Yuval Elovici
Menu
Chapters in books
- Fire, M., Puzis, R., Elovici, Y., “Link Prediction in Highly Fractional Data Sets, Handbook of Computational Approaches to Counterterrorism”, pp. 283-300, Springer, 2013.
- Altshuler, Y., Puzis, R., Elovici, Y., Bekhor, S., Pentland, A., Optimizing Surveillance and Monitoring Stations Locations using Transportation Oriented Augmented Betweenness Centrality. In Securing Transportation Systems, Protecting Critical Infrastructures Series, Y. Shiftan and S. Hakim (eds.), Springer, 2012.
- Altshuler, Y., Dolev, S., Elovici, Y., TTLed Random Walks for Collaborative Monitoring in Mobile and Social Networks. In Handbook of Optimization in Complex Networks, Optimization and Its Applications 57, 507-538, Springer, 2012.
- Puzis, R., Elovici, Y., Tubi, M., “Optimizing Targeting of Intrusion Detection Systems in Social Networks”, In Handbook of Social Network Technologies and Applications Part 4, Edited by Borko Furht, Springer-Verlag, pp. 549-568, 2010.
- Englert, R., Elovici, Y., Glezer, C., “Open Innovation and the R&D Chain: The Case of Collaboration with a University Research Institute”. In Applied Technology and Innovation Management, H. Arnold and C. Schläffer and M. Erner (Eds.), Springer-Verlag, pp. 25-35, 2010.
- Elovici, Y., Shabtai, A., Protecting Critical Infrastructures from Cyber Attacks Involving Malware. In Modelling Cyber Security. Approaches, Methodology, Strategies. Nato Science for Peace and Security, Series–E: Human and Societal Dynamics, U. Gori (ed.)59, 140-150, IOS Press NATO Series, November 2009.
- Elovici, Y., Glezer, C., Englert, R., How to Protect Critical Infrastructure from Cyber-Terrorist Attacks. In Security Informatics and Terrorism: Patrolling the Web – Social and Technical Problems of Detecting and Controlling Terrorists’ Use of the World Wide Web, C. S. Gal, P. B. Kantor, B. Shapira (eds.), 224-232, IOS Press NATO Series, 2008.
- Shapira, B., Elovici, Y., Last, M., Kandel, A., Enhancement to the Advanced Terrorist Detection System (ATDS). In C. S. Gal, P B. Kantor, Bracha Shapira, (Editors), Security Informatics and Terrorism: Patrolling the Web – Social and Technical Problems of Detecting and Controlling Terrorists’ Use of the World Wide Web, IOS Press NATO Series, pp. 71-81, 2008.
- Elovici, Y., Shapira, B., Last, M., Zaafrany, O. Friedman, M., Schneider, M., Kandel, A., “Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)”. In Chen, H.; Reid, E.; Sinai, J.; Silke, A.; Ganor, B. (Editors), Terrorism Informatics, Knowledge Management and Data Mining for Homeland Security Series: Integrated Series in Information Systems, Vol. 18, Chapter 17, pp. 365-385, 2008
- Rokach, L., Elovici, Y. “An overview of IDS Using Anomaly Detection”. In Lech, J. Janczewski and Andrew, M., Colarik (Editors), Cyber Warfare and Cyber Terrorism, Idea Group Reference, pp. 327-337, 2007.
- Elovici, Y. “TDS – an Innovative Terrorist Detection System”. In Last, M. and Kandel, A. (Editors), Fighting Terror in Cyberspace, Chapter 5, Series in Machine Perception and Artificial Intelligence, Vol. 65, pp. 75-87, World Scientific, 2005.
- Last, M., Shapira, B., Elovici, Y., Zaafrany, O., and Kandel. “IntelligentTechnology for Content Monitoring on the Web”. In Zhang, Y., Kandel, A., Lin, T.Y., and Yao, Y. (Editors), Computational Web Intelligence: Intelligent Technology for Web Applications, Chapter 25, Series in Machine Perception and Artificial Intelligence, Vol. 58, pp. 539-552, World Scientific, 2004.