Conference Papers 2014

active_pdf Mordechai Guri, Anatoly Krasner, Yuval Elovici, "Peers-Based Location of Mobile Devices." The 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications (FCC 2014) (January 14, 2014).
active_pdf R. Puzis, L. Nacshon, "NetFlow for OpenFlow. Integrating legacy flow-based NIDS with OpenFlow networks" (POSTER). Network and Distributed System Security Symposium (NDSS) in San-Diego, CA, USA. (Feb 23-26, 2014).
active_pdf Alon Palombo, Roni Stern and Rami Puzis, "Solving the Snake in the Box Problem with Heuristic Search:First Results," (POSTER) BISFAI-15, Bar-Illan, Israel, May 10-11, 2015.
active_pdf Blanchard, P., Dolev, S., Beauquier, J., and Delaet, S., “Practically Self-Stabilizing Paxos Replicated State-Machine”. International Conference on NETworked Systems (NETYS), May 15-17, 2014.
active_pdf Baker Masarwi, Yossi Ben Shlomo, Rami Puzis, Oded Green, "Faster Clustering Coefficient Algorithm Using BFS Horizontal Edges," (POSTER). NetSci, Berkeley, CA, US, June 2-4, 2014. 
active_pdf Yasmin Bokobza, Abigail Paradise, Guy Rapaport, Rami Puzis, Bracha Shapira, "Information Leakage Detection in Social Networks Using an Artificial Profile," (POSTER) NetSci, Zaragoza, Spain, June 3-5, 2015.
active_pdf Miriam Hoderker, Konstantin Kilimnik, Rami Puzis, "Category Extraction Through Community Detection in Wikipedia," (POSTER) NetSci, Zaragoza, Spain, June 3-5, 2015.
active_pdf Bronislav Sidik, Yisrael Mirsky, Luiza Nachson and Rami Puzis, "Temporal Anomaly Detection in Dynamic Graphs," (POSTER). NetSci, Zaragoza, Spain, June 3-5, 2015.
active_pdf Yedidya Bar-Zev, Arik Vartanian and Rami Puzis, "Graph Classification using Information-Gain Feature Ranking," NetSci, Berkeley, CA, US, 2014.
active_pdf Elina Yaakobovich, Rami Puzis, "Lookie - A Case Study of a Location Based Collaborative Application," COLLA 2014, (June 22 - 26, 2014), Seville, Spain (best paper award, Acceptance rate: 30%).
active_pdf M. Guri, G. Kedma, B. Carmeli, Y. Elovici, “Limiting access to unintentionally leaked sensitive documents using malware signatures,” The ACM Symposium on Access Control Models and Technologies (SACMAT 2014) (June 26, 2014).
active_pdf Liron Samama, Rami Puzis, Roni Stern and Ariel Felner, "Extended Framework for  Target Oriented Network Intelligence Collection," SoCS 2014, Czech Republic (August 15-17, 2014).
active_pdf Roni Stern, Scott Kiese, Rami Puzis, Ariel Felner and Wheeler Ruml, "Max is More than Min: Solving Maximization Problems with Heuristic Search," SoCS 2014, Czech Republic (August 15-17, 2014). (Best paper award), IJCAI 2015.
active_pdf N. Nissim, M. R. Boland, R. Moskovitch, N. Tatonetti, Y. Elovici, Y. Shahar, G. Hripcsak. "CAESAR-ALE: An Active Learning Enhancement for Conditions Severity Classification," BigCHAT Workshop at KDD Conference (Aug. 24, 2014).
active_pdf M. Unger, et al. "Contexto: lessons learned from mobile context inference." Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (ACM 2014) (September 13-17, 2014).
active_pdf
M. Guri, G. Kedma, A. Kachlon and Y. Elovici, "Resilience of anti-malware programs to naïve modifications of malicious binaries," IEEE JISIC-2014, (September 24, 2014).
active_pdf
M. Guri, G. Kedma, B. Zadov and Y. Elovici, "Trusted detection of sensitive activities on mobile phones using power consumption measurements," IEEE JISIC-2014, (September 24, 2014).
active_pdf N. Nissim, A. Cohen, R. Moskovitch, O. Barad, M. Edry, A. Shabatai, Y. Elovici, "ALPD: Active Learning framework for Enhancing the Detection of Malicious PDF Files aimed at Organizations,” IEEE JISIC-2014 (Sept. 24, 2014).
active_pdf A. Maraee, M. Balaban, "Removing Redundancies and Deducing Equivalences in UML Class Diagrams," ACM/IEEE 17th International Conference on Model Driven Engineering Languages and Systems. (MODELS 2014) (Oct. 1, 2014).
 active_pdf M. Guri, G. Kedma, A. Kachlon and Y. Elovici, "AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies," IEEE MALCON-2014, (October 28, 2014).
active_pdf G. Nakibly, E. Menahem, A. Waizel, Y. Elovici, "OSPF Vulnerability To Persistent Poisoning Attacks: A Systematic Analysis," Annual Computer Security Applications Conference (ACSAC 2014) in Seattle, WA, USA (December 11, 2014).

About Telekom Innovation Laboratories

LogoDTGerman

As one of the world's leading telecommunications and information technology service providers, Telekom Innovation Laboratories is setting international standards.

Contact Us

contact_us

Telekom Innovation Laboratories at Ben-Gurion University of the Negev - P.O.B. 653 Beer Sheva, 84105, Israel
Phone: +972 8 6428120/21
e-mail : This email address is being protected from spambots. You need JavaScript enabled to view it.