Search the dblp DataBase
Yuval Elovici :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mark Last , Bracha Shapira , Yuval Elovici , Omer Zaafrany , Abraham Kandel Content-Based Methodology for Anomaly Detection on the Web. [Citation Graph (0, 0)][DBLP ] AWIC, 2003, pp:113-123 [Conf ] Erez Shmueli , Ronen Waisenberg , Yuval Elovici , Ehud Gudes Designing Secure Indexes for Encrypted Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:54-68 [Conf ] Yuval Elovici , Bracha Shapira , Mark Last , Omer Zaafrany , Menahem Friedman , Moti Schneider , Abraham Kandel Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:244-255 [Conf ] Yuval Elovici , Bracha Shapira , Adlai Maschiach A New Privacy Model for Web Surfing. [Citation Graph (0, 0)][DBLP ] NGITS, 2002, pp:45-57 [Conf ] Yuval Elovici , Abraham Kandel , Mark Last , Bracha Shapira , Omer Zaafrany , Moti Schneider , Menahem Friedman Terrorist Detection System. [Citation Graph (0, 0)][DBLP ] PKDD, 2004, pp:540-542 [Conf ] Yuval Elovici , Ronen Waisenberg , Erez Shmueli , Ehud Gudes A Structure Preserving Database Encryption Scheme. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2004, pp:28-40 [Conf ] Tsvi Kuflik , Bracha Shapira , Yuval Elovici , Adlai Maschiach Privacy Preservation Improvement by Learning Optimal Profile Generation Rate. [Citation Graph (0, 0)][DBLP ] User Modeling, 2003, pp:168-177 [Conf ] Asaf Shabtai , Denis Klimov , Yuval Shahar , Yuval Elovici An intelligent, interactive tool for exploration and visualization of time-oriented security data. [Citation Graph (0, 0)][DBLP ] VizSEC, 2006, pp:15-22 [Conf ] Yuval Elovici , Bracha Shapira , Adlai Maschiach A new privacy model for hiding group interests while accessing the Web. [Citation Graph (0, 0)][DBLP ] WPES, 2002, pp:63-70 [Conf ] Yuval Elovici , Bracha Shapira , Paul B. Kantor Using the Information Structure Model to Compare Profile-Based Information Filtering Systems. [Citation Graph (0, 0)][DBLP ] Inf. Retr., 2003, v:6, n:1, pp:75-97 [Journal ] Yuval Elovici , Bracha Shapira , Paul B. Kantor A decision theoretic approach to combining information filters: An analytical and empirical evaluation. [Citation Graph (0, 0)][DBLP ] JASIST, 2006, v:57, n:3, pp:306-320 [Journal ] Bracha Shapira , Yuval Elovici , Adlay Meshiach , Tsvi Kuflik PRAW - A PRivAcy model for the Web. [Citation Graph (0, 0)][DBLP ] JASIST, 2005, v:56, n:2, pp:159-172 [Journal ] Helnye Azaria , Yuval Elovici Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems. [Citation Graph (0, 0)][DBLP ] Parallel Computing, 1993, v:19, n:6, pp:633-649 [Journal ] Yuval Elovici , Dan Braha A decision-theoretic approach to data mining. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:1, pp:42-51 [Journal ] Robert Moskovitch , Shay Pluderman , Ido Gus , Dima Stopel , Clint Feher , Yisrael Parmet , Yuval Shahar , Yuval Elovici Host Based Intrusion Detection using Machine Learning. [Citation Graph (0, 0)][DBLP ] ISI, 2007, pp:107-114 [Conf ] Meytal Tubi , Rami Puzis , Yuval Elovici Deployment of DNIDS in Social Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2007, pp:59-65 [Conf ] Robert Moskovitch , Nir Nissim , Yuval Elovici Malicious Code Detection and Acquisition Using Active Learning. [Citation Graph (0, 0)][DBLP ] ISI, 2007, pp:371- [Conf ] Rami Puzis , Meytal Tubi , Gil Tahan , Yuval Elovici Simulating Threats Propagation within the NSP Infrastructure. [Citation Graph (0, 0)][DBLP ] ISI, 2007, pp:380- [Conf ] Yuval Elovici , Asaf Shabtai , Robert Moskovitch , Gil Tahan , Chanan Glezer Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. [Citation Graph (0, 0)][DBLP ] KI, 2007, pp:44-50 [Conf ] Robert Moskovitch , Nir Nissim , Dima Stopel , Clint Feher , Roman Englert , Yuval Elovici Improving the Detection of Unknown Computer Worms Activity Using Active Learning. [Citation Graph (0, 0)][DBLP ] KI, 2007, pp:489-493 [Conf ] Robert Moskovitch , Ido Gus , Shay Pluderman , Dima Stopel , Clint Feher , Chanan Glezer , Yuval Shahar , Yuval Elovici Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. [Citation Graph (0, 0)][DBLP ] CIDM, 2007, pp:202-209 [Conf ] Application of Artificial Neural Networks Techniques to Computer Worm Detection. [Citation Graph (, )][DBLP ] Unknown malcode detection via text categorization and the imbalance problem. [Citation Graph (, )][DBLP ] Unknown malcode detection - A chronological evaluation. [Citation Graph (, )][DBLP ] SISR - A New Model for Epidemic Spreading of Electronic Threats. [Citation Graph (, )][DBLP ] Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain. [Citation Graph (, )][DBLP ] Malicious Code Detection Using Active Learning. [Citation Graph (, )][DBLP ] Trawling Traffic under Attack, Overcoming DDoS Attacks by Target-Controlled Traffic Filtering. [Citation Graph (, )][DBLP ] Method for Detecting Unknown Malicious Executables. [Citation Graph (, )][DBLP ] Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. [Citation Graph (, )][DBLP ] A Chronological Evaluation of Unknown Malcode Detection. [Citation Graph (, )][DBLP ] A Distributed Framework for the Detection of New Worm-Related Malware. [Citation Graph (, )][DBLP ] Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. [Citation Graph (, )][DBLP ] Unknown Malcode Detection Using OPCODE Representation. [Citation Graph (, )][DBLP ] kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity. [Citation Graph (, )][DBLP ] Finding the most prominent group in complex networks. [Citation Graph (, )][DBLP ] Incremental Deployment of Network Monitors Based on Group Betweenness Centrality [Citation Graph (, )][DBLP ] Google Android: A State-of-the-Art Review of Security Mechanisms [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.009secs