Journal Papers

  1. Azri, H., Elovici, Y. and Hersch, R. D., “Multiple Interfaces Message Passing System for Transputer Network”, Microprocessing and Microprogramming (continued as Journal of Systems architecture), 34, 1992, 237-242.

  2. Azri, H. and Elovici, Y., “Modeling and evolution of A new message-passing system for parallel multiprocessor systems”. Parallel Computing, 19, 1993, 633-649.

  3. Ahituv, N. and Elovici, Y., “Performance Evolution of Distributed application”, Journal of the Operational Research Society, 52, 2001, 916-927.

  4. Elovici, Y., Shapir, B. and Kantor, P., “Using the Information Structure Model to Compare Profile-Based Information Filtering Systems”, Information Retrieval Journal 6(1), 2002, 75-97.

  5. Elovici, Y., Brh, D., “Decision-Theoretic approach to Data Mining”, IEEE Transactions on Systems, Mn, and Cybernetics Part : Systems and Humans, 33(1), 2003, 42-51.

  6. Elovici, Y., Glezer, C., “Anonymity Enhancing Technologies (ET): Opportunities and Threats”, Journal of information Warfare, 3(3), 49-62, 2004.

  7. Elovici, Y., Kandel, A., Last, M., Shapir, B., Zafarny, O., “Using data Mining Techniques for Detecting Terror-related activities on the Web”, Journal of information Warfare, 3(1), 2004, 17-28.

  8. Shapir, B., Elovici, Y., Meshiach, A., Kuflik, T., “PRW –A Privacy Model for the Web”, Journal of the American Society for information Science and Technology (JSIST), 56(2), 2005, 159-172.

  9. Elovici, Y., Glezer, C., Shapir, B., “Enhancing costumer privacy while searching for products and services on the World Wide Web”, Internet Research, 15(4), 2005, 378-399.

  10. Elovici, Y., Shapir, B., Kantor, P., “Decision Theoretic approach to Combining information Filters: Analytical and Empirical Evolution”, Journal of the American Society for information Science and Technology (JSIST), 57(3), 2006, 306-320.

  11. Elovici, Y., Shapir, B., Meshiach,  A., “Cluster-analysis Against a Private Web Solution (PRW)”, Online information Review, 30(6), 2006, 624-643.

  12. Brh, D., Elovici, Y., Last, M., “Theory of Actionable data Mining with Application to Semiconductor Manufacturing Control”, International Journal of Production Research, 45(13), 2007, 3059-3084.

  13. Elovici, Y., Ben-Shimol, Y., Alon, G., “Evasive Routing: Achieving Anonymity Using Multiple ISPs”, Journal of Internet Technology, 8(1), 2007, 83-96.

  14. Melamed, D., Shapir, B., Elovici, Y., “MrCol – Market-based Recommender System”. IEEE Intelligent Systems, 22(3), 2007, 74-78.

  15. Puzis, R., Elovici, Y., Dolev, S., “Finding the Most Prominent Group in Complex Networks”,AI Communications, 20 (4), 2007, 287-296.

  16. Puzis, R., Elovici, Y., Dolev, S., “Fast Algorithm for Successive Group Betweenness Centrality Computation”, Physical Review E, 76(056709), 2007, 1-9.

  17. Moskovitch, R., Elovici, Y., Rokach, L., “Detection of Unknown Computer Worms Based On Behavioral Classification of the Host”, Computational and data Analysis, 52(9), 2008, 4544-456.

  18. Puzis, R., Yagil, D., Elovici, Y., Brh, D., “Collaborative Attack on Internet Users’ Anonymity”, Internet Research, 19 (1), 2009, 60-77.

  19. Menahem, E., Shabtai, A. Rokach, L., Elovici, Y., “Improving Malware Detection by Applying Multi-Inducer Ensemble”, Computational  and data analysis, 53(4), 2009, 1483-1494.

  20. Stopel, D., Boger, Z., Moskovitch, R., Shahr, Y., Elovici, Y., “Using Artificial Neural Networks to Detect Unknown Computer Worms”, Neural and Applications, 18(7), 2009, 663-674.

  21. Shbti, A., Moskovitch, R., Elovici, Y., Glezer, C., “Detection of malicious Code by Applying Machine Learning Classifiers on Static Features –A State-of-the-Art Survey”, information Security Technical Report, 14(1), 2009, 16-29.

  22. Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Japkowicz, N., Elovici, Y., “Unknown Malcode Detection and the Imbalance Problem”, Journal in Computer Virology, 5(4), 2009, 295-308.

  23. Ben-Nun, A., Shapira, B., Elovici, Y., “A Decision Theoretic Approach to Combining information Filtering”, Online information Review, 33(5), 2009, 920-942.

  24. Dolev, S., Elovici, Y., Puzis, R., Zilberman, P., “Incremental Deployment of Network Monitors Based on Group Betweenness Centrality”, information Processing Letters, 109(20), 2009, 1172-1176.

  25. Menahem, E., Rokach, L., Elovici, Y., “Troika – an Improved Sticking Scheme for Classification Tasks”, information Sciences, 179(24), 2009, 4097-4122.

  26. Shmueli, E., Visenberg, R., Elovici, Y. Glezer, C., “Database Encryption: An Overview of Contemporary Challenges and Design Considerations”, SIGMOD Record, 38(3), 2009, 29-34.

  27. Shabtai, A., Fledel, Y., Elovici, Y., Shahr, Y. “Using the KBTA Method for Inferring Computer and Network Security Alerts from Time-stamped, Raw System Metrics”, Journal in Computer Virology, 6(3), 2010, 239-259.

  28. Than, G., Glezer, C., Elovici, Y., Rokach, L., “Auto-Sign: An Automatic Signature Generator for High-Speed Malware Filtering Devices”, Journal in Computer Virology, 6(2), 2010, 91-103.

  29. Kisilevich, S., Rokach, L., Elovici, Y., Shapira, B., “Efficient Multi-Dimensional Suppression for K-Anonymity”, IEEE Transactions on Knowledge and data Engineering, 22(3), 2010 334-347.

  30. Elovici, Y., Shapira, B., Last, M., Zafarny, O., Friedman, M., Schneider, M., Kandel, A., “Detection of Access to Terror-Related Web Sites Using An Advanced Terror Detection System (TDS)”, Journal of the American Society for information Science and Technology (JSIST), 61(2), 2010, 405-418.

  31. Shabtai, A., Fledel, Y., Knonov, U., Elovici, Y., Dolev, S., Glezer, C., “Google and Android: A Comprehensive Security Assessment”, IEEE Security and Privacy, 8(2), 2010, 35-44.

  32. Shabtai, A., Fledel, Y., Elovici, Y., “Securing Android-Powered Mobile Devices Using SELinux”, IEEE Security and Privacy, 8(3), 2010, 36-44.

  33. Dolev, Y., Elovici, Y., Puzis, R., “Routing Betweenness Centrality”, Journal of the ACM (JCM), 57(4), 2010, 1-27.

  34. Shabtai, A., Knonov, U., Elovici, Y., “Intrusion Detection for Mobile Devices Using the Knowledge Based Temporal-Abstraction Method”, Journal of Systems and Software, 83(8), 2010, 1524-1537.

  35. Shabtai, A., Fledel, Y., Potchnik, D., Moskovitch, R., Elovici, Y. “Monitoring, Analysis and Filtering System for Purifying Network Traffic of Known and Unknown Malicious Content”, Security and Communication Networks, 4(8), 2011, 947-965.

  36. Shbti, A., Menahem, E., Elovici, Y., “F-Sign:  Automatic, Function-based Signature Generation for Malware”, IEEE Transactions on Systems, Mn, and Cybernetics, Part C: Applications and Reviews, 41(4), 2011, 494–508.

  37. Dolev, S., Elovici, Y., Kesselman,  A., Zilberman, P., “Trawling Traffic Under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering”, International Journal of Foundations of Computer Science, 22(5), 2011, 1073–1098.

  38. Shirtz, D., Elovici, Y., “Optimizing Investment Decisions in information Security Remedies”, information Management & Computer Security, 19(2), 2011, 95–112.

  39. Puzis, R., Tubi, M., Elovici, Y., Glezer, C., Dolev, S., “A Decision Support System for Optimizing the Deployment of Distributed Network Intrusion Detection Systems (DNIDS) in Large-Scale Networks”, Accepted for publication in ACM Transactions on Modeling and Computer Simulation, 22(1), 2011.

  40. Altshuler, Y., Ahrony, N., Elovici, Y., Pentland, A., Cebrin, M., “Stealing Reality: When Criminals Become data Scientists (or Vice Versa)”, IEEE Intelligent Systems, 26(6), 2011, 22-30.

  41. Shabtai, A., Shahar, Y., Elovici, Y., “A Distributed Architecture for Efficient Parallelization and Computation of Knowledge-Based Obstructions”, Intelligent information Systems, 39(1), 2012, 249-286.

  42. Shabtai, A., Wiess, Y., Knonov, U., Elovici, Y., Glezer, C., “Andromly”:An Anomaly Detection Framework for Android Devices”, Journal of Intelligent information Systems, 38(1), 2012, 161-190.

  43. Harel, A., Shabtai, A., Rokach, L., Elovici, Y., “M-score:  A Misuseability Weight Me sure”, IEEE Transactions on Dependable and Secure Computing, 9(3), 2012, 414-428.

  44. Shabtai, A., Moskovitch, R., Feher, C., Dolev, S., Elovici, Y., “Detecting Unknown malicious Code by Applying Classification Techniques on OPCODEs Patterns”, Security Informatics, 1(1), 2012, 1-22, Springer New Journal.

  45. Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schaclar, A., “User Identity Verification via Mouse Dynamics”, information Sciences, 201, 2012, 19–36,.

  46. Moskovitch, R., Nissim, N., Englert, R., Elovici, Y., Rokach, L., “Detecting Unknown Computer Worm Activity via Support Vector Machines and Active Learning”, Pattern analysis Applications, 15(4), 2012, 459-475.

  47. Schaclar, A., Rokach, L., Abramson, A ., Elovici, Y., “User Authentication Based on Representative Users”, Accepted for publication in IEEE Transactions on Systems, Mn, and Cybernetics, Part C: Applications and Reviews.

  48. Weiss, Y., Elovici, Y., Rokach, L., “The CSH Algorithm-Cost-Sensitive Attribute Selection using Histograms”, information Sciences, 222, 2013, 247-268.

  49. Zilberman, P., Katz, G., Elovici, Y., Shabtai, A., Dolev, S. “Analyzing Group Emails Exchange for Detecting data Leakage”, Journal of the American Society for information Science and Technology (JSIST), 64(9), 2013, 1780-1790.

  50. ltshuler, Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A., Pentland, A., Alzer, D., “The Social Amplifier – Reaction of Human Communities to Emergencies”, Journal of Statistical Physics, 152(3), 2013, 399-418.

  51. Puzis, R., Altshuler, Y., Elovici, Y., Bekhor, S., Shiftan, Y., Pentland, A., “Augmented Betweenness Centrality for Environmentally-Aware Traffic Monitoring in Transportation Networks”, Journal of Intelligent Transportation Systems, 17(1), 2013, 91-105.

  52. Shabtai,A ., Berkovich, M., Rokach, L., Elovici, Y., “Optimizing data Misuse Detection”, Accepted for publication in ACM Transactions on Knowledge Discovery in data, ACM Transactions on Knowledge Discovery from data, 8(3), 2013.

  53. Fire, M., Tenenboim-Chekin, L., Puzis, R., Lesser, O., Rokach, L., Elovici, Y., “Computationally Efficient Link Prediction in Variety of Social Networks” Accepted for publication in  ACM Transactions on Intelligent Systems and Technology (New ACM Transaction journal).

  54. Dror, M., Shabtai, A., Rokach, L., Elovici, Y., “OCCT: A One-Class Clustering Tree for Implementing One-to-Many data Linkage”, IEEE Transactions on Knowledge and data Engineering, 26(3), 2014, 682-697.

  55. Katz, G., Elovici, Y., Shapira, B. “A New Model for data Leakage Prevention”, information Sciences, 262, 2014, 137-158.

  56. Shbti, A., Tenenboim-Chekin, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y., Mobile Malware Detection through analysis of Devotions application Network Behavior, Computers & Security, 43, 2014, 1-18.

  57. *Gafni, M., Shabtai, A ., Rokach, L., Elovici, Y., “OCCT: A One-Class Clustering Tree for Implementing One-to-Many data Linkage”, Accepted for publication in IEEE Transactions on Knowledge and Data Engineering,.

  58. Shabtai, A., Tenenboim-Chekin, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y., Mobile Malware Detection through analysis of Deviations application Network Behavior, Accepted for publication in Computers & Security.

  59. Nissim, N., Rokach, L., Moskovich, R., Elovici, Y., “Efficient Active Learning Methods for Improving the Detection of Unknown PC Malware”,accepted for publication in Expert Systems with applications.

  60. Fire, M., Kagan, D., Elyashar, A., and Elovici, Y., “Friends or Foe? Fake Profile Identification in Online Social Networks”, Accepted for publication in Journal of Social Network analysis and Mining, 4(1), 2014.

  61. Shmueli, E., Visenberg, R., Gudes, E., Elovici, Y., “Implementing A database Encryption Solution, Design and Implementation Issues”, Accepted for publication in Computers and Security.

  62. Fire, M., Elovici, Y., Herzberg, A., Schulman, H., “Ethical Considerations when Employing Fake Identities in OSN for Research”, Accepted for publication in Journal of Science and Engineering Ethics.

  63. Puzis, R., Zilberman, P., Elovici, Y., Dolev, S., Brandes, U., “Topology Manipulations for Speeding Betweenness Centrality Computation”,Accepted for publication in Journal of Complex Networks.

  64. Fire, M., Goldschmidata, R., Elovici, Y., “Online Social Networks: Threats and Solutions”, accepted for publication in IEEE Communications Surveys & Tutorials.

  65. Shirtz, D., Puzis, R., Elovici, Y., “A Particle Swarm Model for Estimating Reliability and Scheduling System Maintenance”, accepted for publication in Enterprise information Systems.

  66. Fire, M., Elovici, Y., “Data Mining of Online Genealogy datasets for Revealing Lifespan Patterns in Human Population”, accepted for publication in ACM TIST.

  67. Elyashar, A., Fire, M., Kagan, D., Elovici, Y., ” Guided Socialbot: Infiltrating A User’s Friends List”, accepted for publication in  AI-Communications.

  68. Nissim, N., Cohen, A., Glazer, C., Elovici, Y., “Detection of APT attacks Initiated by malicious PDF Files attached to Emails: A State of the Art Survey”, accepted for publication in Computers and Security.

  69. Nissim, N., Moskovitch, R., Rokach L., Elovici, Y., “Novel active Learning Methods for Enhanced PC Malware Detection in Windows OS,” Expert Systems With Applications, Vol. 41 (13) 5843–5857 (Oct. 2014).

  70. Mirsky, Y., Shabtai, A., Shapira, B., Elovici, Y., Rokach, L., “Anomaly Detection for Smartphone Data Streams”, Submitted to ACM Transactions on Internet Computing.

  71. Shabtai, A., Berkovitch, M., Rokach, L., Elovici, Y., Shmueli, E., Gal, K., “Behavioral Study of Users when Interacting with Active Honeytokens”, ACM Transactions on Information and Systems Security.

  72. Nissim, N., Cohen, A., Moskovitch, R., Shabtai, A., Edry, M., Bar-Ad, O., Elovici, Y., “Catching up with the Creation of New Malicious PDF Files Using Active-Learning Based Detection Framework”, Security Informatics.

  73. Nissim, N., Boland, M.R., Tatonetti, N.P., Elovici, Y., Hripcsak, G., Shahar, Y., Moskovitch, R., “Improving Condition Severity Classification with an Efficient Active Learning Based Framework”, Submitted to Journal of Biomedical Informatics.

  74. Zilberman, P., Puzis, R., Elovici, Y., “On network footprint of cloud-based traffic inspection and filtering services”, Accepted for publication in IEEE Transactions on Dependable and Secure Computing.

  75. Guri, M., Monitz, M., Elovici, Y., “AirHopper: Bridging the Air Gap between Isolated Networks and Mobile Phones using Radio Frequencies”, Accepted for publication in ACM Transactions on Intelligent Systems and Technology.

  76. Peled O., Fire M., Rokach L., Elovici, Y., ” Matching Entities Across Online  Social Networks”, Accepted for publication in Neurocomputing

  77. Mirski Y., Shabtai A., Shapira B., Rokach L., Elovici, Y., “Anomaly detection for smartphone data streams”, Pervasive and mobile Computing 35:83-107(2017)

  78. Iacovazzi, A, Elovici, Y., Network Flow Watermarking: A Survey, Accepted for publication in IEEE Communications Surveys & Tutorials 19(1) :512-530 (2017).

  79. Siboni S., Shabtai A., Tippenhauer Ole N., Lee J., Elovici, Y., “Advanced Security Testbed Framework for Wearable IoT devices” ACM trans. Internet Techn. 16(4):26:1-26:25 (2016)

  80. Nissim N., Cohen A., Moskovitch R., Shabtai A., Edri M.,  Bar-Ad O., Elovici, Y., “Keeping pace with the creation of new malicious PDF files using an active-learning  based detection framework.”  Security Informatics 5(1):1 (2016)

  81. Peled O., Fire M., Rokach L., Elovici, Y.,” Matching entities across online social networks.” Neurocomputing 210:91-106 (2016)

  82. Cohen A., Nissim N., Rokach L., Elovici, Y., ” SFEM: Structural feature Extraction methodology for the detection of malicious office documents using machine learning methods.” Expert Syst. Appl. 63:324-343 (2016)

  83. Puzis R., Shirtz D., Elovici, Y., “A particle swarm model for estimating reliability and scheduling system maintenance.” Enterprise IS 10(4):349-377 (2016)

  84. Nissim N., Cohen A., Elovici, Y., “ALDOCX: Detection of unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New structural feature extraction Methodology.”  IEEE Trans. Information Forensics and security  12(3): 631-646 (2017)

  85. Harel Y., Ben-Gal I., Elovici, Y., ” Cyber Security and the Role of Intelligent Systems in Addressing its Challenges” ACM TIST 8(4) 49:1-49:12 (2017)

  86. Guri M., Monitz M., Elovici, Y., “Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack” ACM TIST 8(4): 50:1-50:25 (2017)

  87. Zilberman P., Puzis R. Elovici, Y., “On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers” IEEE Trans. Dependable Sec .Comput. 14(5):521-534 (2017)

  88. Paradise A., Shabtai A., Puzis R.,Elyashar A., Elovici, Y., Roshandel M., Peylo C., “Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks” IEEE Trans. Comput. Social Systems 4 (3): 65-79 (2017)

  89. Nissim N., Yahalom R., Elovici, Y., “USB-based attacks” Computers & Security 70: 675-688 (2017)

  90. Nissim N., Shahar Y., Elovici, Y., Hirpcsak G., Moskovitch R., “Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods” Artificial Intelligence in Medicine 81:12-32 (2017)

  91. Katzir Z., Elovici, Y., “quantifying the resilience of machine learning classifiers for cyber security” Expert syst. Appl. 92:419-429 (2018)

  92. Iacovazzi A., Sanat S., Frassinelli D., Elovici, Y., “DropWat:An invisible network flow watmark for data Exfiltration traceback.” IEEE Trans. Information forensics and security  13(5): 1139-1154 (2018)

Close Menu