The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuval Elovici: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mark Last, Bracha Shapira, Yuval Elovici, Omer Zaafrany, Abraham Kandel
    Content-Based Methodology for Anomaly Detection on the Web. [Citation Graph (0, 0)][DBLP]
    AWIC, 2003, pp:113-123 [Conf]
  2. Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes
    Designing Secure Indexes for Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:54-68 [Conf]
  3. Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel
    Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:244-255 [Conf]
  4. Yuval Elovici, Bracha Shapira, Adlai Maschiach
    A New Privacy Model for Web Surfing. [Citation Graph (0, 0)][DBLP]
    NGITS, 2002, pp:45-57 [Conf]
  5. Yuval Elovici, Abraham Kandel, Mark Last, Bracha Shapira, Omer Zaafrany, Moti Schneider, Menahem Friedman
    Terrorist Detection System. [Citation Graph (0, 0)][DBLP]
    PKDD, 2004, pp:540-542 [Conf]
  6. Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
    A Structure Preserving Database Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:28-40 [Conf]
  7. Tsvi Kuflik, Bracha Shapira, Yuval Elovici, Adlai Maschiach
    Privacy Preservation Improvement by Learning Optimal Profile Generation Rate. [Citation Graph (0, 0)][DBLP]
    User Modeling, 2003, pp:168-177 [Conf]
  8. Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici
    An intelligent, interactive tool for exploration and visualization of time-oriented security data. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2006, pp:15-22 [Conf]
  9. Yuval Elovici, Bracha Shapira, Adlai Maschiach
    A new privacy model for hiding group interests while accessing the Web. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:63-70 [Conf]
  10. Yuval Elovici, Bracha Shapira, Paul B. Kantor
    Using the Information Structure Model to Compare Profile-Based Information Filtering Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Retr., 2003, v:6, n:1, pp:75-97 [Journal]
  11. Yuval Elovici, Bracha Shapira, Paul B. Kantor
    A decision theoretic approach to combining information filters: An analytical and empirical evaluation. [Citation Graph (0, 0)][DBLP]
    JASIST, 2006, v:57, n:3, pp:306-320 [Journal]
  12. Bracha Shapira, Yuval Elovici, Adlay Meshiach, Tsvi Kuflik
    PRAW - A PRivAcy model for the Web. [Citation Graph (0, 0)][DBLP]
    JASIST, 2005, v:56, n:2, pp:159-172 [Journal]
  13. Helnye Azaria, Yuval Elovici
    Modeling and Evaluation of a New Message-Passing System for Parallel Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1993, v:19, n:6, pp:633-649 [Journal]
  14. Yuval Elovici, Dan Braha
    A decision-theoretic approach to data mining. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:1, pp:42-51 [Journal]
  15. Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici
    Host Based Intrusion Detection using Machine Learning. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:107-114 [Conf]
  16. Meytal Tubi, Rami Puzis, Yuval Elovici
    Deployment of DNIDS in Social Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:59-65 [Conf]
  17. Robert Moskovitch, Nir Nissim, Yuval Elovici
    Malicious Code Detection and Acquisition Using Active Learning. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:371- [Conf]
  18. Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici
    Simulating Threats Propagation within the NSP Infrastructure. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:380- [Conf]
  19. Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, Chanan Glezer
    Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. [Citation Graph (0, 0)][DBLP]
    KI, 2007, pp:44-50 [Conf]
  20. Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici
    Improving the Detection of Unknown Computer Worms Activity Using Active Learning. [Citation Graph (0, 0)][DBLP]
    KI, 2007, pp:489-493 [Conf]
  21. Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici
    Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. [Citation Graph (0, 0)][DBLP]
    CIDM, 2007, pp:202-209 [Conf]

  22. Application of Artificial Neural Networks Techniques to Computer Worm Detection. [Citation Graph (, )][DBLP]


  23. Unknown malcode detection via text categorization and the imbalance problem. [Citation Graph (, )][DBLP]


  24. Unknown malcode detection - A chronological evaluation. [Citation Graph (, )][DBLP]


  25. SISR - A New Model for Epidemic Spreading of Electronic Threats. [Citation Graph (, )][DBLP]


  26. Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain. [Citation Graph (, )][DBLP]


  27. Malicious Code Detection Using Active Learning. [Citation Graph (, )][DBLP]


  28. Trawling Traffic under Attack, Overcoming DDoS Attacks by Target-Controlled Traffic Filtering. [Citation Graph (, )][DBLP]


  29. Method for Detecting Unknown Malicious Executables. [Citation Graph (, )][DBLP]


  30. Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach. [Citation Graph (, )][DBLP]


  31. A Chronological Evaluation of Unknown Malcode Detection. [Citation Graph (, )][DBLP]


  32. A Distributed Framework for the Detection of New Worm-Related Malware. [Citation Graph (, )][DBLP]


  33. Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. [Citation Graph (, )][DBLP]


  34. Unknown Malcode Detection Using OPCODE Representation. [Citation Graph (, )][DBLP]


  35. kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity. [Citation Graph (, )][DBLP]


  36. Finding the most prominent group in complex networks. [Citation Graph (, )][DBLP]


  37. Incremental Deployment of Network Monitors Based on Group Betweenness Centrality [Citation Graph (, )][DBLP]


  38. Google Android: A State-of-the-Art Review of Security Mechanisms [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002