The role of network setting and gender in online content popularity
Cooperation with IDC O Lesser, T Hayat, Y Elovici Information, Communication & Society 20, 2017 (11), 1607-1624. Link to document In this study, we explore the role of specific network structures that enhance social capital and assess the extent to which gender, social ties, and communication interaction relate to content popularity within online social networks […]
Data-Augmented Software Diagnosis
Amir Elmishali, Roni Stern, Meir Kalech AAAI 2016: 4003-4009 Link to document Software fault prediction algorithms predict which softwarecomponents is likely to contain faults using machine learningtechniques. Software diagnosis algorithm identify the faultysoftware components that caused a failure using model-basedor spectrum based approaches. We show how software faultprediction algorithms can be used to improve software […]
Function Secret Sharing Improvements and Extensions
In collaboration with IDC Herzliya + Technion and UCLA Elette Boyle, Niv Gilboa and Yuval Ishai ACM CCS 2016, pages 1292-1303, 2016 Link to document Function Secret Sharing (FSS), introduced by Boyle et al.(Eurocrypt 2015), provides a way for additively secret-sharinga function from a given function family F. More concretely,an m-party FSS scheme splits a […]
Breaking the Circuit Size Barrier for Secure Computation under DDH
In collaboration with IDC Herzliya + Technion and UCLA Elette Boyle, Niv Gilboa and Yuval Ishai Crypto 2016, pages 509-539, 2016 Link to document Under the Decisional Diffie-Hellman (DDH) assumption, we present a 2-out-of-2 secret sharing scheme that supports a compact evaluation of branching programs on the shares. More concretely, there is an evaluation algorithm […]
Node-Centric Detection of Overlapping Communities in Social Networks
Yehonatan Cohen, Danny Hendler and Amir Rubin 12th International Conference and School on Advances in Network Science (NetSci-X16) pp 2016 Link to document We present NECTAR, a community detection algorithm that generalizes Louvain method’s local search heuristic for overlapping community structures. NECTAR chooses dynamically which objective function to optimize based on the network on which […]
Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis
In collaboration with Telekom Innovation Laboratories Bar, Ariel and Shapira, Bracha and Rokach, Lior and Unger, Moshe Software Science, 2016 IEEE International Conference on Technology and Engineering (SWSTE), 28-36 Link to document Honey pots are computer resources that are used to detect and deflect network attacks on a protected system. The data collected from honey […]
SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity
Mirsky, A Shabtai, L Rokach, B Shapira, Y Elovici Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security Link to document In this paper we describe and share with the research community,a significant smartphone dataset obtained from anongoing long-term data collection experiment. The datasetcurrently contains 10 billion data records from 30 users collectedover […]
Scalable attack propagation model and algorithms for honeypot systems
A Bar, B Shapira, L Rokach, M Unger Big Data (Big Data), 2016 IEEE International Conference on, 1130-1135 Link to document Attack propagation models within honeypot systems aim at providing insights about attack strategies that target multiple honeypots, rather than analyzing attacks on each honeypot separately. Traditional attack propagation models focus on building a single […]
Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic
Andrey Finkelshtein, Rami Puzis, Asaf Shabtai, Bronislav Sidik SBP-BRiMS (2016) Link to document The meteoric progress of Internet technologies and PDA (personal digital assistant) devices has made public Wi-Fi hotspots very popular. Nowadays, hotspots can be found almost anywhere: organizations, home networks, public transport systems, restaurants, etc. The Internet usage patterns (e.g. browsing) differ with […]
MIMO Gaussian broadcast channels with common, private and confidential messages
Z. Goldfeld In Proceedings of the 2016 IEEE Information Theory Workshop (ITW-2016), Cambridge, UK, September 2016 Link to document The two-user multiple-input multiple-output(MIMO) Gaussian broadcast channel (BC) with common,private and confidential messages is considered. The transmittersends a common message to both users, a confidential messageto User 1 and a private (non-confidential) message to User2. The […]
Network Flow Watermarking: A Survey
Cooperation with Singapore University of Technology and Design A Iacovazzi, Y Elovici IEEE Communications Surveys & Tutorials ( Volume: 19, Issue: 1, Firstquarter 2017 ) Page(s): 512 – 530 Link to document Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic network administration often takes advantage of TA for purposes […]
Broadcast channels with privacy leakage constraints
In collaboration with Technische Universit¨at M¨unchen Z. Goldfeld, G. Kramer and H. H. Permuter Accepted to the IEEE Transactions on Information Theory, August 2016 Link to document The broadcast channel (BC) with one common and two private messages with leakage constraints is studied, where leakage refers to the normalized mutual information between a message and […]