Conference Papers 2015

active_pdf

D. Ben-Shimon, L. Rokach, B. Shapira, G. Shani, "Fast Item-Based Collaborative Filtering." The 7th International Conference on Agents and Artificial Intelligence (ICAART 2015) in Lisbon, Portugal, (January 10-12, 2015).

active_pdf Alon Palombo, Roni Stern and Rami Puzis, "Solving the Snake in the Box Problem with Heuristic Search:First Results," (POSTER). BISFAI-15, Bar-Ilan, Israel (May 10-11, 2015).
active_pdf

Itay Hazan, Asaf Shabtai. "Noise Reduction of Mobile Sensors Data in the Prediction of Demographic Attributes," 2nd ACM International Conference on Mobile Software Engineering and Systems. (MOBILESoft 2015). May 16-17, 2015 Florence, Italy.

active_pdf

Yisroel Mirsky, Bracha Shapira , Lior Rokach, Yuval Elovici, "pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts," The 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. PAKDD. May 19-22, 2015.

active_pdf Miriam Hoderker, Konstantin Kilimnik, Rami Puzis, "Category Extraction Through Community Detection in Wikipedia," (POSTER). NetSci, Zaragoza, Spain, June 3-5, 2015.
active_pdf Bronislav Sidik, Yisrael Mirsky, Luiza Nachson and Rami Puzis, "Temporal Anomaly Detection in Dynamic Graphs," (POSTER). NetSci, Zaragoza, Spain, June 3-5, 2015.
active_pdf Yasmin Bokobza, Abigail Paradise, Guy Rapaport, Rami Puzis, Bracha Shapira, "Information Leakage Detection in Social Networks Using an Artificial Profile," (POSTER) NetSci, Zaragoza, Spain, June 3-5, 2015.
active_pdf

Yisroel Mirsky, Aviad Cohen, Roni Stern, Ariel Felner, Lior Rokach, Bracha Shapira, Yuval Elovici, "Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection in Markov Chains." SOCS 2015, Ein Gedi, Israel, June 11-13, 2015.

active_pdf

Mirsky, Yisroel, Noam Gross, and Asaf Shabtai. "Up-high to Down-low: Applying Machine Learning to an Exploit Database", International Conference on Security for Information Technology and Communications (SECITC), 2015.

active_pdf Mirsky, Yisroel, Simon Dzanashvili. “TouchLeak: A New Approach for Touch Loggers on Smartphones”. The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2015.
active_pdf

Zahy Bnaya, Alon Palombo, Rami Puzis and Ariel Felner, "Confidence Backup. Updates for Aggregating MDP State values in Monte-Carlo Tree Search," SoCS 2015, Ein Gedi, Israel, June 11-13, 2015.

active_pdf

Ofrit Lesser, “Gender and Network Structure in Online Social Networks.” Gender and Social Networks, Sunbelt XXXV, Brighton, UK 23-28 June 2015.

active_pdf

Nir Nissim, Mary Regina Boland, Robert Moskovitch, Nicholas P Tatonetti, Yuval Elovici, Yuval Shahar, George Hripcsak, "An Active Learning Framework for Efficient Condition Severity Classification." Conference of Artificial Intelligence in Medicine 2015 (AIME-15), Pavia, Italy, June 17-20, 2015.

active_pdf

Mordechai Guri, Matan Monitz, Yisrael Mirski, Yuval Elovici, "BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations." 28th IEEE Computer Security Foundations Symposium (CSF 2015). Verona Italy, July 14-17.

active_pdf Dali Betzalel, N., Shapira, B., & Rokach, L. (2015, September). "Please, Not Now!: A Model for Timing Recommendations." In Proceedings of the 9th ACM Conference on Recommender Systems (pp. 297-300) ACM.
active_pdf

Unger, Moshe. "Latent Context-Aware Recommender Systems." Proceedings of the 9th ACM Conference on Recommender Systems. ACM, 2015.

active_pdf Nir Nissim, Aviad Cohen, Yuval Elovici. "Designated Active Learning Methods for Enhanced Detection of Unknown Malicious Microsoft Office Documents." ODDX3 Workshop at KDD Conference (2015), Sydney.
active_pdf Aviad Cohen, Nir Nissim, Yuval Elovici. Active Learning Methods Aimed at Learning from Small Sample Size for Enhancing the Detection of Malicious Documents. LS3 Workshop at KDD Conference (2015), Sydney.
active_pdf Paradise, A., Shabtai, A., & Puzis, R. (2015). "Hunting Organization- Targeted Socialbots." In Advances in Social Networks Analysis and Mining (ASONAM), 2015 International Conf. on IEEE.
active_pdf Bekerman, D., Shapira, B., Rokach, L., & Bar, A. "Unknown malware detection using network traffic classification". In Communications and Network Security (CNS), 2015 IEEE Conference on (pp. 134-142) IEEE.
active_pdf Moti Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici. JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface. TRUSTCOM '15 Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01 Pages 65-73 IEEE Computer Society Washington, DC, USA.
active_pdf M Guri, A Kachlon, O Hasson, G Kedma, Y Mirsky, Y Elovici, GSMem: data exfiltration from air-gapped computers over GSM frequencies 24th USENIX Security Symposium (USENIX Security 15), 849-864.
active_pdf N. Nissim, A. Cohen and Y. Elovici, "Boosting the Detection of Malicious Documents Using Designated Active Learning Methods," 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), Miami, FL, USA, 2015, pp. 760-765.

About Telekom Innovation Laboratories

LogoDTGerman

As one of the world's leading telecommunications and information technology service providers, Telekom Innovation Laboratories is setting international standards.

Contact Us

contact_us

Telekom Innovation Laboratories at Ben-Gurion University of the Negev - P.O.B. 653 Beer Sheva, 84105, Israel
Phone: +972 8 6428120/21
e-mail : This email address is being protected from spambots. You need JavaScript enabled to view it.