Conference Proceedings

  1. Mordechai Guri, Matan Monitz, Yisrael Mirski, Yuval Elovici, “BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations.” 28th IEEE Computer Security Foundations Symposium (CSF 2015). Verona Italy, July 14-17.

  2. Nir Nissim, Mary Regina Boland, Robert Moskovitch, Nicholas P Tatonetti, Yuval Elovici, Yuval Shahar, George Hripcsak, “An Active Learning Framework for Efficient Condition Severity Classification”. Conference of Artificial Intelligence in Medicine 2015 (AIME-15), Pavia, Italy, June 17-20, 2015.

  3. Yisroel Mirsky, Aviad Cohen, Roni Stern, Ariel Felner, Lior Rokach, Bracha Shapira, Yuval Elovici, “Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection in Markov Chains.” SOCS 2015, Ein Gedi, Israel, June 11-13, 2015.

  4. Yisroel Mirsky, Bracha Shapira , Lior Rokach, Yuval Elovici, “pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.”PAKDD. 2015.

  5. Guri, M., Kedma, G., Carmeli, B., Elovici, Y., “Limiting access to unintentionally leaked sensitive documents using malware signatures”. The ACM Symposium on Access Control Models and Technologies (SACMAT 2014), London, Ontario, Canada, June 25-27, 2014.

  6. Himlich, I, Mimran, D., Dolev, S., Shapira, B., Kopeetsky, M., Elovici, Y., “Exploiting Simultaneous Usage of Different Wireless Interfaces for Security and Mobility”, Second International Conference on Future Generation Communication Technologies (FGCT 2013), London, US, December 12-14, 2013.

  7. Guri, M., Kedma, G., Sela, T., Elovici, Y., “Noninvasive Detection of Anti-Forensic Malware”, Malware Conference 2013 (Malware 2013), Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA, October 22-24, 2013. (Acceptance rake 31%).

  8. Kagan, D., Fier, M., Elovici, Y., “Facebook Applications Installation and Removal- Temporal Analysis”, The Third International Conference on Social Eco-Informatics (SOTICS 2013), Lisbon, Portugal, November 17 – 22, 2013.

  9. Menahem, E., Nakibly, G.,, Amar, N., Elovici, Y., “An Active Strategy For Detecting and Localizing Network Attacks”, ACM Workshop on Artificial Intelligence and Security (AISEC 2013), Berlin, Germany, November 4, 2013.

  10. Menahem, E., Rokach, L., Elovici, Y., “Entity Matching in Online Social Networks”, ACM International Conference on Information and Knowledge Management (CIKM 2013), San Francisco, USA, October 27-November 1st, 2013.

  11. Peled, O., Fire, M., Rokach, L., Elovici, Y., “Entity Matching in Online Social Networks”, ASE/IEEE International Conference on Social Computing 2013 (IEEE SocialCom 2013), Washington D.C., USA, September 8-14, 2013.

  12. Begleiter, R., Elovici, Y., Hollander, Y., Mendelson, O., Rokach, L., Saltzman, R., “A Fast and Scalable Method for Threat Detection in Large-scale DNS Logs”, IEEE International Conference on Big Data 2013 (IEEE BigData 2013), Santa Clara, CA, USA, October 6-9, 2013.
  13. Elishar, A., Fire, M., Kagan, D., Elovici, Y., “Homing Socialbots: Intrusion on a specific organization’s employee using Socialbots”, International Workshop on Social Network Analysis in Applications, co-located with ASONAM 2013, Santa Clara, USA, June 27-July 2, 2013.

  14. Shabtai, A., Kolman, E., Ereli, E., Vaystikh, A., Rokach, L., Elovici, Y., “Identifying the username of an IP Address in Network-Related Events”, IEEE 2nd International Congress on Big Data (BigData 2013) – Work In Progress (WIP) Track, Santa Clara, USA, June 27-July 2, 2013.

  15. Guri, M., Sela, T., Elovici, Y., “OpenAPT: Open-Source Advanced Persistent Threat for Academic Research” Poster in IEEE Symposium on Security and Privacy, San Francisco, USA, May 19-22, 2013.

  16. Kedma, G., Guri, M., Sela, T., Elovici, Y., “Analyzing Users’ Web Surfing Patterns to Trace Terrorists and Criminals”, IEEE International Conference on Intelligence and Security Informatics (ISI 2013), Seattle Washington, USA, June 4-7, 2013.

  17. *Tenenboim-Chekina, L., Barad, O., Shabtai, A., Mimran, D., Rokach, L., Shapira, B.,Elovici, Y. “Detecting Application Update Attack on Mobile Devices through Network Features”, Poster in 32ndIEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 14-19, 2013.

  18. Suissa, E., Chizi, B., Elovici, Y. “Protecting Cellular Networks from Attacks Launched Via Mobile Applications”, Poster in the Third conference on the Analysis of Mobile Phone Datasets (NetMob 2013), MIT, Cambridge, USA, May 1-3, 2013.

  19. *Altshuler,Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A., Pentland, A.S., Lazer, D., “The Social Amplifier – Reaction of Human Communities to Emergencies”, Third conference on the Analysis of Mobile Phone Datasets (NetMob 2013), MIT, Cambridge, USA, May 1-3, 2013.

  20. *Lesser, O., Tenenboim-Chekina, L., Rokach, L., Elovici, Y., “Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks”, The 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013), Washington D.C., USA, April 2 – 5, 2013.

  21. *Altshuler, Y., Fire, M., Aharony, N., Volkovich, Z., Elovici, Y., Pentland, A., “Trade-Offs in Social and Behavioral Modeling in Mobile Networks”, The 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013), Washington D.C., USA, April 2 – 5, 2013.

  22. *Altshuler, Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A.M., Pentland, A., Lazer, D., “Detecting Anomalous Behaviors Using Structural Properties of Social Networks”, The 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013), Washington D.C., USA, April 2 – 5, 2013.

  23. *Bar, A., Mimran, D., Shapira, B., Tenenboim-Chekina, L., Nadeem, T., Elovici, Y., “Nesto – Network Selection and Traffic Offloading System For Android Mobile Device”, The 9th International Wireless Communications & Mobile Computing Conference (IWCMC 2013), Cagliari, Sardinia – Italy, July 1 – 5, 2013.

  24. Fire, M., Katz, G., Elovici, Y., “Strangers Intrusion Detection – Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies”, ASE International Conference on Social Informatics 2012, Washington D.C., USA, December 14-16, 2012. (Acceptance rate 11.5%).

  25. Elishar, A., Fire, M., Kagan, D., Elovici, Y., “Organizational Intrusion: Organization Mining using Socialbots”, ASE International Conference on Cyber Security 2012, Washington D.C., USA, December 14-16, 2012 (Acceptance rate 9.6%).

  26. Fire, M., Katz, G., Elovici, Y., Shapira, B., Rokach, L., “Predicting Student Exam’s Scores by Analyzing Social Network Data”, The International Conference on Active Media Technology 2012, Macau, China, December 4-7, 2012.

  27. Menahem, E., Puzis, R., Elovici, Y., “Detecting Spammers via Aggregated Historical Data Set”, The 6th International Conference on Network and System Security (NSS), Wu Yi Shan, Fujian, China, November 21-23, 2012.

  28. Fire, M., Kagan, D., Elishar, A., Elovici, Y., “Social Privacy Protector – Protecting Users’ Privacy in Social Networks”, The Second International Conference on Social Eco-Informatics (SOTICS), Venice, Italy, October 21-26, 2012.

  29. Menahem, E., Nakibli, G., Elovici, Y., “Network-Based Intrusion Detection Systems Go Active!”, Poster in The19th ACM Conference on Computer and Communications Security, 1004-1006, Sheraton Raleigh Hotel, Raleigh, NC, USA, October 16-18, 2012.

  30. Puzis, R., Zilberman, P., Elovici, Y., Dolev, S., Brandes, U., “Heuristics for Speeding up Betweenness Centrality Computation”, IEEE SocialCom, Amsterdam, September 3-5, 2012.

  31. Altshuler, Y, Pentland, A., Bruckstein, A., Fire, M., Elovici, Y., Lazer, D., “Real World Anomalous Events Detection Based on Social Signals in Mobile Networks Traffic”, Poster in The International School and Conference on Complex Networks. NetSci 2012, Northwestern University in Evanston, Ilinois, June 18-22, 2012.

  32. Puzis, R., Altshuler, Y., Elovici, Y., Bekhor, S., Shiftan, Y., Pentland, A., “Traffic Assignment Model Based on Betweenness”, Poster in the International School and Conference on Complex Networks, NetSci 2012, Northwestern University, Evanston, Ilinois, June 18-22, 2012.

  33. Altshuler, Y., Fire, M., Aharony, N., Elovici, Y., Pentland, A., “How Many Makes a Crowd? On the Correlation between Groups’ Size and the Accuracy of Modeling”, Social Computing, Behavioral Modeling and Prediction, University of Maryland, April 3-5, 2012.

  34. Fire, M., Tenenboim, L., Lesser, O.,Puzis, R., Rokach, L., Elovici, Y., “Link Prediction in Social Networks using Computationally Efficient Topological Features”, IEEE SocialCom, MIT Boston, October 2011 (acceptance rate 9.8%).

  35. Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y., Dolev, S., “Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs”, 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011), Grenoble, France, October 10-12, 2011.

  36. Altshuler,Y., Puzis, R., Aharony, N., Elovici, Y., Pentland, A., Bekhor, S., “Augmented Betweenness Centrality for Mobility Prediction in Transportation Networks”, International workshop on Finding Patterns of Human Behaviors in NEtwork and MObility Data – NEMO, Athens, Greece, September 9th, 2011.

  37. Zilberman, P.,Katz, G.,Elovici, Y., Shabtai, A.,Dolev, S., “Analyzing Group Communication for Preventing Data Leakage via Email”, IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 10-12, 2011.

  38. Harel, A.,Shabtai, A.,Rokach, L., Elovici, Y., “Dynamic Sensitivity-Based Access Control”, IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 10-12, 2011

  39. Bercovitch, M., Renford, M., Hasson, L., Shabtai, A., Rokach, L., Elovici, Y.,”HoneyGen: an Automated Honeytokens Generator”, IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 10-12, 2011

  40. Harel, A., Shabtai, A., Rokach, L., and Elovici, Y., “Eliciting Domain Expert Misuseability Conceptions”, Poster in The 6th International Conference on Knowledge Capture (KCAP ’11), Alberta, Canada, 2011.

  41. Ossmy, O., Tam, O., Puzis, R., Inbar, O.,Rokach, R.,Elovici, Y.,“MindDesktop: General Human Computer Interface for Severely Handicapped”, The 13th International Conference on Enterprise Information Systems (ICEIS), Volume 4, 316-320, Beijing, China, June 8-11, 2011.

  42. Porat, T.,Rief, I.,Puzis, R.,Elovici, Y.,”LoOkie – It Feels Like Being There”, CHI 2011, Vancouver, BC, Canada, May 7–12, 2011

  43. Shimshon, T.,Moskovitch, R., L. Rokach,Elovici, Y.,”Continuous Verification Using Keystroke Dynamics”, the International Conference on Computational Intelligence and Security (CIS’10), Nanning, Guangxi Zhuang Autonomous Region, December 11-14, 2010

  44. Shabtai, A., Fledel, Y., Elovici, Y.,“Automated Static Code Analysis for Classifying Android Applications Using Machine Learning”, the 6th International Conference on Computational Intelligence and Security (CIS 2010), Nanning, China, December 11-14, 2010

  45. Shimshon, T., Moskovitch, R.,Rokach, L.,Elovici, Y.,”Clustering Di-Graphs for Continuously Verifying Users according to their Typing Patterns”, IEEE 26th Convention of Electrical and Electronics Engineers in Israel (IEEEI 2010), ), Eilat Israel, November 17-20, 2010

  46. Weiss, Y.,Elovici, Y., L. Rokach, “Cost-Sensitive Detection of Malicious Applications in Mobile Devices”, International Workshop on Mobile Security, Biltmore Hotel & Suites, Santa Clara, CA, USA, October 28, 2010

  47. Fledel, Y., Shabtai, A., Potashnik,D., Elovici, Y.,“Google Android: An Updated Security Review”, the 2nd International Conference on Mobile Computing, Applications and Services (MobiCASE 2010), Santa Clara, CA, USA, October 25-28, 2010

  48. Altshuler, Y., Aharony, N., Elovici, Y., Pentland, A., Cebrian, M., “Stealing Reality”, Workshop on Information in Networks (WIN), NYC Stern School of Business, September 24-24, 2010.

  49. Shabtai, A., Elovici, Y., “Applying Behavioral Detection on Android-based Devices”, The Third International ICST Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (Mobilware 2010), Chicago, USA, June 30-July 2, 2010.

  50. Gafny, M., Shabtai, A., Rokach, L., Elovici, Y., “Detecting Data Misuse By Applying Context-Based Data Linkage”, In Proceedings of the ACM CCS Workshop on Insider Threats (WITS 2010), Chicago, USA, October 10, 2010.

  51. Gafny, M., Shabtai A., Rokach, L., Elovici, Y., “Poster: Applying Unsupervised Context-Based Analysis for Detecting Unauthorized Data Disclosure”, The ACM Conference on Computer and Communications Security, Chicago, USA, October 17-21, 2011.

  52. Harel, A., Shabtai, A., Rokach, L., Elovici, Y., “M-Score: Estimating the Potential Damage of Data Leakage Incident by Assigning Misuseability Weight”, In Proceedings of the ACM CCS Workshop on Insider Threats (WITS 2010), Chicago, USA, October 10, 2010.

  53. Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y., Dolev, S., “Rendezvous Tunnel for Anonymous Publishing”, Poster in The 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, October 4-8, 2010.

  54. Altshuler, Y., Dolev, S., Elovici, Y., Aharony, N., “TTLed Random Walks for Collaborative Monitoring”, Second International Workshop on Network Science for Communication Networks (NetSciCom), San Diego, CA, USA, March 19, 2010.

  55. Rozenshine-Kemelmakher, E., Puzis, R., Felner, A., Elovici, Y., “Cost Benefit Deployment of DNIPS”, IEEE International Conference on Communication (ICC), Cape Town, South Africa, May 23-27, 2010.

  56. Shabtai, A., Fledel, Y., Elovici, Y., “Detecting Malicious Applications on Android by Applying Machine Learning Classifiers to Static Features”, Poster in the 25th Annual Computer Security Applications Conference (ACSAC 2009), Honolulu, Hawaii, USA, December 7-11, 2009.

  57. Shmueli, E., Kruglov, A., Puzis, R., Elovici, Y., Englert, R., Glezer, C. ” An Attentive Digital Signage System,” In Proc. Mensch und Computer 2009, Digital Signage mit Interaktiven Displays Workshop, Berlin, September 6, 2009.

  58. Dolev, S., Elovici, Y., Kesselman, A., Zilberman, P., “Trawling Traffic under Attack”, Second International Workshop on Reliability, Availability, and Security (WRAS 2009), Hiroshima, Japan, December 8, 2009.

  59. Rozenberg, B., Gudes, E., Elovici, Y., Fledel, Y., “Method for Detecting Unknown Malicious Executables”, Poster in the 12th International Symposium on Recent Advances in Intrusion Detection (RAID 2009), Saint-Malo, Brittany, France, September 23-25, 2009, 376-377.

  60. Shabtai, A., Kanonov, U., Elovici, Y., “Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach”, Poster in the 12th International Symposium on Recent Advances in Intrusion Detection (RAID 2009), Saint-Malo, Brittany, France, September 23-25, 2009, 357-358.Lecture Notes in Computer Science, Springer Berlin, Volume 5758/2009, Recent Advances in Intrusion Detection, pp. 357-358

  61. Rozenberg, B., Gudes, E., Elovici, Y. “SISR – a New Model for Epidemic Spreading of Electronic Threats”, 12th Information Security Conference (ISC’09), Pisa, Italy, September 7-9, 2009. (Acceptance rate =36%).Lecture Notes in Computer Science, Springer Berlin, Volume 5735/2009, Information Security, pp. 242-249

  62. Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafia, T., Camtepe, A., LÃhlein, B., Heister, U., MÃller, S., Rokach, R., Elovici, Y., “Identity Theft, Computers and Behavioral Biometrics”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2009), Dallas, Texas, June 8-11, 2009. pp. 155-160. 

  63. Moskovitch, R., Feher, C., Elovici, Y., “A Chronological Evaluation of Unknown Malcode Detection”, Pacific Asia Workshop on Intelligence and Security Informatics, Springer, Lectures Notes in Computer Sciences Volume 5477, 112-117, Bangkok, Thailand, April 27, 2009.

  64. Rozenberg, B., Gudes, E., Elovici, Y. “A Distributed Framework for the Detection of new worm-related Malware”. European Conference on Intelligence and Security Informatics 2008 (EuroISI08), Springer, Lectures Notes in Computer Sciences Volume 5376, 179-190, Esbjerg, Denmark, December 3-5, 2008.

  65. Puzis, R., Klippel, M. D., Elovici, Y., Dolev, S. “Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures”. European Conference on Intelligence and Security Informatics 2008 (EuroISI08), Springer, Lectures Notes in Computer Sciences Volume 5376, 191-203, Esbjerg, Denmark, December 3-5, 2008.

  66. Moskovitch, R., Feher, C., Tzachar, N., Berger, E., Gitelman, M., Dolev, S., Elovici, Y., “Unknown Malcode Detection Using OPCODE Representation”. European Conference on Intelligence and Security Informatics 2008 (EuroISI08), Springer, Lectures Notes in Computer Sciences Volume 5376, 204-215, Esbjerg, Denmark, December 3-5, 2008.

  67. Moskovitch, R., Nissim, N., Elovici, Y. “Malicious Code Detection Using Active Learning”. 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD, PinKDD08, Springer, Lectures Notes in Computer Sciences Volume 5456, 74-91, Las Vegas, USA, August 25, 2008.

  68. Kisilevizt, S., Elovici, Y. Shapira, B., Rokach, L., “kACTUS 2.0: Privacy Preserving in Classification Tasks using k-Anonymity”, Second Annual Workshop on Information Privacy and National Security (ISIPS 2008): Interdisciplinary Studies in Information Privacy and Security, New Brunswick, New Jersey, May 12, 2008.Springer, Lecture Notes in Computer Science, Volume 5661/2009, pp. 63-81

  69. Moskovitch, R., Nissim, N., Englert, R., Elovici, Y. “Improving the Detection of Unknown Computer Worms Activity using Active Learning”, The 11th International Conference on Information Fusion, Cologne, Germany, June 30 – July 03, 2008.

  70. Moskovitch, R., Elovici, Y. “Unknown Malicious Code Detection – Practical Issues”, ECIW 2008. The 7th European Conference on Information Warfare and Security, University of Plymouth, UK, June 30– July 1st, 2008.145-152

  71. Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Elovici, Y. “Unknown Malcode Detection via Text Categorization and the Imbalance Problem”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2008), Taipei, Taiwan, June 17-20, 2008, 156-161. (Acceptance rate =23%).

  72. Moskovitch, R., Elovici, Y. “Unknown Malcode Detection – A Chronological Evaluation”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2008), Taipei, Taiwan, June 17-20, 2008, 267-268. (Acceptance rate =23%).

  73. Shabtai A., Atlas M., Shahar Y., and Elovici Y. “Evaluation of a Temporal-Abstraction Knowledge-Acquisition Tool in the Network Security Domain”. 4th international conference on knowledge capture (K-CAP2007), Oct 28-31, 2007, Canada, 7-14.

  74. Moskovitch, R., Nissim, N., Stopel, D., Feher, C., Englert, R., and Elovici, Y. “Improving the Detection of Unknown Computer Worms Activity using Active Learning”. 30th Annual German Conference on Artificial Intelligence (KI-2007), Springer, Lectures Notes in Computer Sciences Volume 4667, 489-493, Sep 10-13, 2007, Osnabrück, Germany. (Acceptance rate: 32%).

  75. Elovici, Y., Shabtai, A., Moskovitch, R., Tahan, Gil. and Glezer, C. “Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic”. 30th Annual German Conference on Artificial Intelligence (KI-2007), Springer, Lectures Notes in Computer Sciences Volume 4667, 44-50, Sep 10-13, 2007, Osnabrück, Germany. (Acceptance rate: 32%).

  76. Zakin, O., Levi, M., Elovici, Y., Rockach, L., Shafrir, N., Sinter, G., Pen, O. “Identifying Computers Hidden behind a NAT using Machine Learning Techniques”. ECIW 2007, 6th European Conference on Information Warfare and Security, Defence College of Management and Technology, Shrivenham, UK, July 2-3, 2007, 335-340.

  77. Moskovitch, R., Gus, I., Pluderman, S., Stopel, D., Glezer C.,. Shahar, Y., Elovici, Y. “Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining”. IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007, Honolulu, Hawaii, USA, 1-5 April 2007, 169-177.(Acceptance rate =40%)

  78. Puzis, R., Tubi, M., Tahan, G., Elovici, Y. “Simulating Threats Propagation within the NSP infrastructure”. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007), Rutgers University, New Jersey, USA, May 23-24, 2007, 380. (Acceptance rate =30%)

  79. Tubi, M., Puzis, R., Elovici, Y. “Deployment of DNIDS in Social Networks”. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007), Rutgers University, New Jersey, USA, May 23-24, 2007, 59-65.(Acceptance rate =30%)

  80. Moskovitch, R., Nissim, N., Elovici, Y. “Malicious Code Detection and Acquisition Using Active Learning”. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007), Rutgers University, New Jersey, USA, May 23-24, 2007, 371. (Acceptance rate =30%)

  81. Moskovitch, R., Pluderman, S., Gus, I., Stopel, D., Feher, C., Parmet, Y., Shahar, Y., Elovici, Y. “Host Based Intrusion Detection using Machine Learning”. IEEE Information and Security Informatics, Rutgers University, New Jersey, US, 23-24 May 2007, 107-114. (Acceptance rate =30%)

  82. Shirtz, D., Bluvband, Z., Elovici, Y., Shoval, P. ” Computer Systems & Information SSR: a Unified Approach for Decision Making”. 53rd Annual Reliability & Maintainability Symposium (RAMS). Orlando, Florida USA, January 22-25, 2007, 427-433.(Acceptance rate =50%).

  83. Shabtai A., Klimov, D., Shahar, Y., Elovici, Y. “An Intelligent, Interactive Tool for Exploration and Visualization of Time-Oriented Security Data”. 3rd international Workshop on Visualization for Computer Security (VizSEC2006), Conference on Computer and Communications Security, Virginia, USA, November 3 2006. (Acceptance rate =43%) pp. 15-22

  84. Shabtai, A., Shahar, Y., Elovici, Y., “Monitoring For Malware Using a Temporal-Abstraction Knowledge Base”, 8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006. (Acceptance rate=30%).

  85. Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., Elovici, Y., “Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques”, International Conference on Neural Networks (ICNN 2006), Barcelona, Spain, October 22-24, 2006. (Acceptance rate=68%).

  86. Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., Elovici, Y., “Application of Artificial Neural Networks Techniques to Computer Worm Detection”, IEEE World Congress on Computational Intelligence (IEEE WCCI 2006), Vancouver, BC, Canada, July 16-21, 2006. (Acceptance rate=30%). 2362-2369

  87. Shabtai, A., Shahar, Y., Elovici, Y., “Using the Knowledge-Based Temporal Abstraction (KBTA) Method for Detection of Electronic Threats”, 5th European Conference on Information Warfare and Security, National Defence College, Helsinki, Finland, June1-2, 2006. 

  88. Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E., “Designing Secure Indexes for Encrypted Databases”, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, University of Connecticut, Storrs, Connecticut, U.S.A., August 7-10,2005.Lecture notes in computer science 3654, pp. 54-68.

  89. Elovici, Y., Shapira, B., Last, M., Zaafrany, O., Friedman, M., Schneider, M., Kandel, A., “Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Springer-Verlag, Lectures Notes in Computer Sciences Volume 3495, 244-255,Atlanta Georgia, USA, May 19-20, 2005.(Acceptance rate: 31%).

  90. Ben-Uziyahu, G., Shapira, B., Elovici, Y., “Illusive Browsing: Achieving Privacy on the Web using a P2P network”, 5th WSEAS Int. Conf. on Automation & Information (ICAI’04), 1734-1743, November 15-15, 2004

  91. Elovici, Y., Shapira, B., Spanglet, Y., “Hidden Web Privacy Preservation Surfing (Hi-WePPS) Model” CIPLIT’s 2004, 5th Annual Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, October 14-15, 2004, Published in Strandburg, D. and Stan Raicu, D. (Editors), Privacy and Technologies of Identity, A Cross-Disciplinary Conversation, Chapter 19, Springer, pp. 335-348, 2006.

  92. Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O., Schneider, M., Friedman, M., “Terrorist Detection System”, The 15th European Conference on Machine Learning (ECML) and the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2004), Springer-Verlag, Lectures Notes in Artificial Intelligence 3202, 540-542, Pisa, Italy, September 20-24, 2004.(Acceptance rate: 14.5%).

  93. Elovici, Y., Waisenberg, R., Shmueli, E., Gudes, E., “A Structure Preserving Database Encryption Scheme”, VLDB 2004 Workshop, SDM 2004, Workshop on Secure Data Management in a Connected World, Lecture Notes in Computer Science 3178, Springer 2004, 28-40, Toronto, Canada, August 30, 2004. (Acceptance rate: 53%).

  94. Zaafrany, O., Shapira, B., Elovici, Y., Last, M.,“OHT- Online-HTML Tracer for Detecting Terrorist Activities on the Web”. ECIW 2004 the 3rd European Conf. on Information Warfare and Security, 371-379, London UK, June 28-29, 2004. 

  95. Friedman, M., Kandel, A., Schneider, M., Last, M., Shapira, B, Elovici, Y Zaafrany, O., “A fuzzy-Based Algorithm for Web Document Clustering”, Nafips 2004 – North American Fuzzy Information Processing Society, 2-11, Banff, Alberta, Canada, June 27-30, 2004. 524-527 Vol. 2

  96. Glezer, C., Ben-Shimol, Y., Elovici, Y., “A Bounded Local Adaptive Packet Pricing (BLAPP) Scheme for IP Networks”, 3rd WSEAS Int. Conf. on Applied Informatics and Communications (AIC’03), Rhodes Island, Greece, November 15-17, 2003.

  97. Ben-Shimol, Y., Elovici, Y., Glezer, C., “Illusive Routing: Achieving Anonymity Using Multiple Cellular Network Providers”, 2nd WSEAS Intern. Conf. on Electronics, Hardware, Wireless & Optical Communications (EHAC 2003), Mykonos Island, Greece, August 11-13, 2003.

  98. Shapira, B., Last, M., Elovici, Y., Zaafrany, O., Kandel., A., “Using Data Mining Techniques for Detecting Terror-Related Activities on the Web”. ECIW 2003. The 2nd European Conference on Information Warfare and Security, 271-280, University of Reading, UK, June 30 – July 1, 2003.

  99. Kuflik, T., Shapira, B., Elovici, Y., Maschiach, A., “Privacy Preservation Improvement by Learning Optimal Profile Generation Rate”, UM’03 – 9th International Conference on User Modeling, Springer-Verlag, Lecture Notes in Computer Science 2702, 168-177, University of Pittsburgh, USA, June 22-25, 2003. (Acceptance rate: 25%).

  100. Last, M., Shapira, B., Elovici, Y., Zaafrany, O., Kandel, A., “Content-Based Methodology for Anomaly Detection on the Web”, AWIC’03, First International Atlantic Web Intelligence Conference, Advances in Web Intelligence, E. Menasalvas et al. (Editors), Springer-Verlag, Lecture Notes in Artificial Intelligence 2663, 113–123. Madrid, Spain, May 5-6, 2003 .

  101. Elovici, Y., Ben-Shimol, Y., Shabtai, A., “Per-Packet Pricing Scheme for IP Networks”, 10th International Conference on Telecommunications, ICT’2003, 1494-1500, Papeete, Tahiti, French Polynesia, February 23-March 1, 2003. (Acceptance rate: 35%).

  102. Elovici, Y., Shapira, B., Maschiach, A., “A New Privacy Model for Hiding Group Interests while Accessing the Web”, Workshop on Privacy in the Electronic Society, 63-70, (in association with 9th ACM Conference on Computer and Communications Security). Washington, DC, USA, November 21, 2002. Sponsored by ACM SIGSAC.(Acceptance rate: 27%)

  103. Elovici, Y., Shapira, B., Maschiach, A., “A New Privacy Model for Web Surfing”, Next Generation Information Technologies and Systems, 5th International Workshop, NGITS 2002, Springer-Verlag, Lecture Notes in Computer Science 2382, 45-57, Caesarea, Israel, June 24-25, 2002. (Acceptance rate: 50%)

  104. Elovici, Y., Hersh R.D, Azaria H., “Message Passing System for Closely Coupled Multiprocessor System”, 17th convention of Electrical and Electronics Engineers conf. (IEEE) in Israel, 275-278, Tel-Aviv, May 4-5, 1991.

  105. Elovici, Y., Azaria, H., “Message Passing System for Transputer Network MTT Implementation”, Proceedings of the Third International Conference on Applications of Transputers, Vol. 2, IOS Press, 650-655, August 28-30,1991.

Close Menu