BibTeX records: Asaf Shabtai

download as .bib file

@article{DBLP:journals/csur/HablerBS24,
  author       = {Edan Habler and
                  Ron Bitton and
                  Asaf Shabtai},
  title        = {Assessing Aircraft Security: {A} Comprehensive Survey and Methodology
                  for Evaluation},
  journal      = {{ACM} Comput. Surv.},
  volume       = {56},
  number       = {4},
  pages        = {96:1--96:40},
  year         = {2024},
  url          = {https://doi.org/10.1145/3610772},
  doi          = {10.1145/3610772},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/HablerBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/LavieSK24,
  author       = {Orel Lavie and
                  Asaf Shabtai and
                  Gilad Katz},
  title        = {Cost effective transfer of reinforcement learning policies},
  journal      = {Expert Syst. Appl.},
  volume       = {237},
  number       = {Part {A}},
  pages        = {121380},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121380},
  doi          = {10.1016/J.ESWA.2023.121380},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/LavieSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/GiloniGHFFES24,
  author       = {Amit Giloni and
                  Edita Grolman and
                  Tanja Hagemann and
                  Ronald Fromm and
                  Sebastian Fischer and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {{BENN:} Bias Estimation Using a Deep Neural Network},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {117--131},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3172365},
  doi          = {10.1109/TNNLS.2022.3172365},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/GiloniGHFFES24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-09075,
  author       = {Sagiv Antebi and
                  Noam Azulay and
                  Edan Habler and
                  Ben Ganon and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {{GPT} in Sheep's Clothing: The Risk of Customized GPTs},
  journal      = {CoRR},
  volume       = {abs/2401.09075},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.09075},
  doi          = {10.48550/ARXIV.2401.09075},
  eprinttype    = {arXiv},
  eprint       = {2401.09075},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-09075.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-02554,
  author       = {Oryan Yehezkel and
                  Alon Zolfi and
                  Amit Baras and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms
                  in Vision Transformers},
  journal      = {CoRR},
  volume       = {abs/2402.02554},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.02554},
  doi          = {10.48550/ARXIV.2402.02554},
  eprinttype    = {arXiv},
  eprint       = {2402.02554},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-02554.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-08309,
  author       = {Daniel Nahmias and
                  Gal Engelberg and
                  Dan Klein and
                  Asaf Shabtai},
  title        = {Prompted Contextual Vectors for Spear-Phishing Detection},
  journal      = {CoRR},
  volume       = {abs/2402.08309},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.08309},
  doi          = {10.48550/ARXIV.2402.08309},
  eprinttype    = {arXiv},
  eprint       = {2402.08309},
  timestamp    = {Mon, 19 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-08309.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TayouriBSP23,
  author       = {David Tayouri and
                  Nick Baum and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {A Survey of MulVAL Extensions and Their Attack Scenarios Coverage},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {27974--27991},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3257721},
  doi          = {10.1109/ACCESS.2023.3257721},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TayouriBSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MeidanBBAS23,
  author       = {Yair Meidan and
                  Daniel Benatar and
                  Ron Bitton and
                  Dan Avraham and
                  Asaf Shabtai},
  title        = {D-Score: An expert-based method for assessing the detectability of
                  IoT-related cyber-attacks},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103073},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103073},
  doi          = {10.1016/J.COSE.2022.103073},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MeidanBBAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BittonMSMES23,
  author       = {Ron Bitton and
                  Nadav Maman and
                  Inderjeet Singh and
                  Satoru Momiyama and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Evaluating the Cybersecurity Risk of Real-world, Machine Learning
                  Production Systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {9},
  pages        = {183:1--183:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3559104},
  doi          = {10.1145/3559104},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BittonMSMES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MeidanALS23,
  author       = {Yair Meidan and
                  Dan Avraham and
                  Hanan Libhaber and
                  Asaf Shabtai},
  title        = {CADeSH: Collaborative Anomaly Detection for Smart Homes},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {10},
  pages        = {8514--8532},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3194813},
  doi          = {10.1109/JIOT.2022.3194813},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/MeidanALS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KotakHBSE23,
  author       = {Jaidip Kotak and
                  Edan Habler and
                  Oleg Brodt and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Information Security Threats and Working from Home Culture: Taxonomy,
                  Risk Assessment and Solutions},
  journal      = {Sensors},
  volume       = {23},
  number       = {8},
  pages        = {4018},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23084018},
  doi          = {10.3390/S23084018},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KotakHBSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LevySGME23,
  author       = {Efrat Levy and
                  Asaf Shabtai and
                  Bogdan Groza and
                  Pal{-}Stefan Murvay and
                  Yuval Elovici},
  title        = {{CAN-LOC:} Spoofing Detection and Physical Intrusion Localization
                  on an In-Vehicle {CAN} Bus Based on Deep Features of Voltage Signals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4800--4814},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3297444},
  doi          = {10.1109/TIFS.2023.3297444},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LevySGME23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/BerdichGMLSE23,
  author       = {Adriana Berdich and
                  Bogdan Groza and
                  Ren{\'{e}} Mayrhofer and
                  Efrat Levy and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off
                  Characteristics},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {4},
  pages        = {2417--2434},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2021.3119987},
  doi          = {10.1109/TMC.2021.3119987},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/BerdichGMLSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/OfferZSEP23,
  author       = {Adi Offer and
                  Aviram Zilberman and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Rami Puzis},
  editor       = {Francesco Regazzoni and
                  Apostolos P. Fournaris},
  title        = {CDGeB: Cloud Data Geolocation Benchmark},
  booktitle    = {Proceedings of the 2023 on Cloud Computing Security Workshop, {CCSW}
                  2023, Copenhagen, Denmark, 26 November 2023},
  pages        = {69--74},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605763.3625273},
  doi          = {10.1145/3605763.3625273},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/OfferZSEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CohenBSP23,
  author       = {Ofir Cohen and
                  Ron Bitton and
                  Asaf Shabtai and
                  Rami Puzis},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {ConGISATA: {A} Framework for Continuous Gamified Information Security
                  Awareness Training and Assessment},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_22},
  doi          = {10.1007/978-3-031-51479-1\_22},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CohenBSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/KodaZGSME23,
  author       = {Satoru Koda and
                  Alon Zolfi and
                  Edita Grolman and
                  Asaf Shabtai and
                  Ikuya Morikawa and
                  Yuval Elovici},
  title        = {Pros and Cons of Weight Pruning for Out-of-Distribution Detection:
                  An Empirical Survey},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2023, Gold
                  Coast, Australia, June 18-23, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IJCNN54540.2023.10191141},
  doi          = {10.1109/IJCNN54540.2023.10191141},
  timestamp    = {Wed, 09 Aug 2023 16:25:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/KodaZGSME23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MallahES23,
  author       = {Yakov Mallah and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Risk Oriented Resource Allocation in Robotic Swarm},
  booktitle    = {20th Annual International Conference on Privacy, Security and Trust,
                  {PST} 2023, Copenhagen, Denmark, August 21-23, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PST58708.2023.10320163},
  doi          = {10.1109/PST58708.2023.10320163},
  timestamp    = {Thu, 07 Dec 2023 14:16:22 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MallahES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wacv/ShapiraZDBS23,
  author       = {Avishag Shapira and
                  Alon Zolfi and
                  Luca Demetrio and
                  Battista Biggio and
                  Asaf Shabtai},
  title        = {Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep
                  Object Detectors},
  booktitle    = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV}
                  2023, Waikoloa, HI, USA, January 2-7, 2023},
  pages        = {4560--4569},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WACV56688.2023.00455},
  doi          = {10.1109/WACV56688.2023.00455},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wacv/ShapiraZDBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-01021,
  author       = {Yair Meidan and
                  Dan Avraham and
                  Hanan Libhaber and
                  Asaf Shabtai},
  title        = {CADeSH: Collaborative Anomaly Detection for Smart Homes},
  journal      = {CoRR},
  volume       = {abs/2303.01021},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.01021},
  doi          = {10.48550/ARXIV.2303.01021},
  eprinttype    = {arXiv},
  eprint       = {2303.01021},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-01021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-01041,
  author       = {Yair Meidan and
                  Daniel Benatar and
                  Ron Bitton and
                  Dan Avraham and
                  Asaf Shabtai},
  title        = {D-Score: An Expert-Based Method for Assessing the Detectability of
                  IoT-Related Cyber-Attacks},
  journal      = {CoRR},
  volume       = {abs/2303.01041},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.01041},
  doi          = {10.48550/ARXIV.2303.01041},
  eprinttype    = {arXiv},
  eprint       = {2303.01041},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-01041.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-06786,
  author       = {Natan Semyonov and
                  Rami Puzis and
                  Asaf Shabtai and
                  Gilad Katz},
  title        = {ReMark: Receptive Field based Spatial WaterMark Embedding Optimization
                  using Deep Network},
  journal      = {CoRR},
  volume       = {abs/2305.06786},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.06786},
  doi          = {10.48550/ARXIV.2305.06786},
  eprinttype    = {arXiv},
  eprint       = {2305.06786},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-06786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08422,
  author       = {Omer Hofman and
                  Amit Giloni and
                  Yarin Hayun and
                  Ikuya Morikawa and
                  Toshiya Shimizu and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {X-Detect: Explainable Adversarial Patch Detection for Object Detectors
                  in Retail},
  journal      = {CoRR},
  volume       = {abs/2306.08422},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08422},
  doi          = {10.48550/ARXIV.2306.08422},
  eprinttype    = {arXiv},
  eprint       = {2306.08422},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08422.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-02614,
  author       = {Yarin Ozery and
                  Asaf Nadler and
                  Asaf Shabtai},
  title        = {Information-Based Heavy Hitters for Real-Time {DNS} Data Exfiltration
                  Detection and Prevention},
  journal      = {CoRR},
  volume       = {abs/2307.02614},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.02614},
  doi          = {10.48550/ARXIV.2307.02614},
  eprinttype    = {arXiv},
  eprint       = {2307.02614},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-02614.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-03565,
  author       = {David Tayouri and
                  Telem Nachum and
                  Asaf Shabtai},
  title        = {{MIRAGE:} Multi-Binary Image Risk Assessment with Attack Graph Employment},
  journal      = {CoRR},
  volume       = {abs/2311.03565},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.03565},
  doi          = {10.48550/ARXIV.2311.03565},
  eprinttype    = {arXiv},
  eprint       = {2311.03565},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-03565.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-03809,
  author       = {Priyanka Prakash Surve and
                  Oleg Brodt and
                  Mark Yampolskiy and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {SoK: Security Below the {OS} - {A} Security Analysis of {UEFI}},
  journal      = {CoRR},
  volume       = {abs/2311.03809},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.03809},
  doi          = {10.48550/ARXIV.2311.03809},
  eprinttype    = {arXiv},
  eprint       = {2311.03809},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-03809.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-03825,
  author       = {Ryuta Kremer and
                  Prasanna N. Wudali and
                  Satoru Momiyama and
                  Toshinori Araki and
                  Jun Furukawa and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {{IC-SECURE:} Intelligent System for Assisting Security Experts in
                  Generating Playbooks for Automated Incident Response},
  journal      = {CoRR},
  volume       = {abs/2311.03825},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.03825},
  doi          = {10.48550/ARXIV.2311.03825},
  eprinttype    = {arXiv},
  eprint       = {2311.03825},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-03825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-18525,
  author       = {Yizhak Vaisman and
                  Gilad Katz and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Detecting Anomalous Network Communication Patterns Using Graph Convolutional
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2311.18525},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.18525},
  doi          = {10.48550/ARXIV.2311.18525},
  eprinttype    = {arXiv},
  eprint       = {2311.18525},
  timestamp    = {Tue, 05 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-18525.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-01200,
  author       = {Chen Doytshman and
                  Satoru Momiyama and
                  Inderjeet Singh and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {FRAUDability: Estimating Users' Susceptibility to Financial Fraud
                  Using Adversarial Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2312.01200},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.01200},
  doi          = {10.48550/ARXIV.2312.01200},
  eprinttype    = {arXiv},
  eprint       = {2312.01200},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-01200.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-01330,
  author       = {Roy Peled and
                  Eran Aizikovich and
                  Edan Habler and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Evaluating the Security of Satellite Systems},
  journal      = {CoRR},
  volume       = {abs/2312.01330},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.01330},
  doi          = {10.48550/ARXIV.2312.01330},
  eprinttype    = {arXiv},
  eprint       = {2312.01330},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-01330.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-02220,
  author       = {Amit Baras and
                  Alon Zolfi and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {QuantAttack: Exploiting Dynamic Quantization to Attack Vision Transformers},
  journal      = {CoRR},
  volume       = {abs/2312.02220},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.02220},
  doi          = {10.48550/ARXIV.2312.02220},
  eprinttype    = {arXiv},
  eprint       = {2312.02220},
  timestamp    = {Tue, 12 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-02220.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BerdichGLSEM22,
  author       = {Adriana Berdich and
                  Bogdan Groza and
                  Efrat Levy and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Ren{\'{e}} Mayrhofer},
  title        = {Fingerprinting Smartphones Based on Microphone Characteristics From
                  Environment Affected Recordings},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {122399--122413},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3223375},
  doi          = {10.1109/ACCESS.2022.3223375},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/BerdichGLSEM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NadlerBBS22,
  author       = {Asaf Nadler and
                  Ron Bitton and
                  Oleg Brodt and
                  Asaf Shabtai},
  title        = {On the vulnerability of anti-malware solutions to {DNS} attacks},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102687},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102687},
  doi          = {10.1016/J.COSE.2022.102687},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NadlerBBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MathovSSE22,
  author       = {Yael Mathov and
                  Tal Ben Senior and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Stop bugging me! Evading modern-day wiretapping using adversarial
                  perturbations},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102841},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102841},
  doi          = {10.1016/J.COSE.2022.102841},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MathovSSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MimranBKKBLES22,
  author       = {Dudu Mimran and
                  Ron Bitton and
                  Yehonatan Kfir and
                  Eitan Klevansky and
                  Oleg Brodt and
                  Heiko Lehmann and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Security of Open Radio Access Networks},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102890},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102890},
  doi          = {10.1016/J.COSE.2022.102890},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MimranBKKBLES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KravchikDBS22,
  author       = {Moshe Kravchik and
                  Luca Demetrio and
                  Battista Biggio and
                  Asaf Shabtai},
  title        = {Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors
                  in Industrial Control Systems},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102901},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102901},
  doi          = {10.1016/J.COSE.2022.102901},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KravchikDBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/RosenbergSER21,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {Adversarial Machine Learning Attacks and Defense Methods in the Cyber
                  Security Domain},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {5},
  pages        = {108:1--108:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3453158},
  doi          = {10.1145/3453158},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/RosenbergSER21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/GrolmanCFSP22,
  author       = {Edita Grolman and
                  Dvir Cohen and
                  Tatiana Frenklach and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {How and when to stop the co-training process},
  journal      = {Expert Syst. Appl.},
  volume       = {187},
  pages        = {115841},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2021.115841},
  doi          = {10.1016/J.ESWA.2021.115841},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/GrolmanCFSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/BirmanHKS22,
  author       = {Yoni Birman and
                  Shaked Hindi and
                  Gilad Katz and
                  Asaf Shabtai},
  title        = {Cost-effective ensemble models selection using deep reinforcement
                  learning},
  journal      = {Inf. Fusion},
  volume       = {77},
  pages        = {133--148},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.inffus.2021.07.011},
  doi          = {10.1016/J.INFFUS.2021.07.011},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/BirmanHKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/MathovLKSE22,
  author       = {Yael Mathov and
                  Eden Levy and
                  Ziv Katzir and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Not all datasets are born equal: On heterogeneous tabular data and
                  adversarial examples},
  journal      = {Knowl. Based Syst.},
  volume       = {242},
  pages        = {108377},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.knosys.2022.108377},
  doi          = {10.1016/J.KNOSYS.2022.108377},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/MathovLKSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/SolomonMBSRPS22,
  author       = {Adir Solomon and
                  Michael Michaelshvili and
                  Ron Bitton and
                  Bracha Shapira and
                  Lior Rokach and
                  Rami Puzis and
                  Asaf Shabtai},
  title        = {Contextual security awareness: {A} context-based approach for assessing
                  the security awareness of users},
  journal      = {Knowl. Based Syst.},
  volume       = {246},
  pages        = {108709},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.knosys.2022.108709},
  doi          = {10.1016/J.KNOSYS.2022.108709},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/SolomonMBSRPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/CohenLSCES22,
  author       = {Shai Cohen and
                  Efrat Levy and
                  Avi Shaked and
                  Tair Cohen and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks},
  journal      = {Sensors},
  volume       = {22},
  number       = {11},
  pages        = {4259},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22114259},
  doi          = {10.3390/S22114259},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/CohenLSCES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/HablerS22,
  author       = {Edan Habler and
                  Asaf Shabtai},
  title        = {Analyzing Sequences of Airspace States to Detect Anomalous Traffic
                  Conditions},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {58},
  number       = {3},
  pages        = {1843--1857},
  year         = {2022},
  url          = {https://doi.org/10.1109/TAES.2021.3124199},
  doi          = {10.1109/TAES.2021.3124199},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/HablerS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/StanBEDIOYES22,
  author       = {Orly Stan and
                  Ron Bitton and
                  Michal Ezrets and
                  Moran Dadon and
                  Masaki Inokuchi and
                  Yoshinobu Ohta and
                  Tomohiko Yagyu and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Extending Attack Graphs to Represent Cyber-Attacks in Communication
                  Protocols and Modern {IT} Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1936--1954},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3041999},
  doi          = {10.1109/TDSC.2020.3041999},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/StanBEDIOYES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KravchikS22,
  author       = {Moshe Kravchik and
                  Asaf Shabtai},
  title        = {Efficient Cyber Attack Detection in Industrial Control Systems Using
                  Lightweight Neural Networks and {PCA}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2179--2197},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3050101},
  doi          = {10.1109/TDSC.2021.3050101},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KravchikS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SharonBLSE22,
  author       = {Yam Sharon and
                  David Berend and
                  Yang Liu and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {{TANTRA:} Timing-Based Adversarial Network Traffic Reshaping Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3225--3237},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3201377},
  doi          = {10.1109/TIFS.2022.3201377},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SharonBLSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SakaziES22,
  author       = {Shay Sakazi and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Lorenzo Cavallaro and
                  Daniel Gruss and
                  Giancarlo Pellegrino and
                  Giorgio Giacinto},
  title        = {Prioritizing Antivirus Alerts on Internal Enterprise Machines},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 19th International Conference, {DIMVA} 2022, Cagliari, Italy, June
                  29 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13358},
  pages        = {75--95},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09484-2\_5},
  doi          = {10.1007/978-3-031-09484-2\_5},
  timestamp    = {Fri, 01 Jul 2022 15:28:37 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SakaziES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GrozaPAMSE22,
  author       = {Bogdan Groza and
                  Lucian Popa and
                  Tudor Andreica and
                  Pal{-}Stefan Murvay and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {PanoptiCANs - Adversary-Resilient Architectures for Controller Area
                  Networks},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {658--679},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_32},
  doi          = {10.1007/978-3-031-17143-7\_32},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GrozaPAMSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/GiloniGES22,
  author       = {Amit Giloni and
                  Edita Grolman and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {{FEPC:} Fairness Estimation Using Prototypes and Critics for Tabular
                  Data},
  booktitle    = {26th International Conference on Pattern Recognition, {ICPR} 2022,
                  Montreal, QC, Canada, August 21-25, 2022},
  pages        = {4877--4884},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICPR56361.2022.9956582},
  doi          = {10.1109/ICPR56361.2022.9956582},
  timestamp    = {Thu, 01 Dec 2022 13:56:03 +0100},
  biburl       = {https://dblp.org/rec/conf/icpr/GiloniGES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/ZolfiAES22,
  author       = {Alon Zolfi and
                  Shai Avidan and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Massih{-}Reza Amini and
                  St{\'{e}}phane Canu and
                  Asja Fischer and
                  Tias Guns and
                  Petra Kralj Novak and
                  Grigorios Tsoumakas},
  title        = {Adversarial Mask: Real-World Universal Adversarial Attack on Face
                  Recognition Models},
  booktitle    = {Machine Learning and Knowledge Discovery in Databases - European Conference,
                  {ECML} {PKDD} 2022, Grenoble, France, September 19-23, 2022, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13715},
  pages        = {304--320},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26409-2\_19},
  doi          = {10.1007/978-3-031-26409-2\_19},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/ZolfiAES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcomp/TapasB0PSE22,
  author       = {Nachiket Tapas and
                  Sofia Belikovetsky and
                  Francesco Longo and
                  Antonio Puliafito and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {3D Marketplace: Distributed Attestation of 3D Designs on Blockchain},
  booktitle    = {2022 {IEEE} International Conference on Smart Computing, {SMARTCOMP}
                  2022, Helsinki, Finland, June 20-24, 2022},
  pages        = {311--316},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SMARTCOMP55677.2022.00073},
  doi          = {10.1109/SMARTCOMP55677.2022.00073},
  timestamp    = {Tue, 19 Jul 2022 18:42:29 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcomp/TapasB0PSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/um/GrolmanBSEMS22,
  author       = {Edita Grolman and
                  Hodaya Binyamini and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Ikuya Morikawa and
                  Toshiya Shimizu},
  editor       = {Alejandro Bellog{\'{\i}}n and
                  Ludovico Boratto and
                  Olga C. Santos and
                  Liliana Ardissono and
                  Bart P. Knijnenburg},
  title        = {HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms
                  on Twitter},
  booktitle    = {{UMAP} '22: 30th {ACM} Conference on User Modeling, Adaptation and
                  Personalization, Barcelona, Spain, July 4 - 7, 2022},
  pages        = {143--152},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503252.3531309},
  doi          = {10.1145/3503252.3531309},
  timestamp    = {Wed, 28 Dec 2022 14:29:13 +0100},
  biburl       = {https://dblp.org/rec/conf/um/GrolmanBSEMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wacv/CaoBTAL0SE22,
  author       = {Yushi Cao and
                  David Berend and
                  Palina Tolmach and
                  Guy Amit and
                  Moshe Levy and
                  Yang Liu and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Fair and accurate age prediction using distribution aware data curation
                  and augmentation},
  booktitle    = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV}
                  2022, Waikoloa, HI, USA, January 3-8, 2022},
  pages        = {2867--2877},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WACV51458.2022.00292},
  doi          = {10.1109/WACV51458.2022.00292},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wacv/CaoBTAL0SE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/TayouriBSP22,
  author       = {David Tayouri and
                  Nick Baum and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {MulVAL Interaction Rules Mapped to {MITRE} ATT{\&}CK},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = jul,
  howpublished = {\url{https://doi.org/10.21227/bvkn-4119}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/bvkn-4119},
  doi          = {10.21227/BVKN-4119},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/TayouriBSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-06080,
  author       = {Dudu Mimran and
                  Ron Bitton and
                  Yehonatan Kfir and
                  Eitan Klevansky and
                  Oleg Brodt and
                  Heiko Lehmann and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Evaluating the Security of Open Radio Access Networks},
  journal      = {CoRR},
  volume       = {abs/2201.06080},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.06080},
  eprinttype    = {arXiv},
  eprint       = {2201.06080},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-06080.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-06093,
  author       = {Ron Bitton and
                  Dan Avraham and
                  Eitan Klevansky and
                  Dudu Mimran and
                  Oleg Brodt and
                  Heiko Lehmann and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Adversarial Machine Learning Threat Analysis in Open Radio Access
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2201.06093},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.06093},
  eprinttype    = {arXiv},
  eprint       = {2201.06093},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-06093.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-06870,
  author       = {Efrat Levy and
                  Nadav Maman and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {AnoMili: Spoofing Prevention and Explainable Anomaly Detection for
                  the 1553 Military Avionic Bus},
  journal      = {CoRR},
  volume       = {abs/2202.06870},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.06870},
  eprinttype    = {arXiv},
  eprint       = {2202.06870},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-06870.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-13618,
  author       = {Avishag Shapira and
                  Alon Zolfi and
                  Luca Demetrio and
                  Battista Biggio and
                  Asaf Shabtai},
  title        = {Denial-of-Service Attack on Object Detection Model Using Universal
                  Adversarial Perturbation},
  journal      = {CoRR},
  volume       = {abs/2205.13618},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.13618},
  doi          = {10.48550/ARXIV.2205.13618},
  eprinttype    = {arXiv},
  eprint       = {2205.13618},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-13618.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-05750,
  author       = {David Tayouri and
                  Nick Baum and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {A Survey of MulVAL Extensions and Their Attack Scenarios Coverage},
  journal      = {CoRR},
  volume       = {abs/2208.05750},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.05750},
  doi          = {10.48550/ARXIV.2208.05750},
  eprinttype    = {arXiv},
  eprint       = {2208.05750},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-05750.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-04028,
  author       = {Edan Habler and
                  Ron Bitton and
                  Asaf Shabtai},
  title        = {Evaluating the Security of Aircraft Systems},
  journal      = {CoRR},
  volume       = {abs/2209.04028},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.04028},
  doi          = {10.48550/ARXIV.2209.04028},
  eprinttype    = {arXiv},
  eprint       = {2209.04028},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-04028.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-09033,
  author       = {Orel Lavie and
                  Asaf Shabtai and
                  Gilad Katz},
  title        = {A Transferable and Automatic Tuning of Deep Reinforcement Learning
                  for Cost Effective Phishing Detection},
  journal      = {CoRR},
  volume       = {abs/2209.09033},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.09033},
  doi          = {10.48550/ARXIV.2209.09033},
  eprinttype    = {arXiv},
  eprint       = {2209.09033},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-09033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-08686,
  author       = {Ofir Moshe and
                  Gil Fidel and
                  Ron Bitton and
                  Asaf Shabtai},
  title        = {Improving Interpretability via Regularization of Neural Activation
                  Sensitivity},
  journal      = {CoRR},
  volume       = {abs/2211.08686},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.08686},
  doi          = {10.48550/ARXIV.2211.08686},
  eprinttype    = {arXiv},
  eprint       = {2211.08686},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-08686.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-08859,
  author       = {Avishag Shapira and
                  Ron Bitton and
                  Dan Avraham and
                  Alon Zolfi and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Attacking Object Detector Using {A} Universal Targeted Label-Switch
                  Patch},
  journal      = {CoRR},
  volume       = {abs/2211.08859},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.08859},
  doi          = {10.48550/ARXIV.2211.08859},
  eprinttype    = {arXiv},
  eprint       = {2211.08859},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-08859.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-13644,
  author       = {Jacob Shams and
                  Ben Nassi and
                  Ikuya Morikawa and
                  Toshiya Shimizu and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision
                  Models},
  journal      = {CoRR},
  volume       = {abs/2211.13644},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.13644},
  doi          = {10.48550/ARXIV.2211.13644},
  eprinttype    = {arXiv},
  eprint       = {2211.13644},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-13644.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-14797,
  author       = {Ron Bitton and
                  Alon Malach and
                  Amiel Meiseles and
                  Satoru Momiyama and
                  Toshinori Araki and
                  Jun Furukawa and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Latent {SHAP:} Toward Practical Human-Interpretable Explanations},
  journal      = {CoRR},
  volume       = {abs/2211.14797},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.14797},
  doi          = {10.48550/ARXIV.2211.14797},
  eprinttype    = {arXiv},
  eprint       = {2211.14797},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-14797.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-02081,
  author       = {Alon Zolfi and
                  Guy Amit and
                  Amit Baras and
                  Satoru Koda and
                  Ikuya Morikawa and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution
                  Detection},
  journal      = {CoRR},
  volume       = {abs/2212.02081},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.02081},
  doi          = {10.48550/ARXIV.2212.02081},
  eprinttype    = {arXiv},
  eprint       = {2212.02081},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-02081.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HarushMS21,
  author       = {Shimon Harush and
                  Yair Meidan and
                  Asaf Shabtai},
  title        = {DeepStream: Autoencoder-based stream temporal clustering and anomaly
                  detection},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102276},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102276},
  doi          = {10.1016/J.COSE.2021.102276},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HarushMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrenklachCSP21,
  author       = {Tatiana Frenklach and
                  Dvir Cohen and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Android malware detection via an app similarity graph},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102386},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102386},
  doi          = {10.1016/J.COSE.2021.102386},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FrenklachCSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AmitSE21,
  author       = {Guy Amit and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {A Self-Healing Mechanism for Internet of Things Devices},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {44--53},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.3013207},
  doi          = {10.1109/MSEC.2020.3013207},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AmitSE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BittonS21,
  author       = {Ron Bitton and
                  Asaf Shabtai},
  title        = {A Machine Learning-Based Intrusion Detection System for Securing Remote
                  Desktop Connections to Electronic Flight Bag Servers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1164--1181},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2914035},
  doi          = {10.1109/TDSC.2019.2914035},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BittonS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/StanBEDIOYES21,
  author       = {Orly Stan and
                  Ron Bitton and
                  Michal Ezrets and
                  Moran Dadon and
                  Masaki Inokuchi and
                  Yoshinobu Ohta and
                  Tomohiko Yagyu and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Heuristic Approach for Countermeasure Selection Using Attack Graphs},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00003},
  doi          = {10.1109/CSF51468.2021.00003},
  timestamp    = {Fri, 13 Aug 2021 09:20:41 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/StanBEDIOYES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/ZolfiKES21,
  author       = {Alon Zolfi and
                  Moshe Kravchik and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {The Translucent Patch: {A} Physical and Universal Attack on Object
                  Detectors},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  2021, virtual, June 19-25, 2021},
  pages        = {15232--15241},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2021},
  url          = {https://openaccess.thecvf.com/content/CVPR2021/html/Zolfi\_The\_Translucent\_Patch\_A\_Physical\_and\_Universal\_Attack\_on\_Object\_CVPR\_2021\_paper.html},
  doi          = {10.1109/CVPR46437.2021.01498},
  timestamp    = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/ZolfiKES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DaihesTNS21,
  author       = {Yael Daihes and
                  Hen Tzaban and
                  Asaf Nadler and
                  Asaf Shabtai},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {{MORTON:} Detection of Malicious Routines in Large-Scale {DNS} Traffic},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {736--756},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_35},
  doi          = {10.1007/978-3-030-88418-5\_35},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DaihesTNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/AmitLRSE21,
  author       = {Guy Amit and
                  Moshe Levy and
                  Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {{FOOD:} Fast Out-Of-Distribution Detector},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9533465},
  doi          = {10.1109/IJCNN52387.2021.9533465},
  timestamp    = {Wed, 29 Sep 2021 17:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/AmitLRSE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/BirmanIKS21,
  author       = {Yoni Birman and
                  Ziv Ido and
                  Gilad Katz and
                  Asaf Shabtai},
  title        = {Hierarchical Deep Reinforcement Learning Approach for Multi-Objective
                  Scheduling With Varying Queue Sizes},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9534433},
  doi          = {10.1109/IJCNN52387.2021.9534433},
  timestamp    = {Wed, 29 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/BirmanIKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/RegevRS21,
  author       = {Nir Regev and
                  Lior Rokach and
                  Asaf Shabtai},
  title        = {Approximating Aggregated {SQL} Queries with {LSTM} Networks},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9533974},
  doi          = {10.1109/IJCNN52387.2021.9533974},
  timestamp    = {Wed, 29 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/RegevRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/RosenbergSER21,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {Sequence Squeezing: {A} Defense Method Against Adversarial Examples
                  for {API} Call-Based {RNN} Variants},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9534432},
  doi          = {10.1109/IJCNN52387.2021.9534432},
  timestamp    = {Wed, 29 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/RosenbergSER21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/BinyaminiBIYES21,
  author       = {Hodaya Binyamini and
                  Ron Bitton and
                  Masaki Inokuchi and
                  Tomohiko Yagyu and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Feida Zhu and
                  Beng Chin Ooi and
                  Chunyan Miao},
  title        = {A Framework for Modeling Cyber Attack Techniques from Security Vulnerability
                  Descriptions},
  booktitle    = {{KDD} '21: The 27th {ACM} {SIGKDD} Conference on Knowledge Discovery
                  and Data Mining, Virtual Event, Singapore, August 14-18, 2021},
  pages        = {2574--2583},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447548.3467159},
  doi          = {10.1145/3447548.3467159},
  timestamp    = {Mon, 16 Aug 2021 16:18:31 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/BinyaminiBIYES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/NehemyaMSE21,
  author       = {Elior Nehemya and
                  Yael Mathov and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Yuxiao Dong and
                  Nicolas Kourtellis and
                  Barbara Hammer and
                  Jos{\'{e}} Antonio Lozano},
  title        = {Taking over the Stock Market: Adversarial Perturbations Against Algorithmic
                  Traders},
  booktitle    = {Machine Learning and Knowledge Discovery in Databases. Applied Data
                  Science Track - European Conference, {ECML} {PKDD} 2021, Bilbao, Spain,
                  September 13-17, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12978},
  pages        = {221--236},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86514-6\_14},
  doi          = {10.1007/978-3-030-86514-6\_14},
  timestamp    = {Wed, 28 Jun 2023 16:19:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/NehemyaMSE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KravchikBS21,
  author       = {Moshe Kravchik and
                  Battista Biggio and
                  Asaf Shabtai},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {Poisoning attacks on cyber attack detectors for industrial control
                  systems},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {116--125},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3441892},
  doi          = {10.1145/3412841.3441892},
  timestamp    = {Mon, 03 May 2021 14:34:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/KravchikBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BadashTN0S21,
  author       = {Lital Badash and
                  Nachiket Tapas and
                  Asaf Nadler and
                  Francesco Longo and
                  Asaf Shabtai},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {Blockchain-based bug bounty framework},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {239--248},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3441906},
  doi          = {10.1145/3412841.3441906},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BadashTN0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/HarushMS21,
  author       = {Shimon Harush and
                  Yair Meidan and
                  Asaf Shabtai},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {DeepStream: autoencoder-based stream temporal clustering},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {445--448},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3442083},
  doi          = {10.1145/3412841.3442083},
  timestamp    = {Mon, 03 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/HarushMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NassiBMSE21,
  author       = {Ben Nassi and
                  Ron Bitton and
                  Ryusuke Masuoka and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {SoK: Security and Privacy in the Age of Commercial Drones},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1434--1451},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00005},
  doi          = {10.1109/SP40001.2021.00005},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NassiBMSE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Groza0MES21,
  author       = {Bogdan Groza and
                  Lucian Popa and
                  Pal{-}Stefan Murvay and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CANARY} - a reactive defense mechanism for Controller Area Networks
                  based on Active RelaYs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4259--4276},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/groza},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Groza0MES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-06297,
  author       = {Yam Sharon and
                  David Berend and
                  Yang Liu and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {{TANTRA:} Timing-Based Adversarial Network Traffic Reshaping Attack},
  journal      = {CoRR},
  volume       = {abs/2103.06297},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.06297},
  eprinttype    = {arXiv},
  eprint       = {2103.06297},
  timestamp    = {Wed, 21 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-06297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-13158,
  author       = {Yair Allouche and
                  Nachiket Tapas and
                  Francesco Longo and
                  Asaf Shabtai and
                  Yaron Wolfsthal},
  title        = {{TRADE:} TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain
                  Technology},
  journal      = {CoRR},
  volume       = {abs/2103.13158},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.13158},
  eprinttype    = {arXiv},
  eprint       = {2103.13158},
  timestamp    = {Tue, 06 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-13158.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-07074,
  author       = {Shai Cohen and
                  Efrat Levy and
                  Avi Shaked and
                  Tair Cohen and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks},
  journal      = {CoRR},
  volume       = {abs/2106.07074},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.07074},
  eprinttype    = {arXiv},
  eprint       = {2106.07074},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-07074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-07895,
  author       = {Efrat Levy and
                  Asaf Shabtai and
                  Bogdan Groza and
                  Pal{-}Stefan Murvay and
                  Yuval Elovici},
  title        = {{CAN-LOC:} Spoofing Detection and Physical Intrusion Localization
                  on an In-Vehicle {CAN} Bus Based on Deep Features of Voltage Signals},
  journal      = {CoRR},
  volume       = {abs/2106.07895},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.07895},
  eprinttype    = {arXiv},
  eprint       = {2106.07895},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-07895.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-01806,
  author       = {Ron Bitton and
                  Nadav Maman and
                  Inderjeet Singh and
                  Satoru Momiyama and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {A Framework for Evaluating the Cybersecurity Risk of Real World, Machine
                  Learning Production Systems},
  journal      = {CoRR},
  volume       = {abs/2107.01806},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.01806},
  eprinttype    = {arXiv},
  eprint       = {2107.01806},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-01806.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-06467,
  author       = {Nitzan Guetta and
                  Asaf Shabtai and
                  Inderjeet Singh and
                  Satoru Momiyama and
                  Yuval Elovici},
  title        = {Dodging Attack Using Carefully Crafted Natural Makeup},
  journal      = {CoRR},
  volume       = {abs/2109.06467},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.06467},
  eprinttype    = {arXiv},
  eprint       = {2109.06467},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-06467.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-11342,
  author       = {Asaf Nadler and
                  Ron Bitton and
                  Oleg Brodt and
                  Asaf Shabtai},
  title        = {On The Vulnerability of Anti-Malware Solutions to {DNS} Attacks},
  journal      = {CoRR},
  volume       = {abs/2109.11342},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.11342},
  eprinttype    = {arXiv},
  eprint       = {2109.11342},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-11342.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-10759,
  author       = {Alon Zolfi and
                  Shai Avidan and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Adversarial Mask: Real-World Adversarial Attack Against Face Recognition
                  Models},
  journal      = {CoRR},
  volume       = {abs/2111.10759},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.10759},
  eprinttype    = {arXiv},
  eprint       = {2111.10759},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-10759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SidiNS20,
  author       = {Lior Sidi and
                  Asaf Nadler and
                  Asaf Shabtai},
  title        = {MaskDGA: An Evasion Attack Against {DGA} Classifiers and Adversarial
                  Defenses},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {161580--161592},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3020964},
  doi          = {10.1109/ACCESS.2020.3020964},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SidiNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShwartzCSO20,
  author       = {Omer Shwartz and
                  Amir Cohen and
                  Asaf Shabtai and
                  Yossi Oren},
  title        = {Inner conflict: How smart device components can cause harm},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101665},
  doi          = {10.1016/J.COSE.2019.101665},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShwartzCSO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArendSIKB20,
  author       = {Isabel Arend and
                  Asaf Shabtai and
                  Tali Idan and
                  Ruty Keinan and
                  Yoella Bereby{-}Meyer},
  title        = {Passive- and not active-risk tendencies predict cyber security behavior},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101929},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101929},
  doi          = {10.1016/J.COSE.2020.101929},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArendSIKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArendSIKB20a,
  author       = {Isabel Arend and
                  Asaf Shabtai and
                  Tali Idan and
                  Ruty Keinan and
                  Yoella Bereby{-}Meyer},
  title        = {Passive- and not active-risk tendencies predict cyber security behavior},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101964},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101964},
  doi          = {10.1016/J.COSE.2020.101964},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArendSIKB20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MeidanSPSES20,
  author       = {Yair Meidan and
                  Vinay Sachidananda and
                  Hongyi Peng and
                  Racheli Sagron and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {A novel approach for detecting vulnerable IoT devices connected behind
                  a home {NAT}},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101968},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101968},
  doi          = {10.1016/J.COSE.2020.101968},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MeidanSPSES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TapasYLPS20,
  author       = {Nachiket Tapas and
                  Yechiav Yitzchak and
                  Francesco Longo and
                  Antonio Puliafito and
                  Asaf Shabtai},
  title        = {P4UIoT: Pay-Per-Piece Patch Update Delivery for IoT Using Gradual
                  Release},
  journal      = {Sensors},
  volume       = {20},
  number       = {7},
  pages        = {2156},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20072156},
  doi          = {10.3390/S20072156},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/TapasYLPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KalboMSE20,
  author       = {Naor Kalbo and
                  Yisroel Mirsky and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {The Security of IP-Based Video Surveillance Systems},
  journal      = {Sensors},
  volume       = {20},
  number       = {17},
  pages        = {4806},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20174806},
  doi          = {10.3390/S20174806},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KalboMSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GluckKCES20,
  author       = {Tomer Gluck and
                  Moshe Kravchik and
                  Samuel Chocron and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous
                  Signal},
  journal      = {Sensors},
  volume       = {20},
  number       = {21},
  pages        = {6157},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20216157},
  doi          = {10.3390/S20216157},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GluckKCES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/StanCES20,
  author       = {Orly Stan and
                  Adi Cohen and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Intrusion Detection System for the {MIL-STD-1553} Communication Bus},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {56},
  number       = {4},
  pages        = {3010--3027},
  year         = {2020},
  url          = {https://doi.org/10.1109/TAES.2019.2961824},
  doi          = {10.1109/TAES.2019.2961824},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/StanCES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RosenbergSER20,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {611--626},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427230},
  doi          = {10.1145/3427228.3427230},
  timestamp    = {Tue, 15 Dec 2020 12:22:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RosenbergSER20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/BirmanHKS20,
  author       = {Yoni Birman and
                  Shaked Hindi and
                  Gilad Katz and
                  Asaf Shabtai},
  title        = {Cost-Effective Malware Detection as a Service Over Serverless Cloud
                  Using Deep Reinforcement Learning},
  booktitle    = {20th {IEEE/ACM} International Symposium on Cluster, Cloud and Internet
                  Computing, {CCGRID} 2020, Melbourne, Australia, May 11-14, 2020},
  pages        = {420--429},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CCGrid49817.2020.00-51},
  doi          = {10.1109/CCGRID49817.2020.00-51},
  timestamp    = {Wed, 22 Jul 2020 16:50:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ccgrid/BirmanHKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BittonBPS20,
  author       = {Ron Bitton and
                  Kobi Boymgold and
                  Rami Puzis and
                  Asaf Shabtai},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {Evaluating the Information Security Awareness of Smartphone Users},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376385},
  doi          = {10.1145/3313831.3376385},
  timestamp    = {Wed, 04 May 2022 13:02:17 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/BittonBPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/SidiMNES20,
  author       = {Lior Sidi and
                  Yisroel Mirsky and
                  Asaf Nadler and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Mathieu d'Aquin and
                  Stefan Dietze and
                  Claudia Hauff and
                  Edward Curry and
                  Philippe Cudr{\'{e}}{-}Mauroux},
  title        = {Helix: {DGA} Domain Embeddings for Tracking and Exploring Botnets},
  booktitle    = {{CIKM} '20: The 29th {ACM} International Conference on Information
                  and Knowledge Management, Virtual Event, Ireland, October 19-23, 2020},
  pages        = {2741--2748},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3340531.3416022},
  doi          = {10.1145/3340531.3416022},
  timestamp    = {Fri, 25 Dec 2020 01:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/SidiMNES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/SiboniGPSE20,
  author       = {Shachar Siboni and
                  Chanan Glezer and
                  Rami Puzis and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Shlomi Dolev and
                  Vladimir Kolesnikov and
                  Sachin Lodha and
                  Gera Weiss},
  title        = {Security Ranking of IoT Devices Using an {AHP} Model},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Fourth International
                  Symposium, {CSCML} 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12161},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49785-9\_3},
  doi          = {10.1007/978-3-030-49785-9\_3},
  timestamp    = {Thu, 25 Jun 2020 16:11:03 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/SiboniGPSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LukachGS20,
  author       = {Amir Lukach and
                  Ehud Gudes and
                  Asaf Shabtai},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {{PUA} Detection Based on Bundle Installer Characteristics},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {261--273},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_15},
  doi          = {10.1007/978-3-030-49669-2\_15},
  timestamp    = {Thu, 18 Jun 2020 13:44:27 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LukachGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CohenMKMEPS20,
  author       = {Dvir Cohen and
                  Yisroel Mirsky and
                  Manuel Kamp and
                  Tobias Martin and
                  Yuval Elovici and
                  Rami Puzis and
                  Asaf Shabtai},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {{DANTE:} {A} Framework for Mining and Monitoring Darknet Traffic},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {88--109},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_5},
  doi          = {10.1007/978-3-030-58951-6\_5},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CohenMKMEPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/FidelBS20,
  author       = {Gil Fidel and
                  Ron Bitton and
                  Asaf Shabtai},
  title        = {When Explainability Meets Adversarial Learning: Detecting Adversarial
                  Examples using {SHAP} Signatures},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9207637},
  doi          = {10.1109/IJCNN48605.2020.9207637},
  timestamp    = {Tue, 06 Oct 2020 15:44:04 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/FidelBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-02176,
  author       = {Guy Amit and
                  Ishai Rosenberg and
                  Moshe Levy and
                  Ron Bitton and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Neural Network Representation Control: Gaussian Isolation Machines
                  and {CVC} Regularization},
  journal      = {CoRR},
  volume       = {abs/2002.02176},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.02176},
  eprinttype    = {arXiv},
  eprint       = {2002.02176},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-02176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-02741,
  author       = {Moshe Kravchik and
                  Asaf Shabtai},
  title        = {Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based
                  Anomaly Detectors to Adversarial Poisoning Attacks},
  journal      = {CoRR},
  volume       = {abs/2002.02741},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.02741},
  eprinttype    = {arXiv},
  eprint       = {2002.02741},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-02741.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-02575,
  author       = {Dvir Cohen and
                  Yisroel Mirsky and
                  Yuval Elovici and
                  Rami Puzis and
                  Manuel Kamp and
                  Tobias Martin and
                  Asaf Shabtai},
  title        = {{DANTE:} {A} framework for mining and monitoring darknet traffic},
  journal      = {CoRR},
  volume       = {abs/2003.02575},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.02575},
  eprinttype    = {arXiv},
  eprint       = {2003.02575},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-02575.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-00059,
  author       = {Noam Moscovich and
                  Ron Bitton and
                  Yakov Mallah and
                  Masaki Inokuchi and
                  Tomohiko Yagyu and
                  Meir Kalech and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Autosploit: {A} Fully Automated Framework for Evaluating the Exploitability
                  of Security Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/2007.00059},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.00059},
  eprinttype    = {arXiv},
  eprint       = {2007.00059},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-00059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-02407,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {Adversarial Learning in the Cyber Security Domain},
  journal      = {CoRR},
  volume       = {abs/2007.02407},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.02407},
  eprinttype    = {arXiv},
  eprint       = {2007.02407},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-02407.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-09256,
  author       = {Yoni Birman and
                  Ziv Ido and
                  Gilad Katz and
                  Asaf Shabtai},
  title        = {Hierarchical Deep Reinforcement Learning Approach for Multi-Objective
                  Scheduling With Varying Queue Sizes},
  journal      = {CoRR},
  volume       = {abs/2007.09256},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.09256},
  eprinttype    = {arXiv},
  eprint       = {2007.09256},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-09256.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-02003,
  author       = {Hen Tzaban and
                  Asaf Nadler and
                  Yael Daihes and
                  Asaf Shabtai},
  title        = {{MORTON:} Detection of Malicious Routines in Large-Scale {DNS} Traffic},
  journal      = {CoRR},
  volume       = {abs/2008.02003},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.02003},
  eprinttype    = {arXiv},
  eprint       = {2008.02003},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-02003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-04377,
  author       = {Hodaya Binyamini and
                  Ron Bitton and
                  Masaki Inokuchi and
                  Tomohiko Yagyu and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {An Automated, End-to-End Framework for Modeling Attacks From Vulnerability
                  Descriptions},
  journal      = {CoRR},
  volume       = {abs/2008.04377},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.04377},
  eprinttype    = {arXiv},
  eprint       = {2008.04377},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-04377.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-06856,
  author       = {Guy Amit and
                  Moshe Levy and
                  Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {{GLOD:} Gaussian Likelihood Out of Distribution Detector},
  journal      = {CoRR},
  volume       = {abs/2008.06856},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.06856},
  eprinttype    = {arXiv},
  eprint       = {2008.06856},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-06856.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-05283,
  author       = {Yushi Cao and
                  David Berend and
                  Palina Tolmach and
                  Moshe Levy and
                  Guy Amit and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Yang Liu},
  title        = {Fairness Matters - {A} Data-Driven Framework Towards Fair and High
                  Performing Facial Recognition Systems},
  journal      = {CoRR},
  volume       = {abs/2009.05283},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.05283},
  eprinttype    = {arXiv},
  eprint       = {2009.05283},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-05283.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-11349,
  author       = {Gil Fidel and
                  Ron Bitton and
                  Ziv Katzir and
                  Asaf Shabtai},
  title        = {Adversarial robustness via stochastic regularization of neural activation
                  sensitivity},
  journal      = {CoRR},
  volume       = {abs/2009.11349},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.11349},
  eprinttype    = {arXiv},
  eprint       = {2009.11349},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-11349.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-03180,
  author       = {Eden Levy and
                  Yael Mathov and
                  Ziv Katzir and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial
                  Examples},
  journal      = {CoRR},
  volume       = {abs/2010.03180},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.03180},
  eprinttype    = {arXiv},
  eprint       = {2010.03180},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-03180.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-09246,
  author       = {Elior Nehemya and
                  Yael Mathov and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic
                  Traders},
  journal      = {CoRR},
  volume       = {abs/2010.09246},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.09246},
  eprinttype    = {arXiv},
  eprint       = {2010.09246},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-09246.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12809,
  author       = {Tal Ben Senior and
                  Yael Mathov and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial
                  Perturbations},
  journal      = {CoRR},
  volume       = {abs/2010.12809},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12809},
  eprinttype    = {arXiv},
  eprint       = {2010.12809},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12809.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-13070,
  author       = {Shahar Hoory and
                  Tzvika Shapira and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Dynamic Adversarial Patch for Evading Object Detection Models},
  journal      = {CoRR},
  volume       = {abs/2010.13070},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.13070},
  eprinttype    = {arXiv},
  eprint       = {2010.13070},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-13070.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-13149,
  author       = {Nir Regev and
                  Lior Rokach and
                  Asaf Shabtai},
  title        = {Approximating Aggregated {SQL} Queries With {LSTM} Networks},
  journal      = {CoRR},
  volume       = {abs/2010.13149},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.13149},
  eprinttype    = {arXiv},
  eprint       = {2010.13149},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-13149.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-16323,
  author       = {Tzvika Shapira and
                  David Berend and
                  Ishai Rosenberg and
                  Yang Liu and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers},
  journal      = {CoRR},
  volume       = {abs/2010.16323},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.16323},
  eprinttype    = {arXiv},
  eprint       = {2010.16323},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-16323.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-12528,
  author       = {Alon Zolfi and
                  Moshe Kravchik and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {The Translucent Patch: {A} Physical and Universal Attack on Object
                  Detectors},
  journal      = {CoRR},
  volume       = {abs/2012.12528},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.12528},
  eprinttype    = {arXiv},
  eprint       = {2012.12528},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-12528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-12537,
  author       = {Amit Giloni and
                  Edita Grolman and
                  Tanja Hagemann and
                  Ronald Fromm and
                  Sebastian Fischer and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {{BENN:} Bias Estimation Using Deep Neural Network},
  journal      = {CoRR},
  volume       = {abs/2012.12537},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.12537},
  eprinttype    = {arXiv},
  eprint       = {2012.12537},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-12537.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-15740,
  author       = {Moshe Kravchik and
                  Battista Biggio and
                  Asaf Shabtai},
  title        = {Poisoning Attacks on Cyber Attack Detectors for Industrial Control
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2012.15740},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.15740},
  eprinttype    = {arXiv},
  eprint       = {2012.15740},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-15740.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NassiMNSE20,
  author       = {Ben Nassi and
                  Yair Meidan and
                  Dudi Nassi and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Botnet {IND:} About Botnets of Botless IoT Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1518},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1518},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NassiMNSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HazanS19,
  author       = {Itay Hazan and
                  Asaf Shabtai},
  title        = {Improving Grid-Based Location Prediction Algorithms by Speed and Direction
                  Based Boosting},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {21211--21219},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2894809},
  doi          = {10.1109/ACCESS.2019.2894809},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HazanS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/SchweitzerSHMS19,
  author       = {Nadav Schweitzer and
                  Ariel Stulman and
                  Tirza Hirst and
                  Roy David Margalit and
                  Asaf Shabtai},
  title        = {Network bottlenecks in {OLSR} based ad-hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {88},
  pages        = {36--54},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.adhoc.2018.12.002},
  doi          = {10.1016/J.ADHOC.2018.12.002},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/SchweitzerSHMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NadlerAS19,
  author       = {Asaf Nadler and
                  Avi Aminov and
                  Asaf Shabtai},
  title        = {Detection of malicious and low throughput data exfiltration over the
                  {DNS} protocol},
  journal      = {Comput. Secur.},
  volume       = {80},
  pages        = {36--53},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2018.09.006},
  doi          = {10.1016/J.COSE.2018.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NadlerAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/IsraeliRS19,
  author       = {Abraham Israeli and
                  Lior Rokach and
                  Asaf Shabtai},
  title        = {Constraint learning based gradient boosting trees},
  journal      = {Expert Syst. Appl.},
  volume       = {128},
  pages        = {287--300},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.eswa.2019.03.011},
  doi          = {10.1016/J.ESWA.2019.03.011},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/IsraeliRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/LeibaBYNKS19,
  author       = {Oded Leiba and
                  Ron Bitton and
                  Yechiav Yitzchak and
                  Asaf Nadler and
                  Davidoz Kashi and
                  Asaf Shabtai},
  title        = {IoTPatchPool: Incentivized delivery network of IoT software updates
                  based on proofs-of-distribution},
  journal      = {Pervasive Mob. Comput.},
  volume       = {58},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.pmcj.2019.04.010},
  doi          = {10.1016/J.PMCJ.2019.04.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/LeibaBYNKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MirskyKES19,
  author       = {Yisroel Mirsky and
                  Naor Kalbo and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in
                  LANs},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {6},
  pages        = {1638--1653},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2883177},
  doi          = {10.1109/TIFS.2018.2883177},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MirskyKES19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/SiboniSMBMBSE19,
  author       = {Shachar Siboni and
                  Vinay Sachidananda and
                  Yair Meidan and
                  Michael Bohadana and
                  Yael Mathov and
                  Suhas Bhairav and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Security Testbed for Internet-of-Things Devices},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {68},
  number       = {1},
  pages        = {23--44},
  year         = {2019},
  url          = {https://doi.org/10.1109/TR.2018.2864536},
  doi          = {10.1109/TR.2018.2864536},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/SiboniSMBMBSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CohenGES19,
  author       = {Shai Cohen and
                  Tomer Gluck and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Thorsten Holz},
  title        = {Security Analysis of Radar Systems},
  booktitle    = {Proceedings of the {ACM} Workshop on Cyber-Physical Systems Security
                  {\&} Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338499.3357363},
  doi          = {10.1145/3338499.3357363},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CohenGES19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/InokuchiOKYSBES19,
  author       = {Masaki Inokuchi and
                  Yoshinobu Ohta and
                  Shunichi Kinoshita and
                  Tomohiko Yagyu and
                  Orly Stan and
                  Ron Bitton and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Design Procedure of Knowledge Base for Practical Attack Graph Generation},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {594--601},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329853},
  doi          = {10.1145/3321705.3329853},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/InokuchiOKYSBES19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AfrozBCES19,
  author       = {Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {AISec'19: 12th {ACM} Workshop on Artificial Intelligence and Security},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2707--2708},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3353556},
  doi          = {10.1145/3319535.3353556},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AfrozBCES19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TambeASOTSE19,
  author       = {Amit Tambe and
                  Yan Lin Aung and
                  Ragav Sridharan and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300024},
  doi          = {10.1145/3292006.3300024},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/TambeASOTSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SivanBS19,
  author       = {Nir Sivan and
                  Ron Bitton and
                  Asaf Shabtai},
  title        = {Analysis of Location Data Leakage in the Internet Traffic of Android-based
                  Mobile Devices},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {243--260},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/sivan},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SivanBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/SiboniGSE19,
  author       = {Shachar Siboni and
                  Chanan Glezer and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Guojun Wang and
                  Jun Feng and
                  Md. Zakirul Alam Bhuiyan and
                  Rongxing Lu},
  title        = {A Weighted Risk Score Model for IoT Devices},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July
                  14-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11637},
  pages        = {20--34},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24900-7\_2},
  doi          = {10.1007/978-3-030-24900-7\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/SiboniGSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AgmonSP19,
  author       = {Noga Agmon and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Deployment optimization of IoT devices through attack graph analysis},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {192--202},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323411},
  doi          = {10.1145/3317549.3323411},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AgmonSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019aisec,
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Sadia Afroz and
                  Battista Biggio and
                  Nicholas Carlini and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Proceedings of the 12th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2019, London, UK, November 15, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338501},
  doi          = {10.1145/3338501},
  isbn         = {978-1-4503-6833-9},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2019aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018issa,
  editor       = {Brahim Hamid and
                  Barbara Gallina and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Security and Safety Interplay of Intelligent Software Systems - {ESORICS}
                  2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona,
                  Spain, September 6-7, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11552},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16874-2},
  doi          = {10.1007/978-3-030-16874-2},
  isbn         = {978-3-030-16873-5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2018issa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-09963,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {Defense Methods Against Adversarial Examples for Recurrent Neural
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1901.09963},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.09963},
  eprinttype    = {arXiv},
  eprint       = {1901.09963},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-09963.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-08909,
  author       = {Lior Sidi and
                  Asaf Nadler and
                  Asaf Shabtai},
  title        = {MaskDGA: {A} Black-box Evasion Technique Against {DGA} Classifiers
                  and Adversarial Defenses},
  journal      = {CoRR},
  volume       = {abs/1902.08909},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.08909},
  eprinttype    = {arXiv},
  eprint       = {1902.08909},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-08909.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-05155,
  author       = {Ben Nassi and
                  Asaf Shabtai and
                  Ryusuke Masuoka and
                  Yuval Elovici},
  title        = {SoK - Security and Privacy in the Age of Drones: Threats, Challenges,
                  Solution Mechanisms, and Scientific Gaps},
  journal      = {CoRR},
  volume       = {abs/1903.05155},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.05155},
  eprinttype    = {arXiv},
  eprint       = {1903.05155},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-05155.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-05853,
  author       = {Noga Agmon and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Deployment Optimization of IoT Devices through Attack Graph Analysis},
  journal      = {CoRR},
  volume       = {abs/1904.05853},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.05853},
  eprinttype    = {arXiv},
  eprint       = {1904.05853},
  timestamp    = {Thu, 25 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-05853.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-10517,
  author       = {Yoni Birman and
                  Shaked Hindi and
                  Gilad Katz and
                  Asaf Shabtai},
  title        = {{ASPIRE:} Automated Security Policy Implementation Using Reinforcement
                  Learning},
  journal      = {CoRR},
  volume       = {abs/1905.10517},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.10517},
  eprinttype    = {arXiv},
  eprint       = {1905.10517},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-10517.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-13430,
  author       = {Yair Meidan and
                  Vinay Sachidananda and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Privacy-Preserving Detection of IoT Devices Connected Behind a {NAT}
                  in a Smart Home Setup},
  journal      = {CoRR},
  volume       = {abs/1905.13430},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.13430},
  eprinttype    = {arXiv},
  eprint       = {1905.13430},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-13430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-07921,
  author       = {Sefi Akerman and
                  Edan Habler and
                  Asaf Shabtai},
  title        = {VizADS-B: Analyzing Sequences of {ADS-B} Images Using Explainable
                  Convolutional {LSTM} Encoder-Decoder to Detect Cyber Attacks},
  journal      = {CoRR},
  volume       = {abs/1906.07921},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.07921},
  eprinttype    = {arXiv},
  eprint       = {1906.07921},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-07921.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09786,
  author       = {Orly Stan and
                  Ron Bitton and
                  Michal Ezrets and
                  Moran Dadon and
                  Masaki Inokuchi and
                  Yoshinobu Ohta and
                  Yoshiyuki Yamada and
                  Tomohiko Yagyu and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Extending Attack Graphs to Represent Cyber-Attacks in Communication
                  Protocols and Modern {IT} Networks},
  journal      = {CoRR},
  volume       = {abs/1906.09786},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09786},
  eprinttype    = {arXiv},
  eprint       = {1906.09786},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10229,
  author       = {Ron Bitton and
                  Kobi Boymgold and
                  Rami Puzis and
                  Asaf Shabtai},
  title        = {Evaluating the Information Security Awareness of Smartphone Users},
  journal      = {CoRR},
  volume       = {abs/1906.10229},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10229},
  eprinttype    = {arXiv},
  eprint       = {1906.10229},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10229.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10922,
  author       = {Yael Mathov and
                  Noga Agmon and
                  Asaf Shabtai and
                  Rami Puzis and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  title        = {Challenges for Security Assessment of Enterprises in the IoT Era},
  journal      = {CoRR},
  volume       = {abs/1906.10922},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10922},
  eprinttype    = {arXiv},
  eprint       = {1906.10922},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10922.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10943,
  author       = {Orly Stan and
                  Ron Bitton and
                  Michal Ezrets and
                  Moran Dadon and
                  Masaki Inokuchi and
                  Yoshinobu Ohta and
                  Tomohiko Yagyu and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Heuristic Approach Towards Countermeasure Selection using Attack Graphs},
  journal      = {CoRR},
  volume       = {abs/1906.10943},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10943},
  eprinttype    = {arXiv},
  eprint       = {1906.10943},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10943.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01216,
  author       = {Moshe Kravchik and
                  Asaf Shabtai},
  title        = {Efficient Cyber Attacks Detection in Industrial Control Systems Using
                  Lightweight Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1907.01216},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.01216},
  eprinttype    = {arXiv},
  eprint       = {1907.01216},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-01216.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-06921,
  author       = {Sofia Belikovetsky and
                  Oded Leiba and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {3D Marketplace: Distributed Attestation of 3D Designs on Blockchain},
  journal      = {CoRR},
  volume       = {abs/1908.06921},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.06921},
  eprinttype    = {arXiv},
  eprint       = {1908.06921},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-06921.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-03418,
  author       = {Gil Fidel and
                  Ron Bitton and
                  Asaf Shabtai},
  title        = {When Explainability Meets Adversarial Learning: Detecting Adversarial
                  Examples using {SHAP} Signatures},
  journal      = {CoRR},
  volume       = {abs/1909.03418},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.03418},
  eprinttype    = {arXiv},
  eprint       = {1909.03418},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-03418.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-10749,
  author       = {Naor Kalbo and
                  Yisroel Mirsky and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {The Security of IP-based Video Surveillance Systems},
  journal      = {CoRR},
  volume       = {abs/1910.10749},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.10749},
  eprinttype    = {arXiv},
  eprint       = {1910.10749},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-10749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BittonFSPRS18,
  author       = {Ron Bitton and
                  Andrey Finkelshtein and
                  Lior Sidi and
                  Rami Puzis and
                  Lior Rokach and
                  Asaf Shabtai},
  title        = {Taxonomy of mobile users' security awareness},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {266--293},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.015},
  doi          = {10.1016/J.COSE.2017.10.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BittonFSPRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HablerS18,
  author       = {Edan Habler and
                  Asaf Shabtai},
  title        = {Using {LSTM} encoder-decoder algorithm for detecting anomalous {ADS-B}
                  messages},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {155--173},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.004},
  doi          = {10.1016/J.COSE.2018.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HablerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/GrolmanFPSCKR18,
  author       = {Edita Grolman and
                  Andrey Finkelshtein and
                  Rami Puzis and
                  Asaf Shabtai and
                  Gershon Celniker and
                  Ziv Katzir and
                  Liron Rosenfeld},
  title        = {Transfer Learning for User Action Identication in Mobile Apps via
                  Encrypted Trafc Analysis},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {40--53},
  year         = {2018},
  url          = {https://doi.org/10.1109/MIS.2018.111145120},
  doi          = {10.1109/MIS.2018.111145120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/GrolmanFPSCKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/MeidanBMMSBE18,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Yael Mathov and
                  Yisroel Mirsky and
                  Asaf Shabtai and
                  Dominik Breitenbacher and
                  Yuval Elovici},
  title        = {N-BaIoT - Network-Based Detection of IoT Botnet Attacks Using Deep
                  Autoencoders},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {17},
  number       = {3},
  pages        = {12--22},
  year         = {2018},
  url          = {https://doi.org/10.1109/MPRV.2018.03367731},
  doi          = {10.1109/MPRV.2018.03367731},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/MeidanBMMSBE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/KatzCS18,
  author       = {Gilad Katz and
                  Cornelia Caragea and
                  Asaf Shabtai},
  title        = {Vertical Ensemble Co-Training for Text Classification},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {9},
  number       = {2},
  pages        = {21:1--21:23},
  year         = {2018},
  url          = {https://doi.org/10.1145/3137114},
  doi          = {10.1145/3137114},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tist/KatzCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/ParadiseCSP18,
  author       = {Abigail Paradise and
                  Dvir Cohen and
                  Asaf Shabtai and
                  Rami Puzis},
  editor       = {Ulrik Brandes and
                  Chandan Reddy and
                  Andrea Tagarelli},
  title        = {ProfileGen: Generation of Automatic and Realistic Artificial Profiles},
  booktitle    = {{IEEE/ACM} 2018 International Conference on Advances in Social Networks
                  Analysis and Mining, {ASONAM} 2018, Barcelona, Spain, August 28-31,
                  2018},
  pages        = {581--583},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ASONAM.2018.8508242},
  doi          = {10.1109/ASONAM.2018.8508242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/ParadiseCSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KravchikS18,
  author       = {Moshe Kravchik and
                  Asaf Shabtai},
  editor       = {David Lie and
                  Mohammad Mannan},
  title        = {Detecting Cyber Attacks in Industrial Control Systems Using Convolutional
                  Neural Networks},
  booktitle    = {Proceedings of the 2018 Workshop on Cyber-Physical Systems Security
                  and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {72--83},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264888.3264896},
  doi          = {10.1145/3264888.3264896},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KravchikS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AfrozBEFS18,
  author       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {11th International Workshop on Artificial Intelligence and Security
                  (AISec 2018)},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2166--2167},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243872},
  doi          = {10.1145/3243734.3243872},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AfrozBEFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shabtai18,
  author       = {Asaf Shabtai},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Session details: {AI} for Detecting Software Vulnerabilities},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285950},
  doi          = {10.1145/3285950},
  timestamp    = {Tue, 07 Mar 2023 16:37:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Shabtai18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Shabtai18a,
  author       = {Asaf Shabtai},
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Session details: {AI} for Detecting Attacks},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3285951},
  doi          = {10.1145/3285951},
  timestamp    = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Shabtai18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/StanCES18,
  author       = {Orly Stan and
                  Adi Cohen and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Brahim Hamid and
                  Barbara Gallina and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On the Security of {MIL-STD-1553} Communication Bus},
  booktitle    = {Security and Safety Interplay of Intelligent Software Systems - {ESORICS}
                  2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona,
                  Spain, September 6-7, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11552},
  pages        = {153--171},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-16874-2\_11},
  doi          = {10.1007/978-3-030-16874-2\_11},
  timestamp    = {Fri, 27 Dec 2019 21:19:58 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/StanCES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BittonGSIOYYES18,
  author       = {Ron Bitton and
                  Tomer Gluck and
                  Orly Stan and
                  Masaki Inokuchi and
                  Yoshinobu Ohta and
                  Yoshiyuki Yamada and
                  Tomohiko Yagyu and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Deriving a Cost-Effective Digital Twin of an {ICS} to Facilitate Security
                  Evaluation},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {533--554},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_26},
  doi          = {10.1007/978-3-319-99073-6\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BittonGSIOYYES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/LeibaYBNS18,
  author       = {Oded Leiba and
                  Yechiav Yitzchak and
                  Ron Bitton and
                  Asaf Nadler and
                  Asaf Shabtai},
  title        = {Incentivized Delivery Network of IoT Software Updates Based on Trustless
                  Proof-of-Distribution},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2018, London, United Kingdom, April 23-27,
                  2018},
  pages        = {29--39},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSPW.2018.00011},
  doi          = {10.1109/EUROSPW.2018.00011},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/LeibaYBNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MirskyDES18,
  author       = {Yisroel Mirsky and
                  Tomer Doitshman and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Kitsune: An Ensemble of Autoencoders for Online Network Intrusion
                  Detection},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03A-3\_Mirsky\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/MirskyDES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RosenbergSRE18,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Generic Black-Box End-to-End Attack Against State of the Art {API}
                  Call Based Malware Classifiers},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {490--510},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_23},
  doi          = {10.1007/978-3-030-00470-5\_23},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/RosenbergSRE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SiboniSE18,
  author       = {Shachar Siboni and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Leaking data from enterprise networks using a compromised smartwatch
                  device},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {741--750},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167214},
  doi          = {10.1145/3167132.3167214},
  timestamp    = {Wed, 25 Sep 2019 18:12:13 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SiboniSE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018aisec,
  editor       = {Sadia Afroz and
                  Battista Biggio and
                  Yuval Elovici and
                  David Freeman and
                  Asaf Shabtai},
  title        = {Proceedings of the 11th {ACM} Workshop on Artificial Intelligence
                  and Security, {CCS} 2018, Toronto, ON, Canada, October 19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3270101},
  isbn         = {978-1-4503-6004-3},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2018aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/snam/ParadisePS18,
  author       = {Abigail Paradise and
                  Rami Puzis and
                  Asaf Shabtai},
  editor       = {Reda Alhajj and
                  Jon G. Rokne},
  title        = {Socialbots},
  booktitle    = {Encyclopedia of Social Network Analysis and Mining, 2nd Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4939-7131-2\_110212},
  doi          = {10.1007/978-1-4939-7131-2\_110212},
  timestamp    = {Wed, 04 May 2022 13:01:02 +0200},
  biburl       = {https://dblp.org/rec/reference/snam/ParadisePS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/MeidanBMMBSS18,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Yael Mathov and
                  Yisroel Mirsky and
                  Dominik Breitenbacher and
                  Asaf and
                  Asaf Shabtai},
  title        = {detection{\_}of{\_}IoT{\_}botnet{\_}attacks{\_}N{\_}BaIoT},
  publisher    = {{UCI} Machine Learning Repository},
  year         = {2018},
  month        = mar,
  howpublished = {\url{https://doi.org/10.24432/C5RC8J}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.24432/C5RC8J},
  doi          = {10.24432/C5RC8J},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/data/10/MeidanBMMBSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-09089,
  author       = {Yisroel Mirsky and
                  Tomer Doitshman and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Kitsune: An Ensemble of Autoencoders for Online Network Intrusion
                  Detection},
  journal      = {CoRR},
  volume       = {abs/1802.09089},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.09089},
  eprinttype    = {arXiv},
  eprint       = {1802.09089},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-09089.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-02560,
  author       = {Yisroel Mirsky and
                  Naor Kalbo and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in
                  LANs},
  journal      = {CoRR},
  volume       = {abs/1803.02560},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.02560},
  eprinttype    = {arXiv},
  eprint       = {1803.02560},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-02560.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-08778,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {Low Resource Black-Box End-to-End Attack Against State of the Art
                  {API} Call Based Malware Classifiers},
  journal      = {CoRR},
  volume       = {abs/1804.08778},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.08778},
  eprinttype    = {arXiv},
  eprint       = {1804.08778},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-08778.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-03409,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Yael Mathov and
                  Yisroel Mirsky and
                  Dominik Breitenbacher and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep
                  Autoencoders},
  journal      = {CoRR},
  volume       = {abs/1805.03409},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.03409},
  eprinttype    = {arXiv},
  eprint       = {1805.03409},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-03409.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-04282,
  author       = {Oded Leiba and
                  Yechiav Yitzchak and
                  Ron Bitton and
                  Asaf Nadler and
                  Asaf Shabtai},
  title        = {Incentivized Delivery Network of IoT Software Updates Based on Trustless
                  Proof-of-Distribution},
  journal      = {CoRR},
  volume       = {abs/1805.04282},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.04282},
  eprinttype    = {arXiv},
  eprint       = {1805.04282},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-04282.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-04850,
  author       = {Omer Shwartz and
                  Amir Cohen and
                  Asaf Shabtai and
                  Yossi Oren},
  title        = {Shattered Trust: When Replacement Smartphone Components Attack},
  journal      = {CoRR},
  volume       = {abs/1805.04850},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.04850},
  eprinttype    = {arXiv},
  eprint       = {1805.04850},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-04850.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-08110,
  author       = {Moshe Kravchik and
                  Asaf Shabtai},
  title        = {Anomaly detection; Industrial control systems; convolutional neural
                  networks},
  journal      = {CoRR},
  volume       = {abs/1806.08110},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.08110},
  eprinttype    = {arXiv},
  eprint       = {1806.08110},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-08110.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-00125,
  author       = {Abigail Paradise and
                  Dvir Cohen and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Generation of Automatic and Realistic Artificial Profiles},
  journal      = {CoRR},
  volume       = {abs/1807.00125},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.00125},
  eprinttype    = {arXiv},
  eprint       = {1807.00125},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-00125.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-02131,
  author       = {Ben Nassi and
                  Moshe Sror and
                  Ido Lavi and
                  Yair Meidan and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Piping Botnet - Turning Green Technology into a Water Disaster},
  journal      = {CoRR},
  volume       = {abs/1808.02131},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.02131},
  eprinttype    = {arXiv},
  eprint       = {1808.02131},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-02131.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-05221,
  author       = {Yotam Intrator and
                  Gilad Katz and
                  Asaf Shabtai},
  title        = {{MDGAN:} Boosting Anomaly Detection Using Multi-Discriminator Generative
                  Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/1810.05221},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.05221},
  eprinttype    = {arXiv},
  eprint       = {1810.05221},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-05221.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-04829,
  author       = {Nir Sivan and
                  Ron Bitton and
                  Asaf Shabtai},
  title        = {Analysis of Location Data Leakage in the Internet Traffic of Android-based
                  Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/1812.04829},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.04829},
  eprinttype    = {arXiv},
  eprint       = {1812.04829},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-04829.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/OfekRSS17,
  author       = {Nir Ofek and
                  Lior Rokach and
                  Roni Stern and
                  Asaf Shabtai},
  title        = {Fast-CBUS: {A} fast clustering-based undersampling method for addressing
                  the class imbalance problem},
  journal      = {Neurocomputing},
  volume       = {243},
  pages        = {88--102},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.neucom.2017.03.011},
  doi          = {10.1016/J.NEUCOM.2017.03.011},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/OfekRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jasis/Greenstein-Messica17,
  author       = {Asnat Greenstein{-}Messica and
                  Lior Rokach and
                  Asaf Shabtai},
  title        = {Personal-discount sensitivity prediction for mobile coupon conversion
                  optimization},
  journal      = {J. Assoc. Inf. Sci. Technol.},
  volume       = {68},
  number       = {8},
  pages        = {1940--1952},
  year         = {2017},
  url          = {https://doi.org/10.1002/asi.23838},
  doi          = {10.1002/ASI.23838},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jasis/Greenstein-Messica17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MirskySSER17,
  author       = {Yisroel Mirsky and
                  Asaf Shabtai and
                  Bracha Shapira and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {Anomaly detection for smartphone data streams},
  journal      = {Pervasive Mob. Comput.},
  volume       = {35},
  pages        = {83--107},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.pmcj.2016.07.006},
  doi          = {10.1016/J.PMCJ.2016.07.006},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/MirskySSER17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/HazanS17,
  author       = {Itay Hazan and
                  Asaf Shabtai},
  title        = {Dynamic radius and confidence prediction in grid-based location prediction
                  algorithms},
  journal      = {Pervasive Mob. Comput.},
  volume       = {42},
  pages        = {265--284},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.pmcj.2017.10.007},
  doi          = {10.1016/J.PMCJ.2017.10.007},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/HazanS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ParadiseSPEERP17,
  author       = {Abigail Paradise and
                  Asaf Shabtai and
                  Rami Puzis and
                  Aviad Elyashar and
                  Yuval Elovici and
                  Mehran Roshandel and
                  Christoph Peylo},
  title        = {Creation and Management of Social Network Honeypots for Detecting
                  Targeted Cyber Attacks},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {4},
  number       = {3},
  pages        = {65--79},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCSS.2017.2719705},
  doi          = {10.1109/TCSS.2017.2719705},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/ParadiseSPEERP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/SchweitzerSMS17,
  author       = {Nadav Schweitzer and
                  Ariel Stulman and
                  Roy David Margalit and
                  Asaf Shabtai},
  title        = {Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {16},
  number       = {8},
  pages        = {2174--2183},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMC.2016.2622707},
  doi          = {10.1109/TMC.2016.2622707},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/SchweitzerSMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SachidanandaSST17,
  author       = {Vinay Sachidananda and
                  Shachar Siboni and
                  Asaf Shabtai and
                  Jinghui Toh and
                  Suhas Bhairav and
                  Yuval Elovici},
  editor       = {Richard Chow and
                  G{\"{o}}kay Saldamli},
  title        = {Let the Cat Out of the Bag: {A} Holistic Approach Towards Security
                  Analysis of the Internet of Things},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on IoT Privacy,
                  Trust, and Security, IoTPTS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055245.3055251},
  doi          = {10.1145/3055245.3055251},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SachidanandaSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuarnizoTBOTSE17,
  author       = {Juan David Guarnizo and
                  Amit Tambe and
                  Suman Sankar Bhunia and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Jianying Zhou and
                  Ernesto Damiani},
  title        = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  pages        = {57--68},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055186.3055192},
  doi          = {10.1145/3055186.3055192},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuarnizoTBOTSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ShwartzSSO17,
  author       = {Omer Shwartz and
                  Guy Shitrit and
                  Asaf Shabtai and
                  Yossi Oren},
  title        = {From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using
                  Malicious Aftermarket Parts},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017},
  pages        = {94--98},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSPW.2017.57},
  doi          = {10.1109/EUROSPW.2017.57},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ShwartzSSO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GluckPOS17,
  author       = {Tomer Gluck and
                  Rami Puzis and
                  Yossi Oren and
                  Asaf Shabtai},
  title        = {The Curious Case of the Curious Case: Detecting Touchscreen Events
                  Using a Smartphone Protective Case},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017},
  pages        = {99--103},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSPW.2017.58},
  doi          = {10.1109/EUROSPW.2017.58},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GluckPOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/BitonFESSTK17,
  author       = {Ron Biton and
                  Clint Feher and
                  Yuval Elovici and
                  Asaf Shabtai and
                  Gaby Shugol and
                  Raz Tikochinski and
                  Shachar Kur},
  title        = {A Proxy-Based Solution for Securiting Remote Desktop Connections in
                  Mission-Critical Systems},
  booktitle    = {18th {IEEE} International Symposium on High Assurance Systems Engineering,
                  {HASE} 2017, Singapore, January 12-14, 2017},
  pages        = {153--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HASE.2017.38},
  doi          = {10.1109/HASE.2017.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/BitonFESSTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MeidanBSGOTE17,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Asaf Shabtai and
                  Juan David Guarnizo and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  editor       = {Ahmed Seffah and
                  Birgit Penzenstadler and
                  Carina Alves and
                  Xin Peng},
  title        = {ProfilIoT: a machine learning approach for IoT device identification
                  based on network traffic analysis},
  booktitle    = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech,
                  Morocco, April 3-7, 2017},
  pages        = {506--509},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3019612.3019878},
  doi          = {10.1145/3019612.3019878},
  timestamp    = {Wed, 01 Feb 2023 17:58:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/MeidanBSGOTE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/ShwartzCSO17,
  author       = {Omer Shwartz and
                  Amir Cohen and
                  Asaf Shabtai and
                  Yossi Oren},
  editor       = {William Enck and
                  Collin Mulliner},
  title        = {Shattered Trust: When Replacement Smartphone Components Attack},
  booktitle    = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver,
                  BC, Canada, August 14-15, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/woot17/workshop-program/presentation/shwartz},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/ShwartzCSO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FinkelsteinBPS17,
  author       = {Andrey Finkelstein and
                  Ron Biton and
                  Rami Puzis and
                  Asaf Shabtai},
  title        = {Classification of Smartphone Users Using Internet Traffic},
  journal      = {CoRR},
  volume       = {abs/1701.00220},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.00220},
  eprinttype    = {arXiv},
  eprint       = {1701.00220},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FinkelsteinBPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GuarnizoTBOTSE17,
  author       = {Juan Guarnizo and
                  Amit Tambe and
                  Suman Sankar Bhunia and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots},
  journal      = {CoRR},
  volume       = {abs/1701.02446},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.02446},
  eprinttype    = {arXiv},
  eprint       = {1701.02446},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GuarnizoTBOTSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/StanESSTK17,
  author       = {Orly Stan and
                  Yuval Elovici and
                  Asaf Shabtai and
                  Gaby Shugol and
                  Raz Tikochinski and
                  Shachar Kur},
  title        = {Protecting Military Avionics Platforms from Attacks on {MIL-STD-1553}
                  Communication Bus},
  journal      = {CoRR},
  volume       = {abs/1707.05032},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.05032},
  eprinttype    = {arXiv},
  eprint       = {1707.05032},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/StanESSTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RosenbergSRE17,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {Generic Black-Box End-to-End Attack against RNNs and Other {API} Calls
                  Based Malware Classifiers},
  journal      = {CoRR},
  volume       = {abs/1707.05970},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.05970},
  eprinttype    = {arXiv},
  eprint       = {1707.05970},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RosenbergSRE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04647,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Asaf Shabtai and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Juan David Guarnizo and
                  Yuval Elovici},
  title        = {Detection of Unauthorized IoT Devices Using Machine Learning Techniques},
  journal      = {CoRR},
  volume       = {abs/1709.04647},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.04647},
  eprinttype    = {arXiv},
  eprint       = {1709.04647},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-04647.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-08395,
  author       = {Asaf Nadler and
                  Avi Aminov and
                  Asaf Shabtai},
  title        = {Detection of Malicious and Low Throughput Data Exfiltration Over the
                  {DNS} Protocol},
  journal      = {CoRR},
  volume       = {abs/1709.08395},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.08395},
  eprinttype    = {arXiv},
  eprint       = {1709.08395},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-08395.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-10192,
  author       = {Edan Habler and
                  Asaf Shabtai},
  title        = {Using {LSTM} Encoder-Decoder Algorithm for Detecting Anomalous {ADS-B}
                  Messages},
  journal      = {CoRR},
  volume       = {abs/1711.10192},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.10192},
  eprinttype    = {arXiv},
  eprint       = {1711.10192},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-10192.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cogcom/OfekPRCHS16,
  author       = {Nir Ofek and
                  Soujanya Poria and
                  Lior Rokach and
                  Erik Cambria and
                  Amir Hussain and
                  Asaf Shabtai},
  title        = {Unsupervised Commonsense Knowledge Enrichment for Domain-Specific
                  Sentiment Analysis},
  journal      = {Cogn. Comput.},
  volume       = {8},
  number       = {3},
  pages        = {467--477},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12559-015-9375-3},
  doi          = {10.1007/S12559-015-9375-3},
  timestamp    = {Tue, 25 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cogcom/OfekPRCHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/NissimCMSEBE16,
  author       = {Nir Nissim and
                  Aviad Cohen and
                  Robert Moskovitch and
                  Asaf Shabtai and
                  Matan Edri and
                  Oren Bar{-}Ad and
                  Yuval Elovici},
  title        = {Keeping pace with the creation of new malicious {PDF} files using
                  an active-learning based detection framework},
  journal      = {Secur. Informatics},
  volume       = {5},
  number       = {1},
  pages        = {1},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13388-016-0026-3},
  doi          = {10.1186/S13388-016-0026-3},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/secinf/NissimCMSEBE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShabtaiBRGES16,
  author       = {Asaf Shabtai and
                  Maya Bercovitch and
                  Lior Rokach and
                  Ya'akov (Kobi) Gal and
                  Yuval Elovici and
                  Erez Shmueli},
  title        = {Behavioral Study of Users When Interacting with Active Honeytokens},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {9:1--9:21},
  year         = {2016},
  url          = {https://doi.org/10.1145/2854152},
  doi          = {10.1145/2854152},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShabtaiBRGES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/SchweitzerSSM16,
  author       = {Nadav Schweitzer and
                  Ariel Stulman and
                  Asaf Shabtai and
                  Roy David Margalit},
  title        = {Mitigating Denial of Service Attacks in {OLSR} Protocol Using Fictitious
                  Nodes},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {163--172},
  year         = {2016},
  url          = {https://doi.org/10.1109/TMC.2015.2409877},
  doi          = {10.1109/TMC.2015.2409877},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/SchweitzerSSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/SiboniSTLE16,
  author       = {Shachar Siboni and
                  Asaf Shabtai and
                  Nils Ole Tippenhauer and
                  Jemin Lee and
                  Yuval Elovici},
  title        = {Advanced Security Testbed Framework for Wearable IoT Devices},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {16},
  number       = {4},
  pages        = {26:1--26:25},
  year         = {2016},
  url          = {https://doi.org/10.1145/2981546},
  doi          = {10.1145/2981546},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/SiboniSTLE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MirskySRSE16,
  author       = {Yisroel Mirsky and
                  Asaf Shabtai and
                  Lior Rokach and
                  Bracha Shapira and
                  Yuval Elovici},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {SherLock vs Moriarty: {A} Smartphone Dataset for Cybersecurity Research},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996764},
  doi          = {10.1145/2996758.2996764},
  timestamp    = {Mon, 26 Jun 2023 20:41:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MirskySRSE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SachidanandaTSS16,
  author       = {Vinay Sachidananda and
                  Jinghui Toh and
                  Shachar Siboni and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{POSTER:} Towards Exposing Internet of Things: {A} Roadmap},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1820--1822},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2989046},
  doi          = {10.1145/2976749.2989046},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SachidanandaTSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/SchweitzerSS16,
  author       = {Nadav Schweitzer and
                  Ariel Stulman and
                  Asaf Shabtai},
  editor       = {Albert Y. Zomaya and
                  Geyong Min and
                  Antonio A. F. Loureiro},
  title        = {Neighbor Contamination to Achieve Complete Bottleneck Control},
  booktitle    = {Proceedings of the 19th {ACM} International Conference on Modeling,
                  Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2016,
                  Malta, November 13-17, 2016},
  pages        = {247--253},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2988287.2989146},
  doi          = {10.1145/2988287.2989146},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mswim/SchweitzerSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbp-brims/FinkelshteinPSS16,
  author       = {Andrey Finkelshtein and
                  Rami Puzis and
                  Asaf Shabtai and
                  Bronislav Sidik},
  editor       = {Kevin S. Xu and
                  David Reitter and
                  Dongwon Lee and
                  Nathaniel Osgood},
  title        = {Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic},
  booktitle    = {Social, Cultural, and Behavioral Modeling, 9th International Conference,
                  SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9708},
  pages        = {239--249},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39931-7\_23},
  doi          = {10.1007/978-3-319-39931-7\_23},
  timestamp    = {Tue, 29 Dec 2020 18:35:21 +0100},
  biburl       = {https://dblp.org/rec/conf/sbp-brims/FinkelshteinPSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FeherSSP16,
  author       = {Ben Feher and
                  Lior Sidi and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {The Security of WebRTC},
  journal      = {CoRR},
  volume       = {abs/1601.00184},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.00184},
  eprinttype    = {arXiv},
  eprint       = {1601.00184},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FeherSSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SiboniSSE16,
  author       = {Shachar Siboni and
                  Vinay Sachidananda and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Security Testbed for the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1610.05971},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.05971},
  eprinttype    = {arXiv},
  eprint       = {1610.05971},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SiboniSSE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Shabtai16,
  author       = {Asaf Shabtai},
  title        = {Anomaly Detection Using the Knowledge-based Temporal Abstraction Method},
  journal      = {CoRR},
  volume       = {abs/1612.04804},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.04804},
  eprinttype    = {arXiv},
  eprint       = {1612.04804},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Shabtai16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/BokobzaPRPSS15,
  author       = {Yasmin Bokobza and
                  Abigail Paradise and
                  Guy Rapaport and
                  Rami Puzis and
                  Bracha Shapira and
                  Asaf Shabtai},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Leak Sinks: The Threat of Targeted Social Eavesdropping},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {375--382},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2808891},
  doi          = {10.1145/2808797.2808891},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/BokobzaPRPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/ParadiseSP15,
  author       = {Abigail Paradise and
                  Asaf Shabtai and
                  Rami Puzis},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Hunting Organization-Targeted Socialbots},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {537--540},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2809396},
  doi          = {10.1145/2808797.2809396},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/ParadiseSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/HazanS15,
  author       = {Itay Hazan and
                  Asaf Shabtai},
  editor       = {Aharon Abadi and
                  Danny Dig and
                  Yael Dubinsky},
  title        = {Noise Reduction of Mobile Sensors Data in the Prediction of Demographic
                  Attributes},
  booktitle    = {2nd {ACM} International Conference on Mobile Software Engineering
                  and Systems, MOBILESoft 2015, Florence, Italy, May 16-17, 2015},
  pages        = {117--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MobileSoft.2015.25},
  doi          = {10.1109/MOBILESOFT.2015.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/HazanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BitonKS15,
  author       = {Ron Biton and
                  Gilad Katz and
                  Asaf Shabtai},
  editor       = {Aharon Abadi and
                  Danny Dig and
                  Yael Dubinsky},
  title        = {Sensor-Based Approach for Predicting Departure Time of Smartphone
                  Users},
  booktitle    = {2nd {ACM} International Conference on Mobile Software Engineering
                  and Systems, MOBILESoft 2015, Florence, Italy, May 16-17, 2015},
  pages        = {146--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MobileSoft.2015.37},
  doi          = {10.1109/MOBILESOFT.2015.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BitonKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism/LivshitsMPS15,
  author       = {David Livshits and
                  Alexandra Mikityuk and
                  Stefan Pham and
                  Asaf Shabtai},
  title        = {Towards Security of Native {DRM} Execution in {HTML5}},
  booktitle    = {2015 {IEEE} International Symposium on Multimedia, {ISM} 2015, Miami,
                  FL, USA, December 14-16, 2015},
  pages        = {411--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISM.2015.48},
  doi          = {10.1109/ISM.2015.48},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ism/LivshitsMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MirskyCS15,
  author       = {Yisroel Mirsky and
                  Noam Cohen and
                  Asaf Shabtai},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Up-High to Down-Low: Applying Machine Learning to an Exploit Database},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {184--200},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_13},
  doi          = {10.1007/978-3-319-27179-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MirskyCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MoradS15,
  author       = {Idan Morad and
                  Asaf Shabtai},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Detecting Computers in Cyber Space Maliciously Exploited as {SSH}
                  Proxies},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {201--211},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_14},
  doi          = {10.1007/978-3-319-27179-8\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MoradS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShabtaiME15,
  author       = {Asaf Shabtai and
                  Dudu Mimran and
                  Yuval Elovici},
  title        = {Evaluation of Security Solutions for Android Systems},
  journal      = {CoRR},
  volume       = {abs/1502.04870},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.04870},
  eprinttype    = {arXiv},
  eprint       = {1502.04870},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShabtaiME15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShabtaiTMRSE14,
  author       = {Asaf Shabtai and
                  Lena Tenenboim{-}Chekina and
                  Dudu Mimran and
                  Lior Rokach and
                  Bracha Shapira and
                  Yuval Elovici},
  title        = {Mobile malware detection through analysis of deviations in application
                  network behavior},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {1--18},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.009},
  doi          = {10.1016/J.COSE.2014.02.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShabtaiTMRSE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ParadisePS14,
  author       = {Abigail Paradise and
                  Rami Puzis and
                  Asaf Shabtai},
  title        = {Anti-Reconnaissance Tools: Detecting Targeted Socialbots},
  journal      = {{IEEE} Internet Comput.},
  volume       = {18},
  number       = {5},
  pages        = {11--19},
  year         = {2014},
  url          = {https://doi.org/10.1109/MIC.2014.81},
  doi          = {10.1109/MIC.2014.81},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ParadisePS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/OfekS14,
  author       = {Nir Ofek and
                  Asaf Shabtai},
  title        = {Dynamic Latent Expertise Mining in Social Networks},
  journal      = {{IEEE} Internet Comput.},
  volume       = {18},
  number       = {5},
  pages        = {20--27},
  year         = {2014},
  url          = {https://doi.org/10.1109/MIC.2014.83},
  doi          = {10.1109/MIC.2014.83},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/OfekS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/KatzSRO14,
  author       = {Gilad Katz and
                  Asaf Shabtai and
                  Lior Rokach and
                  Nir Ofek},
  title        = {ConfDTree: {A} Statistical Method for Improving Decision Trees},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {29},
  number       = {3},
  pages        = {392--407},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11390-014-1438-5},
  doi          = {10.1007/S11390-014-1438-5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/KatzSRO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VartanianS14,
  author       = {Arik Vartanian and
                  Asaf Shabtai},
  title        = {TM-Score: {A} Misuseability Weight Measure for Textual Content},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {12},
  pages        = {2205--2219},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2359370},
  doi          = {10.1109/TIFS.2014.2359370},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VartanianS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/DrorSRE14,
  author       = {Ma'ayan Dror and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {{OCCT:} {A} One-Class Clustering Tree for Implementing One-to-Many
                  Data Linkage},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {26},
  number       = {3},
  pages        = {682--697},
  year         = {2014},
  url          = {https://doi.org/10.1109/TKDE.2013.23},
  doi          = {10.1109/TKDE.2013.23},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/DrorSRE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShabtaiE14,
  author       = {Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Misuseablity Analysis for {IT} Infrastructure},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1496--1498},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662385},
  doi          = {10.1145/2660267.2662385},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShabtaiE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NissimCMSEBE14,
  author       = {Nir Nissim and
                  Aviad Cohen and
                  Robert Moskovitch and
                  Asaf Shabtai and
                  Mattan Edry and
                  Oren Bar{-}Ad and
                  Yuval Elovici},
  title        = {{ALPD:} Active Learning Framework for Enhancing the Detection of Malicious
                  {PDF} Files},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {91--98},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.23},
  doi          = {10.1109/JISIC.2014.23},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/NissimCMSEBE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/KatzSR14,
  author       = {Gilad Katz and
                  Asaf Shabtai and
                  Lior Rokach},
  editor       = {Andreas Holzinger and
                  Igor Jurisica},
  title        = {Adapted Features and Instance Selection for Improving Co-training},
  booktitle    = {Interactive Knowledge Discovery and Data Mining in Biomedical Informatics
                  - State-of-the-Art and Future Challenges},
  series       = {Lecture Notes in Computer Science},
  volume       = {8401},
  pages        = {81--100},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43968-5\_5},
  doi          = {10.1007/978-3-662-43968-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/KatzSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jasis/ZilbermanKSE13,
  author       = {Polina Zilberman and
                  Gilad Katz and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Analyzing group E-mail exchange to detect data leakage},
  journal      = {J. Assoc. Inf. Sci. Technol.},
  volume       = {64},
  number       = {9},
  pages        = {1780--1790},
  year         = {2013},
  url          = {https://doi.org/10.1002/asi.22886},
  doi          = {10.1002/ASI.22886},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jasis/ZilbermanKSE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkdd/ShabtaiBRE13,
  author       = {Asaf Shabtai and
                  Maya Bercovitch and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {Optimizing Data Misuse Detection},
  journal      = {{ACM} Trans. Knowl. Discov. Data},
  volume       = {8},
  number       = {3},
  pages        = {16:1--16:23},
  year         = {2013},
  url          = {https://doi.org/10.1145/2611520},
  doi          = {10.1145/2611520},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkdd/ShabtaiBRE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdata/ShabtaiMKEVGRE13,
  author       = {Asaf Shabtai and
                  Idan Morad and
                  Eyal Kolman and
                  Ereli Eran and
                  Alex Vaystikh and
                  Eyal Gruss and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {IP2User - Identifying the Username of an {IP} Address in Network-Related
                  Events},
  booktitle    = {{IEEE} International Congress on Big Data, BigData Congress 2013,
                  Santa Clara, CA, USA, June 27 2013-July 2, 2013},
  pages        = {435--436},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/BigData.Congress.2013.73},
  doi          = {10.1109/BIGDATA.CONGRESS.2013.73},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdata/ShabtaiMKEVGRE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MenahemSL13,
  author       = {Eitan Menahem and
                  Asaf Shabtai and
                  Adi Levhar},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Detecting malware through temporal function-based features},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1379--1382},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512505},
  doi          = {10.1145/2508859.2512505},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MenahemSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-2028,
  author       = {Yuri Shapira and
                  Bracha Shapira and
                  Asaf Shabtai},
  title        = {Content-based data leakage detection using extended fingerprinting},
  journal      = {CoRR},
  volume       = {abs/1302.2028},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.2028},
  eprinttype    = {arXiv},
  eprint       = {1302.2028},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-2028.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/ShabtaiER12,
  author       = {Asaf Shabtai and
                  Yuval Elovici and
                  Lior Rokach},
  title        = {A Survey of Data Leakage Detection and Prevention Solutions},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-1-4614-2053-8},
  doi          = {10.1007/978-1-4614-2053-8},
  isbn         = {978-1-4614-2052-1},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/sbcs/ShabtaiER12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/ShabtaiKEGW12,
  author       = {Asaf Shabtai and
                  Uri Kanonov and
                  Yuval Elovici and
                  Chanan Glezer and
                  Yael Weiss},
  title        = {"Andromaly": a behavioral malware detection framework for
                  android devices},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {38},
  number       = {1},
  pages        = {161--190},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10844-010-0148-x},
  doi          = {10.1007/S10844-010-0148-X},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jiis/ShabtaiKEGW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/ShabtaiSE12,
  author       = {Asaf Shabtai and
                  Yuval Shahar and
                  Yuval Elovici},
  title        = {A distributed architecture for efficient parallelization and computation
                  of knowledge-based temporal abstractions},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {39},
  number       = {1},
  pages        = {249--286},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10844-011-0190-3},
  doi          = {10.1007/S10844-011-0190-3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/ShabtaiSE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/ShabtaiMFDE12,
  author       = {Asaf Shabtai and
                  Robert Moskovitch and
                  Clint Feher and
                  Shlomi Dolev and
                  Yuval Elovici},
  title        = {Detecting unknown malicious code by applying classification techniques
                  on OpCode patterns},
  journal      = {Secur. Informatics},
  volume       = {1},
  number       = {1},
  pages        = {1},
  year         = {2012},
  url          = {https://doi.org/10.1186/2190-8532-1-1},
  doi          = {10.1186/2190-8532-1-1},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/ShabtaiMFDE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HarelSRE12,
  author       = {Amir Harel and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {M-Score: {A} Misuseability Weight Measure},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {414--428},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.17},
  doi          = {10.1109/TDSC.2012.17},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HarelSRE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/KatzSRO12,
  author       = {Gilad Katz and
                  Asaf Shabtai and
                  Lior Rokach and
                  Nir Ofek},
  editor       = {Mohammed Javeed Zaki and
                  Arno Siebes and
                  Jeffrey Xu Yu and
                  Bart Goethals and
                  Geoffrey I. Webb and
                  Xindong Wu},
  title        = {ConfDTree: Improving Decision Trees Using Confidence Intervals},
  booktitle    = {12th {IEEE} International Conference on Data Mining, {ICDM} 2012,
                  Brussels, Belgium, December 10-13, 2012},
  pages        = {339--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDM.2012.19},
  doi          = {10.1109/ICDM.2012.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/KatzSRO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShabtaiPFME11,
  author       = {Asaf Shabtai and
                  Dennis Potashnik and
                  Yuval Fledel and
                  Robert Moskovitch and
                  Yuval Elovici},
  title        = {Monitoring, analysis, and filtering system for purifying network traffic
                  of known and unknown malicious content},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {8},
  pages        = {947--965},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.229},
  doi          = {10.1002/SEC.229},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShabtaiPFME11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/ShabtaiME11,
  author       = {Asaf Shabtai and
                  Eitan Menahem and
                  Yuval Elovici},
  title        = {F-Sign: Automatic, Function-Based Signature Generation for Malware},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {41},
  number       = {4},
  pages        = {494--508},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSMCC.2010.2068544},
  doi          = {10.1109/TSMCC.2010.2068544},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/ShabtaiME11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GafnySRE11,
  author       = {Ma'ayan Gafny and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: applying unsupervised context-based analysis for detecting
                  unauthorized data disclosure},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {765--768},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093488},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GafnySRE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZilbermanDKES11,
  author       = {Polina Zilberman and
                  Shlomi Dolev and
                  Gilad Katz and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Analyzing group communication for preventing data leakage via email},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {37--41},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984047},
  doi          = {10.1109/ISI.2011.5984047},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZilbermanDKES11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BercovitchRHSRE11,
  author       = {Maya Bercovitch and
                  Meir Renford and
                  Lior Hasson and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {HoneyGen: An automated honeytokens generator},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {131--136},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984063},
  doi          = {10.1109/ISI.2011.5984063},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BercovitchRHSRE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HarelSRE11,
  author       = {Amir Harel and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {Dynamic Sensitivity-Based Access Control},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {201--203},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5984080},
  doi          = {10.1109/ISI.2011.5984080},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HarelSRE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kcap/HarelSRE11,
  author       = {Amir Harel and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Mark A. Musen and
                  {\'{O}}scar Corcho},
  title        = {Eliciting domain expert misuseability conceptions},
  booktitle    = {Proceedings of the 6th International Conference on Knowledge Capture
                  {(K-CAP} 2011), June 26-29, 2011, Banff, Alberta, Canada},
  pages        = {193--194},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1999676.1999721},
  doi          = {10.1145/1999676.1999721},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kcap/HarelSRE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShabtaiFKEDG10,
  author       = {Asaf Shabtai and
                  Yuval Fledel and
                  Uri Kanonov and
                  Yuval Elovici and
                  Shlomi Dolev and
                  Chanan Glezer},
  title        = {Google Android: {A} Comprehensive Security Assessment},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {2},
  pages        = {35--44},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.2},
  doi          = {10.1109/MSP.2010.2},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShabtaiFKEDG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShabtaiFE10,
  author       = {Asaf Shabtai and
                  Yuval Fledel and
                  Yuval Elovici},
  title        = {Securing Android-Powered Mobile Devices Using SELinux},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {3},
  pages        = {36--44},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2009.144},
  doi          = {10.1109/MSP.2009.144},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShabtaiFE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ShabtaiKE10,
  author       = {Asaf Shabtai and
                  Uri Kanonov and
                  Yuval Elovici},
  title        = {Intrusion detection for mobile devices using the knowledge-based,
                  temporal abstraction method},
  journal      = {J. Syst. Softw.},
  volume       = {83},
  number       = {8},
  pages        = {1524--1537},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jss.2010.03.046},
  doi          = {10.1016/J.JSS.2010.03.046},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ShabtaiKE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ShabtaiFES10,
  author       = {Asaf Shabtai and
                  Yuval Fledel and
                  Yuval Elovici and
                  Yuval Shahar},
  title        = {Using the {KBTA} method for inferring computer and network security
                  alerts from time-stamped, raw system metrics},
  journal      = {J. Comput. Virol.},
  volume       = {6},
  number       = {3},
  pages        = {239--259},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11416-009-0125-5},
  doi          = {10.1007/S11416-009-0125-5},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/ShabtaiFES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GafnySRE10,
  author       = {Ma'ayan Gafny and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Detecting data misuse by applying context-based data linkage},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866890},
  doi          = {10.1145/1866886.1866890},
  timestamp    = {Thu, 17 Feb 2022 15:07:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GafnySRE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarelSRE10,
  author       = {Amir Harel and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {M-score: estimating the potential damage of data leakage incident
                  by assigning misuseability weight},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  pages        = {13--20},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886.1866891},
  doi          = {10.1145/1866886.1866891},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HarelSRE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShabtaiFE10,
  author       = {Asaf Shabtai and
                  Yuval Fledel and
                  Yuval Elovici},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Automated Static Code Analysis for Classifying Android Applications
                  Using Machine Learning},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {329--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.77},
  doi          = {10.1109/CIS.2010.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShabtaiFE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/Shabtai10,
  author       = {Asaf Shabtai},
  editor       = {Takahiro Hara and
                  Christian S. Jensen and
                  Vijay Kumar and
                  Sanjay Madria and
                  Demetrios Zeinalipour{-}Yazti},
  title        = {Malware Detection on Mobile Devices},
  booktitle    = {Eleventh International Conference on Mobile Data Management, {MDM}
                  2010, Kanas City, Missouri, USA, 23-26 May 2010},
  pages        = {289--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MDM.2010.28},
  doi          = {10.1109/MDM.2010.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/Shabtai10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicase/FledelSPE10,
  author       = {Yuval Fledel and
                  Asaf Shabtai and
                  Dennis Potashnik and
                  Yuval Elovici},
  editor       = {Martin L. Griss and
                  Guang Yang},
  title        = {Google Android: An Updated Security Review},
  booktitle    = {Mobile Computing, Applications, and Services - Second International
                  {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {76},
  pages        = {401--414},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-29336-8\_29},
  doi          = {10.1007/978-3-642-29336-8\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicase/FledelSPE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilware/ShabtaiE10,
  author       = {Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Ying Cai and
                  Thomas Magedanz and
                  Minglu Li and
                  Jinchun Xia and
                  Carlo Giannelli},
  title        = {Applying Behavioral Detection on Android-Based Devices},
  booktitle    = {Mobile Wireless Middleware, Operating Systems, and Applications -
                  Third International Conference, Mobilware 2010, Chicago, IL, USA,
                  June 30 - July 2, 2010. Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {48},
  pages        = {235--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17758-3\_17},
  doi          = {10.1007/978-3-642-17758-3\_17},
  timestamp    = {Fri, 27 Oct 2017 16:28:24 +0200},
  biburl       = {https://dblp.org/rec/conf/mobilware/ShabtaiE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZilbermanSR10,
  author       = {Polina Zilberman and
                  Asaf Shabtai and
                  Lior Rokach},
  editor       = {Nadav Aharony and
                  Yaniv Altshuler and
                  Yuval Elovici},
  title        = {Analyzing Group Communication for Preventing Accidental Data Leakage
                  via Email},
  booktitle    = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10,
                  Washington, D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/collsec10/analyzing-group-communication-preventing-accidental-data-leakage-email},
  timestamp    = {Mon, 01 Feb 2021 08:42:51 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZilbermanSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csda/MenahemSRE09,
  author       = {Eitan Menahem and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {Improving malware detection by applying multi-inducer ensemble},
  journal      = {Comput. Stat. Data Anal.},
  volume       = {53},
  number       = {4},
  pages        = {1483--1494},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csda.2008.10.015},
  doi          = {10.1016/J.CSDA.2008.10.015},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csda/MenahemSRE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShabtaiMEG09,
  author       = {Asaf Shabtai and
                  Robert Moskovitch and
                  Yuval Elovici and
                  Chanan Glezer},
  title        = {Detection of malicious code by applying machine learning classifiers
                  on static features: {A} state-of-the-art survey},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {14},
  number       = {1},
  pages        = {16--29},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.istr.2009.03.003},
  doi          = {10.1016/J.ISTR.2009.03.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ShabtaiMEG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShabtaiKE09,
  author       = {Asaf Shabtai and
                  Uri Kanonov and
                  Yuval Elovici},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Detection, Alert and Response to Malicious Behavior in Mobile Devices:
                  Knowledge-Based Approach},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {357--358},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_23},
  doi          = {10.1007/978-3-642-04342-0\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShabtaiKE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-5101,
  author       = {Asaf Shabtai and
                  Yuval Fledel and
                  Uri Kanonov and
                  Yuval Elovici and
                  Shlomi Dolev},
  title        = {Google Android: {A} State-of-the-Art Review of Security Mechanisms},
  journal      = {CoRR},
  volume       = {abs/0912.5101},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.5101},
  eprinttype    = {arXiv},
  eprint       = {0912.5101},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-5101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kcap/ShabtaiASE07,
  author       = {Asaf Shabtai and
                  Maor Atlas and
                  Yuval Shahar and
                  Yuval Elovici},
  editor       = {Derek H. Sleeman and
                  Ken Barker},
  title        = {Evaluation of a temporal-abstraction knowledge acquisition tool in
                  the network security domain},
  booktitle    = {Proceedings of the 4th International Conference on Knowledge Capture
                  {(K-CAP} 2007), October 28-31, 2007, Whistler, BC, Canada},
  pages        = {7--14},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1298406.1298410},
  doi          = {10.1145/1298406.1298410},
  timestamp    = {Mon, 24 Aug 2020 15:16:10 +0200},
  biburl       = {https://dblp.org/rec/conf/kcap/ShabtaiASE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ki/EloviciSMTG07,
  author       = {Yuval Elovici and
                  Asaf Shabtai and
                  Robert Moskovitch and
                  Gil Tahan and
                  Chanan Glezer},
  editor       = {Joachim Hertzberg and
                  Michael Beetz and
                  Roman Englert},
  title        = {Applying Machine Learning Techniques for Detection of Malicious Code
                  in Network Traffic},
  booktitle    = {{KI} 2007: Advances in Artificial Intelligence, 30th Annual German
                  Conference on AI, {KI} 2007, Osnabr{\"{u}}ck, Germany, September
                  10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4667},
  pages        = {44--50},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74565-5\_5},
  doi          = {10.1007/978-3-540-74565-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ki/EloviciSMTG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ShabtaiKSE06,
  author       = {Asaf Shabtai and
                  Denis Klimov and
                  Yuval Shahar and
                  Yuval Elovici},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {An intelligent, interactive tool for exploration and visualization
                  of time-oriented security data},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179580},
  doi          = {10.1145/1179576.1179580},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ShabtaiKSE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics