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.