Chapters in books

  1. Fire, M., Puzis, R., Elovici, Y., “Link Prediction in Highly Fractional Data Sets, Handbook of Computational Approaches to Counterterrorism”, pp. 283-300, Springer, 2013.

  2. Altshuler, Y., Puzis, R., Elovici, Y., Bekhor, S., Pentland, A., Optimizing Surveillance and Monitoring Stations Locations using Transportation Oriented Augmented Betweenness Centrality. In Securing Transportation Systems, Protecting Critical Infrastructures Series, Y. Shiftan and S. Hakim (eds.), Springer, 2012.

  3. Altshuler, Y., Dolev, S., Elovici, Y., TTLed Random Walks for Collaborative Monitoring in Mobile and Social Networks. In Handbook of Optimization in Complex NetworksOptimization and Its Applications 57, 507-538, Springer, 2012.

  4. Puzis, R., Elovici, Y., Tubi, M., “Optimizing Targeting of Intrusion Detection Systems in Social Networks”, In Handbook of Social Network Technologies and Applications Part 4, Edited by Borko Furht, Springer-Verlag, pp. 549-568, 2010.

  5. Englert, R., Elovici, Y., Glezer, C., “Open Innovation and the R&D Chain: The Case of Collaboration with a University Research Institute”. In Applied Technology and Innovation Management, H. Arnold and C. Schläffer and M. Erner (Eds.), Springer-Verlag, pp. 25-35, 2010.

  6. Elovici, Y., Shabtai, A., Protecting Critical Infrastructures from Cyber Attacks Involving Malware. In Modelling Cyber Security. Approaches, Methodology, Strategies. Nato Science for Peace and Security, Series–E: Human and Societal Dynamics, U. Gori (ed.)59, 140-150, IOS Press NATO Series, November 2009.

  7. Elovici, Y., Glezer, C., Englert, R., How to Protect Critical Infrastructure from Cyber-Terrorist Attacks. In Security Informatics and Terrorism: Patrolling the Web – Social and Technical Problems of Detecting and Controlling Terrorists’ Use of the World Wide Web, C. S. Gal, P. B. Kantor, B. Shapira (eds.), 224-232, IOS Press NATO Series, 2008.

  8. Shapira, B., Elovici, Y., Last, M., Kandel, A., Enhancement to the Advanced Terrorist Detection System (ATDS). In C. S. Gal, P B. Kantor, Bracha Shapira, (Editors), Security Informatics and Terrorism: Patrolling the Web – Social and Technical Problems of Detecting and Controlling Terrorists’ Use of the World Wide Web, IOS Press NATO Series, pp. 71-81, 2008.

  9. Elovici, Y., Shapira, B., Last, M., Zaafrany, O. Friedman, M., Schneider, M., Kandel, A., “Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)”. In Chen, H.; Reid, E.; Sinai, J.; Silke, A.; Ganor, B. (Editors), Terrorism Informatics, Knowledge Management and Data Mining for Homeland Security Series: Integrated Series in Information Systems, Vol. 18, Chapter 17, pp. 365-385, 2008

  10. Rokach, L., Elovici, Y. “An overview of IDS Using Anomaly Detection”. In Lech, J. Janczewski and Andrew, M., Colarik (Editors), Cyber Warfare and Cyber Terrorism, Idea Group Reference, pp. 327-337, 2007.

  11. Elovici, Y. “TDS – an Innovative Terrorist Detection System”. In Last, M. and Kandel, A. (Editors), Fighting Terror in Cyberspace, Chapter 5, Series in Machine Perception and Artificial Intelligence, Vol. 65, pp. 75-87, World Scientific, 2005.

  12. Last, M., Shapira, B., Elovici, Y., Zaafrany, O., and Kandel. “IntelligentTechnology for Content Monitoring on the Web”. In Zhang, Y., Kandel, A., Lin, T.Y., and Yao, Y. (Editors), Computational Web Intelligence: Intelligent Technology for Web Applications, Chapter 25, Series in Machine Perception and Artificial Intelligence, Vol. 58, pp. 539-552, World Scientific, 2004.

Close Menu