Conference Proceedings

  1. Elovici, Y., Azaria, H., “Message Passing System for Transputer Network MTT Implementation”, The Third International Conference on Applications of Transputers, 650-655, Volume 2, IOS Press, August 28-30,1991.
  1. Elovici, Y., Hersh R.D, Azaria H., “Message Passing System for Closely Coupled Multiprocessor System”, 17th convention of Electrical and Electronics Engineers conf. (IEEE) in Israel, 275-278, Tel-Aviv, March 5-7, 1991.
  1. Elovici, Y., Shapira, B., Maschiach, A., “A New Privacy Model for Web Surfing”, Next Generation Information Technologies and Systems, 5th International Workshop, NGITS 2002, Lecture Notes in Computer Science 2382, Springer-Verlag, 45-57, Caesarea, Israel, June 24-25, 2002 (Acceptance rate: 50%).
  1. Elovici, Y., Shapira, B., Maschiach, A., “A New Privacy Model for Hiding Group Interests While Accessing the Web”, Workshop on Privacy in the Electronic Society, 63-70, (in association with 9th ACM Conference on Computer and Communications Security), Washington, DC, USA, November 21, 2002. Sponsored by ACM SIGSAC.                    (Acceptance rate: 27%).
  1. Elovici, Y., Ben-Shimol, Y., Shabtai, A., “Per-Packet Pricing Scheme for IP Networks”, 10th International Conference on Telecommunications, ICT’2003, 1494-1500, Papeete, Tahiti, French Polynesia, February 23-March 1, 2003 (Acceptance rate: 35%).
  1. Last, M., Shapira, B., Elovici, Y., Zaafrany, O., Kandel, A., “Content-Based Methodology for Anomaly Detection on the Web”, First International Atlantic Web Intelligence Conference, Advances in Web Intelligence (AWIC’03) E. Menasalvas et al. (Editors), Lecture Notes in Artificial Intelligence 2663, 113–123, Springer-Verlag, Madrid, Spain, May 5-6, 2003.
  1. Kuflik, T., Shapira, B., Elovici, Y., Maschiach, A., “Privacy Preservation Improvement by Learning Optimal Profile Generation Rate”, The 9th International Conference on User Modeling, Lecture Notes in Computer Science (UM ’03) 2702, 168-177, Springer-Verlag, University of Pittsburgh, USA, June 22-25, 2003 (Acceptance rate: 25%).
  1. Shapira, B., Last, M., Elovici, Y., Zaafrany, O., Kandel, A., “Using Data Mining Techniques for Detecting Terror-Related Activities on the Web”( ECIW 2003), The 2nd European Conference on Information Warfare and Security, 271-280, University of Reading, UK, June 30 – July 1, 2003.
  1. Ben-Shimol, Y., Elovici, Y., Glezer, C., “Illusive Routing: Achieving Anonymity Using Multiple Cellular Network Providers”, 2nd WSEAS Intern. Conf. on Electronics, Hardware, Wireless & Optical Communications (EHAC 2003), 188-198, Mykonos Island, Greece, August 11-13, 2003.
  1. Glezer, C., Ben-Shimol, Y., Elovici, Y., “A Bounded Local Adaptive Packet Pricing (BLAPP) Scheme for IP Networks”, 3rd WSEAS Int. Conf. on Applied Informatics and Communications (AIC’03), 282-288, Rhodes Island, Greece, November 15-17, 2003.
  1. Friedman, M., Kandel, A., Schneider, M., Last, M., Shapira, B., Elovici, Y., Zaafrany, O., “A fuzzy-Based Algorithm for Web Document Clustering”, North American Fuzzy Information Processing Society (NAFIPS 2004), Volume 2, 524-527, Banff, Alberta, Canada, June 27-30, 2004.
  1. Zaafrany, O., Shapira, B., Elovici, Y., Last, M.,“OHT- Online-HTML Tracer for Detecting Terrorist Activities on the Web”, The 3rd European Conf. on Information Warfare and Security (ECIW 2004), 371-379, London UK, June 28-29, 2004.
  1. Elovici, Y., Waisenberg, R., Shmueli, E., Gudes, E., “A Structure Preserving Database Encryption Scheme”, VLDB 2004 Workshop, SDM 2004, Workshop on Secure Data Management in a Connected World, Lecture Notes in Computer Science 3178, 28-40, Toronto, Canada, August 30, 2004 (Acceptance rate: 53%).
  1. Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O., Schneider, M., Friedman, M., “Terrorist Detection System”, The 15th European Conference on Machine Learning (ECML) and the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2004), Lectures Notes in Artificial Intelligence 3202, Springer-Verlag, 540-542, Pisa, Italy, September 20-24, 2004 (Acceptance rate: 14.5%).
  1. Elovici, Y., Shapira, B., Spanglet, Y., “Hidden Web Privacy Preservation Surfing (Hi-WePPS) Model”, CIPLIT’s 2004 5th Annual Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, October 14-15, 2004, Published in Strandburg, D. and Stan Raicu, D. (Editors), “Privacy and Technologies of Identity, A Cross-Disciplinary Conversation”, Chapter 19, Springer, 335-348, 2006.
  1. Ben-Uziyahu, G., Shapira, B, Elovici, Y., “Illusive Browsing: Achieving Privacy on the Web using a P2P network”, The 5th WSEAS Int. Conf. on Automation and Information (ICAI’04), 1734-1743, November 15, 2004.
  1. Elovici, Y., Shapira, B., Last, M., Zaafrany, O., Friedman, M., Schneider, M., Kandel, A., “Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Atlanta, Georgia, May 19-20, 2005, Lectures Notes in Computer Sciences Volume 3495, Springer-Verlag, 244-255, 2005 (Acceptance rate: 31%).
  1. Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E., “Designing Secure Indexes for Encrypted Databases”, The 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Lecture Notes in Computer Science 3654, 54-68, University of Connecticut, Storrs, Connecticut, U.S.A., August 7-10, 2005.
  1. Shabtai, A., Shahar, Y., Elovici, Y., “Using the Knowledge-Based Temporal Abstraction (KBTA) Method for Detection of Electronic Threats”, 5th European Conference on Information Warfare and Security, National Defense College, Helsinki, Finland, June1-2, 2006.
  1. Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., Elovici, Y., “Application of Artificial Neural Networks Techniques to Computer Worm Detection”, IEEE World Congress on Computational Intelligence (IEEE WCCI 2006), Vancouver, BC, Canada, July 16-21, 2006, 2362-2369 (Acceptance rate: 30%).
  1. Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., Elovici, Y., “Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques”, International Conference on Neural Networks (ICNN 2006), Barcelona, Spain, October 22-24, 2006 (Acceptance rate: 68%).
  1. Shabtai, A., Shahar, Y., Elovici, Y., “Monitoring For Malware Using a Temporal-Abstraction Knowledge Base”, The 8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006 (Acceptance rate: 30%).
  1. Shabtai A., Klimov, D., Shahar, Y., Elovici, Y., “An Intelligent, Interactive Tool for Exploration and Visualization of Time-Oriented Security Data”, The 3rd International Workshop on Visualization for Computer Security (VizSEC2006), Conference on Computer and Communications Security, Virginia, USA, November 3, 2006, 15-22 (Acceptance rate: 43%).
  1. Shirtz, D., Bluvband, Z., Elovici, Y., Shoval, P. “Computer Systems & Information SSR: a Unified Approach for Decision Making”, The 53rd Annual Reliability & Maintainability Symposium (RAMS), Orlando, Florida USA, January 22-25, 2007, 427-433. (Acceptance rate: 50%).
  1. Moskovitch, R., Pluderman, S., Gus, I., Stopel, D., Feher, C., Parmet, Y., Shahar, Y., Elovici, Y., “Host Based Intrusion Detection using Machine Learning”, IEEE Information and Security Informatics, Rutgers University, New Jersey, US, May 23-24, 2007, 107-114. (Acceptance rate: 30%).
  1. Moskovitch, R., Nissim, N., Elovici, Y., “Malicious Code Detection and Acquisition Using Active Learning”. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007), Rutgers University, New Jersey, USA, May 23-24, 2007, 371. (Acceptance rate: 30%).
  1. Tubi, M., Puzis, R., Elovici, Y., “Deployment of DNIDS in Social Networks”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007), Rutgers University, New Jersey, USA, May 23-24, 2007, 59-65. (Acceptance rate: 30%).
  1. Puzis, R., Tubi, M., Tahan, G., Elovici, Y., “Simulating Threats Propagation within the NSP infrastructure”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2007), Rutgers University, New Jersey, USA, May 23-24, 2007, 380. (Acceptance rate: 30%).
  1. Moskovitch, R., Gus, I., Pluderman, S., Stopel, D., Glezer C.,. Shahar, Y., Elovici, Y., “Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining”, IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007, Honolulu, Hawaii, USA, April 1-5, 2007, 167-177.                     (Acceptance rate: 40%).

 Zakin, O., Levi, M., Elovici, Y., Rockach, L., Shafrir, N., Sinter, G., Pen, O., “Identifying Computers Hidden behind a NAT using Machine Learning Techniques”. ECIW 2007, The 6th European Conference on Information Warfare and Security, Defense College of Management and Technology, Shrivenham, UK, July 2-3, 2007, 335-340.

  1. Elovici, Y., Shabtai, A., Moskovitch, R., Tahan, G, Glezer, C., “Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic”, The 30th Annual German Conference on Artificial Intelligence (KI-2007), Lectures Notes in Computer Sciences Volume 4667, Springer, Osnabrück, Germany, Sep 10-13, 2007, 44-50.                      (Acceptance rate: 32%).
  1. Moskovitch, R., Nissim, N., Stopel, D., Feher, C., Englert, R., Elovici, Y., “Improving the Detection of Unknown Computer Worms Activity using Active Learning, 30th Annual German Conference on Artificial Intelligence (KI-2007), Lectures Notes in Computer Sciences Volume 4667, Springer, Osnabrück, Germany, Sep 10-13, 2007, 489-493.                 (Acceptance rate: 32%).
  1. Shabtai A., Atlas M., Shahar Y.,Elovici Y., “Evaluation of a Temporal-Abstraction Knowledge-Acquisition Tool in the Network Security Domain”, The 4th International Conference on Knowledge Capture (K-CAP2007), Oct 28-31, 2007, 7-14.
  1. Moskovitch, R., Elovici, Y., “Unknown Malcode Detection – A Chronological Evaluation”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2008), Taipei, Taiwan, June 17-20, 2008, 267-268. (Acceptance rate: 23%).
  1. Moskovitch, R., Stopel, D., Feher, C., Nissim, N., Elovici, Y., “Unknown Malcode Detection via Text Categorization and the Imbalance Problem”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2008), Taipei, Taiwan, June 17-20, 2008, 156-161. (Acceptance rate: 23%).
  1. Moskovitch, R., Elovici, Y., “Unknown Malicious Code Detection – Practical Issues”, ECIW 2008, The 7th European Conference on Information Warfare and Security, University of Plymouth, UK, June 30 – July 1st, 2008, 145-152.
  2. Moskovitch, R., Nissim, , Englert, R., Elovici, Y., “Active Learning to Improve the Detection of Unknown Computer Worms Activity”, The 11th International Conference on Information Fusion, Cologne, Germany, June 30 – July 03, 2008, 1-8.
  1. Kisilevizt, S., Elovici, Y. Shapira, B., Rokach, L., “kACTUS 2.0: Privacy Preserving in Classification Tasks using k-Anonymity”, Second Annual Workshop on Information Privacy and National Security (ISIPS 2008): Interdisciplinary Studies in Information Privacy and Security, Lecture Notes in Computer Science, Volume 5661/2009, Springer, New Brunswick,
    New Jersey, May 12, 2008, 63-81.
  1. Moskovitch, R., Nissim, N., Elovici, Y., “Malicious Code Detection Using Active Learning”, 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD, PinKDD08, Lectures Notes in Computer Sciences Volume 5456, Springer, Las Vegas, USA, August 25, 2008, 74-91.
  1. Moskovitch, R., Feher, C., Tzachar, N., Berger, E., Gitelman, M., Dolev, S., Elovici, Y., “Unknown Malcode Detection Using OPCODE Representation”, European Conference on Intelligence and Security Informatics 2008 (EuroISI08), Lectures Notes in Computer Sciences Volume 5376, Springer, Esbjerg, Denmark, December 3-5, 2008, 204-215.
  1. Puzis, R., Klippel, M. D., Elovici, Y., Dolev, S., “Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures”, European Conference on Intelligence and Security Informatics 2008 (EuroISI08), Lectures Notes in Computer Sciences Volume 5376, Springer, Esbjerg, Denmark, December 3-5, 2008, 191-203.
  1. Rozenberg, B., Gudes, E., Elovici, Y., “A Distributed Framework for the Detection of new worm-related Malware”, European Conference on Intelligence and Security Informatics (EuroISI08), Lectures Notes in Computer Sciences Volume 5376, Springer, Esbjerg, Denmark, December 3-5, 2008, 179-190.
  1. Moskovitch, R., Feher, C., Elovici, Y., “A Chronological Evaluation of Unknown Malcode Detection”, Pacific Asia Workshop on Intelligence and Security Informatics, Lectures Notes in Computer Sciences Volume 5477, Springer, Bangkok, Thailand, April 27, 2009, 112-117.
  1. Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafia, T., Camtepe, A., LÃhlein, B., Heister, U., MÃller, S., Rokach, R., Elovici, Y., “Identity Theft, Computers and Behavioral Biometrics”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2009), Dallas, Texas, June 8-11, 2009, 155-160.
  1. Rozenberg, B., Gudes, E., Elovici, Y., “SISR – a New Model for Epidemic Spreading of Electronic Threats”, 12th Information Security Conference (ISC’09), Lecture Notes in Computer Science, Vol. 5735/2009, Springer Berlin, Pisa, Italy, September 7-9, 2009, 242-249. (Acceptance rate =36%).
  1. Shabtai,, Kanonov, U., Elovici, Y., “Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach”, Poster in the 12th International Symposium on Recent Advances in Intrusion Detection (RAID 2009), Lecture Notes in Computer Science, Vol. 5758/2009, Springer Berlin, Saint-Malo, Brittany, France, September 23-25, 2009, 357-358.
  1. Rozenberg, B., Gudes, E., Elovici, Y., Fledel, Y., “Method for Detecting Unknown Malicious Executables”, Poster in the 12th International Symposium on Recent Advances in Intrusion Detection (RAID 2009), Saint-Malo, Brittany, France, September 23-25, 2009, 376-377.
  1. Dolev, S., Elovici, Y., Kesselman, A., Zilberman, P., “Trawling Traffic under Attack, Overcoming DDoS Attacks by Target-Controlled Traffic Filtering”, Second International Workshop on Reliability, Availability, and Security (WRAS 2009), Hiroshima, Japan, December 8, 2009, 336-341.
  1. Shmueli, E., Kruglov, A., Puzis, R., Elovici, Y., Englert, R., Glezer, C., “An Attentive Digital Signage System”, In Proc. Mensch und Computer 2009, Digital Signage mit Interaktiven Displays Workshop, Berlin, September 6, 2009.
  1. Shabtai, A., Elovici, Y., “Detecting Malicious Applications on Android Using Anomaly Detection”, Poster in the 25th Annual Computer Security Applications Conference (ACSAC 2009), Honolulu, Hawaii, USA, December 7-11, 2009.
  1. *Altshuler, Y., Dolev, S., Elovici, Y., Aharony, N., “Efficient Collaborative Application Monitoring Scheme for Mobile Networks”, NetMob 2010, Workshop on the Analysis of Mobile Phone Networks, NetSci 2010 and Conference on Network Science, MIT, Cambridge, Massachusetts, May 10-14, 2010, 72-73.
  1. Rozenshine-Kemelmakher, E., Puzis, R., Felner, A., Elovici, Y., “Cost Benefit Deployment of DNIPS”, IEEE International Conference on Communication (ICC),Cape Town, South Africa, May 23-27, 2010, 1-5.
  1. Altshuler, Y., Dolev, S., Elovici, Y., Aharony, N., “TTLed Random Walks for Collaborative Monitoring”, Second International Workshop on Network Science for Communication Networks (NetSciCom), San Diego, CA, USA, March 19, 2010.
  1. Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y., Dolev, S., “Rendezvous Tunnel for Anonymous Publishing”, Poster in The 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, October 4-8, 2010, 690-692.
  1. Harel, A., Shabtai, A., Rokach, L., Elovici, Y., “M-Score: Estimating the Potential Damage of Data Leakage Incident by Assigning Misuseability Weight”, The ACM Conference on Computer and Communications Security – Workshop on Insider Threats (WITS 2010), Chicago, USA, October 10, 2010, 13-20.
  1. Gafny, M., Shabtai, A., Rokach, L., Elovici, Y., “Detecting Data Misuse By Applying Context-Based Data Linkage”, The ACM Conference on Computer and Communications Security – Workshop on Insider Threats (WITS 2010), 3-12, Chicago, USA, October 10, 2010.
  1. Shabtai, A., Elovici, Y., “Applying Behavioral Detection on Android-based Devices”, The Third International ICST Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (Mobilware 2010), Chicago, USA, June 30-July 2, 2010, 235-249.
  1. Altshuler, Y., Aharony, N., Elovici, Y., Pentland, A., Cebrian, M., “Stealing Reality”, Workshop on Information in Networks (WIN), NYC Stern School of Business, New York City, New York, September 24-24, 2010.
  1. Fledel, Y., Shabtai, A., Potashnik, D., Elovici, Y., “Google Android: An Updated Security Review”, The 2nd International Conference on Mobile Computing, Applications and Services (MobiCASE 2010), Santa Clara, CA, USA, October 25-28, 2010, 401-414.
  1. Weiss, Y., Elovici, Y., Rokach, L., “Cost-Sensitive Detection of Malicious Applications in Mobile Devices”, International Workshop on Mobile Security, Biltmore Hotel & Suites, Santa Clara, CA, USA, October 28, 2010, 382-395.
  1. Shimshon, T., Moskovitch, R., Rokach, L., Elovici, Y., “Clustering Di-Graphs for Continuously Verifying Users according to their Typing Patterns”, IEEE 26th Convention of Electrical and Electronics Engineers in Israel (IEEEI 2010), Eilat, Israel, November 17-20, 2010, 445-449.
  1. Shabtai, A., Fledel, Y., Elovici, Y., “Automated Static Code Analysis for Classifying Android Applications Using Machine Learning”, The 6th International Conference on Computational Intelligence and Security (CIS 2010), Nanning, China, December 11-14, 2010, 329-333.
  1. Shimshon, T., Moskovitch, R., Rokach, L., Elovici, Y., “Continuous Verification Using Keystroke Dynamics”, The International Conference on Computational Intelligence and Security (CIS’10), Nanning, Guangxi Zhuang Autonomous Region, December 11-14, 2010, 411-415.
  1. Porat, T., Rief, I., Puzis, R., Elovici, Y., “LoOkie – It Feels Like Being There”, Exdended Abstracts on Human Factors in Computing Systems (CHI 2011), 1873-1878, Vancouver, BC, Canada, May 7–12, 2011.
  1. Gafny, M., Shabtai A., Rokach, L., Elovici, Y., “Poster: Applying Unsupervised Context-Based Analysis for Detecting Unauthorized Data Disclosure”, The ACM Conference on Computer and Communications Security, Chicago, USA, October 17-21, 2011, 765-768.
  1. Ossmy, O., Tam, O., Puzis, R., Inbar, O.,Rokach, R., Elovici, Y.,  “MindDesktop: General Human Computer Interface for Severely Handicapped”, The 13th International Conference on Enterprise Information Systems (ICEIS), Volume 4, 316-320, Beijing, China, June 8-11, 2011.
  1. Harel, A., Shabtai, A., Rokach, L., and Elovici, Y., “Eliciting Domain Expert Misuseability Conceptions”, Poster in The 6th International Conference on Knowledge Capture (KCAP ’11), Alberta, Canada, 2011.
  1. Bercovitch, M., Renford, M., Hasson, L., Shabtai, A., Rokach, L., Elovici, Y., “HoneyGen: An Automated Honeytokens Generator”, IEEE International Conference on Intelligence and Security Informatics (ISI 2011), 131-136, Beijing, China, July 9-12, 2011.
  1. Harel, A., Shabtai, A., Rokach, L., Elovici, Y., “Dynamic Sensitivity-Based Access Control”, IEEE International Conference on Intelligence and Security Informatics (ISI 2011), 201-203, Beijing, China, July, 2011.
  1. Zilberman, P., Katz, G., Elovici, Y., Shabtai, A., Dolev, S., “Analyzing Group Communication for Preventing Data Leakage via Email”, IEEE International Conference on Intelligence and Security Informatics (ISI 2011), 37-41, Beijing, China, July, 2011.
  1. Altshuler,Y., Puzis, R., Aharony, N., Elovici, Y., Pentland, A.,  Bekhor, S., “Augmented Betweenness Centrality for Mobility Prediction in Transportation Networks”, International workshop on Finding Patterns of Human Behaviors in NEtwork and MObility Data (NEMO), 1-12, Athens, Greece, September 9,  
  1. Hermoni, O., Gilboa, N., Felstaine, E., Elovici, Y., Dolev, S., “Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs”, The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011), Volume 6976, Springer, 223-237, Grenoble, France, October 10-12, 2011.
  1. Fire, M., Tenenboim, L., Lesser, O., Puzis, R., Rokach, L., Elovici, Y., “Link Prediction in Social Networks using Computationally Efficient Topological Features”, IEEE Conference on Social Computing (SocialCom), 73-80, MIT Boston, October 2011. (Acceptance rate: 9.8%).
  1. Altshuler, Y., Fire, M., Aharony, N., Elovici, Y., Pentland, A., “How Many Makes a Crowd? On the Correlation between Groups’ Size and the Accuracy of Modeling”, Social Computing, Behavioral Modeling and Prediction (SBP12) Volume 7227, 43-52, University of Maryland, College Park, Maryland, April 3-5, 2012, 43-52.
  1. Puzis, R., Altshuler, Y., Elovici, Y., Bekhor, S., Shiftan, Y., Pentland, A., “Traffic Assignment Model Based on Betweenness”, Poster in the International School and Conference on Complex Networks, NetSci 2012, Northwestern University, Evanston, Ilinois, June 18-22, 2012.
  1. Altshuler, Y., Pentland, A., Bruckstein, A., Fire, M., Elovici, Y., Lazer, D., “Real World Anomalous Events Detection Based on Social Signals in Mobile Networks Traffic”, Poster in The International School and Conference on Complex Networks. NetSci 2012, Northwestern University in Evanston, Ilinois, June 18-22, 2012.
  1. Puzis, R., Zilberman, P., Elovici, Y., Dolev, S., Brandes, U., “Heuristics for Speeding up Betweenness Centrality Computation”, International Conference on Privacy, Security, Risk and Trust (PASSAT 2012), and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012, 302-311.
  1. Altshuler Y., Aharony N., Fire M., Elovici Y., Pentland A., “Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data”, International Conference on Privacy, Security, Risk and Trust (PASSAT 2012), and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012, 969-974.
  1. Menahem, E., Nakibli, G., Elovici, Y., “Network-Based Intrusion Detection Systems Go Active!”, Poster in The19th ACM Conference on Computer and Communications Security, Raleigh, NC, USA, October 16-18, 2012, 1004-1006.
  1. Fire, M., Kagan, D., Elishar, A., Elovici, Y., “Social Privacy Protector – Protecting Users’ Privacy in Social Networks”, The Second International Conference on Social Eco-Informatics (SOTICS), Venice, Italy, October 21-26, 2012.
  1. Menahem, E., Puzis, R., Elovici, Y., “Detecting Spammers via Aggregated Historical Data Set”, The 6th International Conference on Network and System Security (NSS), Wu Yi Shan, Fujian, China, November 21-23, 2012, 248-262.
  1. Fire, M., Katz, G., Elovici, Y., Shapira, B., Rokach, L., “Predicting Student Exam’s Scores by Analyzing Social Network Data”, The International Conference on Active Media Technology 2012, Macau, China, December 4-7, 2012.
  1. Elishar, A., Fire, M., Kagan, D., Elovici, Y., “Organizational Intrusion: Organization Mining using Socialbots”, International Conference on Social Informatics (SocialInformatics), Washington D.C., USA, December 14-16, 2012, 7-12. (Acceptance rate 9.6%)
  1. Fire, M., Katz, G., Elovici, Y., “Strangers Intrusion Detection – Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies”, ASE International Conference on Social Informatics 2012, Washington D.C., USA, December 14-16, 2012. (Acceptance rate 11.5%)
  1. Bar, A., Mimran, D., Shapira, B., Tenenboim-Chekina, L., Nadeem, T., Elovici, Y., “Nesto – Network Selection and Traffic Offloading System For Android Mobile Device”, The 9th International Wireless Communications & Mobile Computing Conference (IWCMC 2013), Cagliari, Sardinia – Italy, July 1 – 5, 2013.
  1. Altshuler, Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A.M., Pentland, A., Lazer, D., “Detecting Anomalous Behaviors Using Structural Properties of Social Networks”, The 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013), Washington D.C., USA, April 2 – 5, 2013, 433-440.
  1. Altshuler, Y., Fire, M., Aharony, N., Volkovich, Z., Elovici, Y., Pentland, A., “Trade-Offs in Social and Behavioral Modeling in Mobile Networks”, The 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013), Washington D.C., USA, April 2 – 5, 2013, 412-423.
  1. Lesser, O., Tenenboim-Chekina, L., Rokach, L., Elovici, Y., “Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks”, The 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013), Washington D.C., USA, April 2 – 5, 2013, 368-376.
  1. Altshuler,Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A., Pentland, A.S., Lazer, D., “The Social Amplifier – Reaction of Human Communities to Emergencies”, Third conference on the Analysis of Mobile Phone Datasets (NetMob 2013), MIT, Cambridge, USA, May 1-3, 2013.
  1. Suissa, E., Chizi, B., Elovici, “Protecting Cellular Networks from Attacks Launched Via Mobile Applications”, Poster in the Third conference on the Analysis of Mobile Phone Datasets (NetMob 2013), MIT, Cambridge, USA, May 1-3, 2013.
  1. Tenenboim-Chekina, L., Barad, O., Shabtai, A., Mimran, D., Rokach, L., Shapira, B., Elovici, Y., “Detecting Application Update Attack on Mobile Devices through Network Features”, Poster in 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 14-19, 2013.
  1. Kedma, G., Guri, M., Sela, T., Elovici, Y., “Analyzing Users’ Web Surfing Patterns to Trace Terrorists and Criminals”, IEEE International Conference on Intelligence and Security Informatics (ISI 2013), Seattle Washington, USA, June 4-7, 2013, 143-145.
  1. Guri, M., Sela, T., Elovici, Y., “OpenAPT: Open-Source Advanced Persistent Threat for Academic Research” Poster in IEEE Symposium on Security and Privacy, San Francisco, USA, May 19-22, 2013.
  1. Shabtai, A., Kolman, E., Ereli, E., Vaystikh, A., Rokach, L., Elovici, Y., “Identifying the username of an IP Address in Network-Related Events”, IEEE 2nd International Congress on Big Data (BigData 2013) – Work In Progress (WIP) Track, Santa Clara, USA, June 27-July 2, 2013.
  1. Elishar, A., Fire, M., Kagan, D., Elovici, Y., “Homing Socialbots: Intrusion on a specific organization’s employee using Socialbots”, International Workshop on Social Network Analysis in Applications, co-located with ASONAM 2013, Niagara Falls, Canada, August 25-28, 2013.
  1. Shabtai A., Morad I., Kolman E., Eran E., Vaystikh A., Gruss E., Rokach L., Elovici Y., “IP2User – Identifying the Username of an IP Address in Network-Related Events”, IEEE International Congress on Big Data, BigData Congress 2013, Santa Clara, CA, USA, June 27 2013-July 2, 2013, 435-436.
  1. Menahem E., Elovici Y., Amar N., Nakibly G., “ACTIDS: an active strategy for detecting and localizing network attacks”, AISec’13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, 55-66. (Acceptance rate 44%)
  1. Menahem E., Rokach L., Elovici Y., “Combining one-class classifiers via meta learning”, 22nd ACM International Conference on Information and Knowledge Management (CIKM’13), San Francisco, CA, USA, October 27 – November 1, 2013, 2435-2440. (Acceptance rate 16.8%)
  1. Bar A., Mimran D., Chekina L., Elovici Y., Shapira B., “Nesto – Network selection and traffic offloading system for android mobile devices”, 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013, 337-342. (Acceptance rate 35%)
  1. Begleiter, R., Elovici, Y., Hollander, Y., Mendelson, O., Rokach, L., Saltzman, R., “A Fast and Scalable Method for Threat Detection in Large-scale DNS Logs”, IEEE International Conference on Big Data 2013 (IEEE BigData 2013), Santa Clara, CA, USA, October 6-9, 2013. (Acceptance rate 35%).
  1. Peled, O., Fire, M., Rokach, L., Elovici, Y., “Entity Matching in Online Social Networks”, International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013, 339-344.
  1. Menahem, E., Nakibly, G., Amar, N., Elovici, Y., “An Active Strategy For Detecting and Localizing Network Attacks”, ACM Workshop on Artificial Intelligence and Security (AISEC 2013), Berlin, Germany, November 4, 2013.
  1. Kagan, D., Fier, M., Elovici, Y., “Facebook Applications Installation and Removal- Temporal Analysis”, The Third International Conference on Social Eco-Informatics (SOTICS 2013), Lisbon, Portugal, November 17 – 22, 2013.
  1. Guri, M., Kedma, G., Sela, T., Elovici, Y., “Noninvasive Detection of Anti-Forensic Malware”, Malware Conference 2013 (Malware 2013), Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA, October 22-24, 2013, 1-10. (Acceptance rate 31%).
  1. Dolev, S., Himlich, I, Shapira, B., Elovici, Y., Messalem G., Mimran, D., Kopeetsky, M., “Exploiting Simultaneous Usage of Different Wireless Interfaces for Security and Mobility”, Second International Conference on Future Generation Communication Technologies (FGCT 2013), London, United Kingdom, November 12-14, 2013, 21-26.
  1. Guri, M., Kedma, G., Carmeli, B., Elovici, Y., “Limiting access to unintentionally leaked sensitive documents using malware signatures”. The ACM Symposium on Access Control Models and Technologies (SACMAT 2014), London, Ontario, Canada, June 25-27, 2014.
  1. Nakibly, G., Sosnovich, A., Menahem, E., Waizel, A., Elovici, Y., “OSPF vulnerability to persistent poisoning attacks: a systematic analysis”, 2014 Annual Computer Security Applications Conference (ACSAC 30), New Orleans, Louisiana, USA, December 8–12, 2014, 336-345.
  1. Shabtai, A., Elovici, Y., “POSTER: Misuseablity Analysis for IT Infrastructure”, 21st ACM Conference on Computer and Communications Security (ACM CCS 2014), Scottsdale, Arizona, USA, November 3-7, 2014, 1496-1498.
  1. Guri M., Krasner A., Elovici Y., “Peers-Based Location of Mobile Devices”, Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications (FCC 2014), Auckland, New Zealand, January 13-16, 2014, 439-445.
  1. Nissim, N., “ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files”, IEEE Joint Intelligence & Security Informatics Conference (JISIC2014), Hague, Netherlands, September 24-26, 2014, 91-98. (Acceptance rate 25%)
  1. Guri, M., Kedma, G., Zadov, B., Elovici, Y., “Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements”, IEEE Joint Intelligence & Security Informatics Conference (JISIC2014), Hague, Netherlands, September 24-26, 2014, 145-151. (Acceptance rate 25%)
  1. Guri, M., Kedma, G., Kachlon, A., Elovici, Y., “Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries”, IEEE Joint Intelligence & Security Informatics Conference (JISIC2014), Hague, Netherlands, September 24-26, 2014, 152-159. (Acceptance rate 25%)
  1. Sepetnitsky, V., Guri, M., Elovici, Y., “Exfiltration of Information from Air-Gapped Machines Using Monitor’s LED Indicator”, IEEE Joint Intelligence & Security Informatics Conference (JISIC2014), Hague, Netherlands, September 24-26, 2014, 264-267. (Acceptance rate 25%)
  1. Guri, M., Kedma, G., Kachlon, A., Elovici, Y., “AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies”, 9th International Conference on Malicious and Unwanted Software (MALWARE 2014), Puerto Rico, October 28-30, 2014, 58-67.
  1. Mirsky, Y., Shapira, B., Rokach, L., Elovici, Y., “pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts”, Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2015), Ho Chi Minh City, Vietnam, May 19-22, 2015, 119-133.
  1. Mirsky, A., Cohen, R., Stern, L., Felner, A., Rokach, L., Elovici, Y., “Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains”, The International Symposium on Combinatorial Search (SoCS 2015), Ein-Gedi, the Dead Sea, Israel, June 11-13, 2015, 70-77.
  1. Guri, M., Poliak, Y., Shapira, B., Elovici, Y., “JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface”, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, August 20-22, 2015. (Acceptance rate 28%).
  1. Guri, M., Kachlon, A., Hasson, O., Kedma, G., Mirsky, Y., Elovici, Y., “GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies”, 24th USENIX Security Symposium (USENIX Security’15), Washington, D.C., August 12-14, 2015, 849-864. (Acceptance rate 16%).
  1. Guri, M., Monitz, M., Mirsky, Y., Elovici, Y., “BitWhisper: Covert Signaling Channel between Air-Gapped”, 28th IEEE Computer Security Foundations Symposium, Verona, Italy, July 13-17, 2015. (Acceptance rate 34%).
  1. Nissim, N., Boland, M.R., Moskovitch, R., Tatonetti, N.P., Elovici, Y., Shahar, Y., Hripcsak, G., “An Active Learning Framework for Efficient Condition Severity Classification”, 15th Conference of Artificial Intelligence in Medicine 2015 (AIME-2015), Pavia, Italy, June 17-20, 2015. (Acceptance rate 18%).
  1. Nissim N., Cohen A., Elovici Y., “Boosting the Detection of Malicious Documents Using Designated Active Learning Methods”, IEEE 14th International Conference on Machine Learning and Applications (ICMLA 2015), Miami, FL, USA, December 09-11, 2015, 760-765.
  1. Guri M., Hasson O., Kedma G., Elovici , ”An optical covert-channel to leak data through an air-gap”, 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, December 12-14, 2016, 642-649.
  1. Guri M., Monitz M., Elovici Y., “USBee: Air-gap covert-channel via electromagnetic emission from USB”, 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, December 12-14 2016, 264-268.
  1. Guri M., Monitz M., Elovici Y., “AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling”, Future Network Systems and Security – Second International Conference (FNSS 2016), Paris, France, November 23-25, 2016, 1-11. (Acceptance rate 35%)
  1. Guri M., Shemer E., Shirtz D., Elovici Y., ”Personal Information Leakage During Password Recovery of Internet Services”, 2016 European Intelligence and Security Informatics Conference (EISIC 2016), Uppsala, Sweden, August 17-19, 2016, 136-139.
  1. Sachidananda V., Toh J., Siboni S., Shabtai A., Elovici , “POSTER: Towards Exposing Internet of Things: A Roadmap”, 2016 ACM SIGNAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, 1820-1822. (Acceptance rate 16.5%)
  1. Mirsky Y., Shabtai A., Rokach L., Shapira B., Elovici Y., “SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research”, Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016, 1-12. (Acceptance rate 32%)
  1. GuriSolewicz Y.A., Daidakulov A., Elovici Y., “SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit”, 11th USENIX Workshop on Offensive Technologies (WOOT 2017), Vancouver, BC, Canada, August 14-15, 2017.
  1. BelikovetskyYampolskiy M., Toh J., Gatlin J., Elovici Y., “dr0wned – Cyber-Physical Attack with Additive Manufacturing”, 11th USENIX Workshop on Offensive Technologies (WOOT 2017), Vancouver, BC, Canada, August 14-15, 2017.
  1. Nissim N., Cohen A., Wu J., Lanzi A., Rokach L., Elovici Y., Giles L.C., “Scholarly Digital Libraries as a Platform for Malware Distribution”, Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, 107-128.
  1. Mirsky Y., Halpern T., Upadhyay R., Toledo S., Elovici Y., “Enhanced situation space mining for data streams”, Proceedings of the Symposium on Applied Computing (SAC 2017), Marrakech, Morocco, April 3-7, 2017, 842-849. (Acceptance rate 23.4%)
  1. Toh J., Hatib M., Porzecanski O., Elovici Y., “Cyber security patrol: detecting fake and vulnerable wifi-enabled printers”, Proceedings of the Symposium on Applied Computing (SAC 2017), Marrakech, Morocco, April 3-7, 2017, 535-542. (Acceptance rate 23.4%)
  1. Meidan Y., Bohadana M., Shabtai A., Guarnizo J.D., Ochoa M., Tippenhauer N.O., Elovici Y., “ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis”. “, Proceedings of the Symposium on Applied Computing (SAC 2017), Marrakech, Morocco, April 3-7, 2017, 506-509.
  1. Iacovazzi A., Frassinelli D., Elovici Y., “On packet loss modeling: An empirical assessment”, 8th International Conference on the Network of the Future (NOF 2017), London, United Kingdom, November 22-24, 2017, 33-39. (Acceptance rate 22.4%)
  1. Yampolskiy M., King W.E., Pope G., Belikovetsky S., Elovici Y., “Evaluation of Additive and Subtractive Manufacturing from the Security Perspective”, international conference on Critical Infrastructure Protection XI – 11th (ICCIP 2017), Arlington, VA, USA, March 13-15, 23-44.
  1. Teoh T.T., Nguwi Y.Y., Elovici Y., Cheung N.M., Ng W.L., “Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data”, 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2017), Guilin, China, July 29-31, 2017, 2080-2083.
  1. Teoh T.T., Zhang Y., Nguwi Y.Y., Elovici Y., Ng W.L., “Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk”, 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2017), Guilin, China, July 29-31, 2017, 1790-1793.
  1. Biton R., Feher C., Elovici Y., Shabtai A., Shugol G., Tikochinski R., Kur S., “A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems”, IEEE 18th International Symposium on High Assurance Systems Engineering (HASE 2017), Singapore, January 12-14, 2017, 153-156.
  1. GuriMirsky Y., Elovici Y., “9-1-1 DDoS: Attacks, Analysis and Mitigation”, IEEE European Symposium on Security and Privacy (EuroS&P 2017), Paris, France, April 26-28, 2017, 218-232, (Acceptance rate 13%).
  1. GuriSolewicz Y.A., Daidakulov A., Elovici Y., “Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise (‘DiskFiltration’)”, ESORICS 2017 – 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II, 98-115. (Acceptance rate 16%).
  1. GuriZadov B., Elovici Y., “LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED”, Detection of Intrusions and Malware, and Vulnerability Assessment – 14th International Conference, (DIMVA 2017), Bonn, Germany, July 6-7, 2017, Proceedings,161-184. (Acceptance rate: 27%)
  1. Grube T., Volk F., Muhlhauser M., Bhairav S., Sachidananda V., Elovici Y., “Complexity Reduction in Graphs: A user Centric Approach to Graph Exploration”, 10th Inetrnational Conference on Advances in Human-oriented ans Personalized Mechanisms, Technologies, and Services, Athens, Greece, October 8-12, 2017, 24-31.
  1. HadarSiboni S., Elovici Y., “A Lightweight Vulnerability Mitigation Framework for IoT Devices”, Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (IoT S&P@CCS), Dallas, TX, USA, November 03, 2017, 71-75. (Acceptance rate 40%)
  1. Guarnizo J.D., Tambe A., Bhunia S.S., Ochoa M., Tippenhauer N.O., Shabtai A., Elovici Y., “SIPHON: Towards Scalable High-Interaction Physical Honeypots”, Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security (CPSS@AsiaCCS 2017), Abu Dhabi, United Arab Emirates, April 2, 2017, 57-68. (Acceptance rate 29%)
  1. SachidanandaSiboni S., Shabtai A., Toh J., Bhairav S., Elovici Y., “Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things”, Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS@AsiaCCS 2017), Abu Dhabi, United Arab Emirates, April 2, 2017, 3-10. (Acceptance rate 35%)
  1. ShwartzMathov Y., Bohadana M., Elovici Y.Oren Y., “Opening Pandora’s Box: Effective Techniques for Reverse Engineering IoT Devices”, Smart Card Research and Advanced Applications – 16th International Conference (CARDIS 2017), Lugano, Switzerland, November 13-15, 2017, 1-21.
  1. SlaughterYampolskiy M., Matthews M., King W.E., Guss G., Elovici Y.:How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective”, Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, August 29 – September 01, 2017, 78:1-78:10. (Acceptance rate 24%)
  1. DeyPudi V., Chattopadhyay A., Elovici Y., “Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study”, 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems (VLSID 2018), Pune, India, January 6-10, 2018, 398-403.
  1. Chong P., Tan Y.X.M., Guarnizo J., Elovici Y., Binder A., “Mouse Authentication Without the Temporal Aspect – What Does a 2D-CNN Learn?”, IEEE Security and Privacy Workshops (SP Workshops 2018), San Francisco, CA, USA, May 24, 2018, 15-21. (Acceptance rate 11.5%)
  1. Setikere S., Sachidananda V., Elovici Y., “Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things”, 14th International Conference on Security and Privacy in Communication Networks (SecureComm 2018), Singapore, August 8-10, 2018, Proceedings, Part I, 43-52.
  1. AgarwalPuzis R., Haj-Yahya J., Zilberman P., Elovici Y., “Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic”, ICT Systems Security and Privacy Protection – 33rd IFIP TC 11 International Conference (SEC 2018), Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, 216-230. (Acceptance rate 30%)
  1. AmiElovici Y.Hendler D., “Ransomware prevention using application authentication-based file access control”, Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC 2018), Pau, France, April 09-13, 2018, 1610-1619. (Acceptance rate 25%)
  1. Siboni S., Shabtai A., Elovici Y., “Leaking data from enterprise networks using a compromised smartwatch device”, Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC 2018), Pau, France, April 09-13, 2018, 741-750. (Acceptance rate 25%)
  1. RosenbergShabtai A., Rokach L., Elovici Y., “Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers”, 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), Heraklion, Crete, Greece, September 10-12, 2018, Proceedings, 490-510. (Acceptance rate 22.8%)
  1. Guri M., Zadov B., Daidakulov A., Elovici Y., “xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs”, 16th Annual Conference on Privacy, Security and Trust, (PST 2018), Belfast, Northern Ireland, Uk, August 28-30, 2018, 1-12.
  1. MirskyDoitshman T., Elovici Y.Shabtai A., “Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection”, 25th Annual Network and Distributed System Security Symposium (NDSS 2018), San Diego, California, USA, February 18-21, 2018. (Acceptance rate 21.5%)
  1. HosseiniYin H., Zhang M., Elovici Y.Zhou .X, “Mining Subgraphs from Propagation Networks through Temporal Dynamic Analysis”, 19th IEEE International Conference on Mobile Data Management (MDM 2018), Aalborg, Denmark, June 25-28, 2018, 66-75. (Acceptance rate 27%)
  1. Hecht A., Sagi A., Elovici Y., “PIDS: A Behavioral Framework for Analysis and Detection of Network Printer Attacks”, 13th International Conference on Malicious and Unwanted Software (MALWARE 2018), Nantucket, MA, USA, October 22-24, 2018, 87-94.
  1. IacovazziSarda S., Elovici Y., “Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers”, IEEE Conference on Computer Communications (INFOCOM 2018), Honolulu, HI, USA, April 16-19, 2018, 747-755. (Acceptance rate 19.2%)
  1. Graves L., Yampolskiy M., King W.E., Belikovetsky S., Elovici Y., “Liability Exposure when 3D-Printed Parts Fall from the Sky”, Critical Infrastructure Protection XII – 12th IFIP WG 11.10 International Conference (ICCIP 2018), Arlington, VA, USA, March 12-14, 2018, 39-64.
  1. Lim S.K., Loo Y., Tran N.T., Cheung N.M., Roig G., Elovici Y., “DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN”, IEEE International Conference on Data Mining (ICDM 2018), Singapore, November 17-20, 2018, 1122-1127. (Acceptance rate 19.83%)
  1. BittonGluck T., Stan O., Inokuchi M., Ohta Y., Yamada Y., Yagyu T., Elovici Y.Shabtai A., “Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation”, Computer Security – 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, September 3-7, 2018, Proceedings, Part I,533-554.               (acceptance rate 19.8%).
  1. Guri M., Solewicz Y.A., Elovici Y., “MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication”, IEEE Conference on Dependable and Secure Computing (DSC 2018), Kaohsiung, Taiwan, December 10-13, 2018, 1-8.
  1. Hosseini S., Yin H., Cheung N.M., Leng K.P., Elovici Y., Zhou X., “Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs”, 23rd International Conference on Database Systems for Advanced Applications (DASFAA 2018), Gold Coast, QLD, Australia, May 21-24, 2018, Proceedings, Part I, 342-351. (Acceptance rate 23%)
  1. Karamchandani N.,Sachidananda V., Setikere S., Zhou J., Elovici Y., “SMuF: State Machine Based Mutational Fuzzing Framework for Internet of Things”, 13th International Conference on Critical Information Infrastructures Security (CRITIS 2018), Kaunas, Lithuania, September 24-26, 2018, 101-112. (Acceptance rate 31%)
  1. Elovici Y., “Session details: AI for Forensics”, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security (AISec@CCS 2018), Toronto, ON, Canada, October 19, 2018. (Acceptance rate 28%)
  1. AfrozBiggio B., Elovici Y.Freeman D., Shabtai A., “11th International Workshop on Artificial Intelligence and Security”, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), Toronto, ON, Canada, October 15-19, 2018, 2166-2167. (Acceptance rate 16.6%)
  1. Tambe A., Aung Y.L., Sridharan R., Ochoa M., Tippenhauer N.O., Shabtai A., Elovici Y., “Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots”, Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, (CODASPY), Richardson, TX, USA, March 25-27, 2019, 85-96. (Acceptance rate 23.5%)
  1. Inokuchi M., Ohta Y., Yamada Y., Yagyu T., Bitton R., Stan O., Elovici Y., Shabtai A., “Design Procedure of Knowledge base for Practical Attack Graph Generation”, ACM Asia Conference on Computer and Communications Security (ASIACCS 2019), Auckland, New Zealand, July 7-12, 2019, 594-601. (Acceptance rate 17%)
  1. Breitenbcher D., Homoliak I., Aung Y.L., Tippenhauer N.O., “HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices”, ACM Asia Conference on Computer and Communications Security (ASIACCS 2019), Auckland, New Zealand, July 7-12, 2019, 479-484. (Acceptance rate 17%)
  1. Mirsky Y., Mahler T., Shelef I., Elovici Y.,CT-GAN: Malicious tampering of 3D medical imagery using deep learning“, 28th {USENIX} Security Symposium, Santa Clara, CA, USA, August 14-16, 2019, 461-468. (Acceptance rate 16%)
  1. Iacovazzi A., Frassinelli D., Elovici Y.,The {DUSTER} Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding“, 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China, September 23-25, 2019, 213-225. (Acceptance rate 22.3%)
  1. Nassi B., Ben-Netanel R., Shamir A., Elovici Y., “Drones’ Cryptanalysis-Smashing Cryptography with a Flicker”, IEEE Symposium on Security and Privacy (SP), San Francisco, CA, May 20-22, 2019, 1397-1414. (Acceptance rate 12%)
  1. Katzir Z., Elovici Y., “Detecting adversarial perturbations through spatial behavior in activation spaces“, International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, July 14-19, 2019, 1-9.
  1. Tan YXM., Iacovazzi A., Homoliak I., Elovici Y., A. Binder, “Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics”, International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, July 14-19, 2019, 1-10.
  1. Siboni S., Glezer C., Shabtai A., Elovici Y., “A Weighted Risk Score Model for IoT Devices”, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Atlanta, USA, July 14-17, 2019, 20-34. (Acceptance rate 34.7%)
  1. Nahmias D., Cohen A., Nissim N., Elovici Y., “TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning”, International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, July 14-19, 2019, 1-8.
  1. Guri M., Zadov B., Bykhovsky D., Elovici Y., “CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs”, IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, Wisconson, USA, July 15-19, 2019, 801-810. (Acceptance rate 63.3%)
  1. Sachidananda V., Bhairav S., Ghosh N., Elovici Y., “PIT: A Probe Into Internet of Things by Comprehensive Security Analysis”, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, August 5-8, 2019, 522-529. (Acceptance rate 28.67%)
  1. Cohen S., Gluck T., Elovici Y., Shabtai A., “Security Analysis of Radar Systems”, 5th ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), London, UK, November 11, 2019, 3-14.
  1. Iacovazzi A., Frassinelli D., Elovici Y., “The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding”, 22nd International Symposium on Research in Attacks, Intrusions and Defenses, (RAID), Chaoyang District, Beijing, China, September 23-25, 2019, 213-225.
  1. Tan M., Iacovazzi A., Cheung NMM., Elovici Y, “A Neural Attention Model for Real-Time Network Intrusion Detection”, IEEE 44th Conference on Local Computer Networks (LCN), Osnabrück, Germany, October 14-17, 2019, 291-299. (Acceptance rate 28.9%)
  1. Afroz S., Biggio B., Carlini N., Elovici Y., Shabtai A., “AISec’19: 12th ACM Workshop on Artificial Intelligence and Security”, The 26th ACM Conference on Computer and Communications Security, CCS, London, UK, November 11-15, 2019, 2707-2708.
  1. Guri M., Bykhovsky D., Elovici Y., “BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness“, 12th CMI Conference on Cybersecurity and Privacy (CMI), Copenhagen, Denmark, November 28-29, 2019, 1-6.
  1. Sachidananda V., Bhairav S., Elovici Y., “OVER: overhauling vulnerability detection fot iot through an adaptable and automated static analysis framework”, SAC ’20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, Brno, Czech Republic, March 30 – April 3, 2020, 729-738.
  1. CohenMirsky Y., Kamp M., Martin T., Elovici Y.Puzis R., Shabtai A., “DANTE: A Framework
  1. for Mining and Monitoring Darknet Traffic”, ESORICS 2020 – 25th European Symposium on Research in Computer Security, Guildford, UK, September 14-18, 2020, Proceedings, Part I, 88-109.
  1. SiboniGlezer C., Puzis R., Shabtai A., Elovici Y., “Security Ranking of IoT Devices Using an AHP Model”, Cyber Security Cryptography and Machine Learning – Fourth International Symposium, CSCML 2020, Be’er Sheva, Israel, July 2-3, 2020, Proceedings, 29-44.
  1. KotakElovici Y., “IoT Device Identification Using Deep Learning”, 13th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2020, Burgos, Spain, September 2020, 76-86.
  1. SidiMirsky Y., Nadler A., Elovici Y., Shabtai A., “Helix: DGA Domain Embeddings for Tracking and Exploring Botnets”, CIKM ’20: The 29th ACM International Conference on Information and Knowledge Management, Virtual Event, Ireland, October 19-23, 2020, 2741-2748.
  1. NassiMirsky Y., Nassi D., Ben-Netanel R., Drokin O., Elovici Y., “Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks”, CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, 293-308.
  1. MahlerShalom E., Elovici Y., Shahar Y., “A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions”, Artificial Intelligence in Medicine – 18th International Conference on Artificial Intelligence in Medicine, AIME 2020, Minneapolis, MN, USA, August 25-28, 2020, Proceedings, 273-286.
  1. Nassi B., Ben-NetanelShamir A.,  Elovici Y., “Game of Drones – Detecting Spying Drones Using Time Domain Analysis“. CSCML 2021: 128-144.
  1. StanBitton R., Ezrets M., Dadon M., Inokuchi M., Ohta Y., Yagyu T, Elovici Y., Shabtai A., “Heuristic Approach for Countermeasure Selection Using Attack Graphs“. CSF 2021: 1-16.
  1. Zolfi A., Kravchik M., Elovici Y., Shabtai A., “The Translucent Patch: A Physical and Universal Attack on Object Detectors “. CVPR 2021: 15232-15241.
  1. Binyamini H., Bitton R., Inokuchi M., Yagyu T., Elovici Y., Shabtai.A., “A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions “. KDD 2021: 2574-2583.
  1. Garoza B., Popa Murvay P.,  Elovici Y.,  Shabtai A:
    ”CANARY – a reactive defense mechanism for Controller Area Networks based on Active RelaYs”. USENIX Security Symposium 2021: 4259-4276.
  1. Nassi, Bitton R., Masuoka R., Shabtai A.,  Elovici Y:
    ”SoK: Security and Privacy in the Age of Commercial Drones”. IEEE Symposium on Security and Privacy 2021: 1434-1451.
  1. Gatlin J,  Belikovetsky S,  Elovici Y Skjellum A,  Lubell J,  Witherell P,  Yampolskiy M:
    ”Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel”. RAID 2021: 135-147.
  1. Nehemya Mathov Y.,  Shabtai A.,  Elovici Y:
    ”Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders”. ECML/PKDD (4) 2021: 221-236.
  1. Rosenberg Shabtai A.,  Elovici Y.,  Rokach L:
    ”Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants”. IJCNN 2021: 1-10.
  1. Or-Meir Cohen A.,  Elovici Y.,  Rokach L,  Nissim N:
    ”Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis”. IJCNN 2021: 1-8.
  1. AmitLevy M., Rosenberg I., Shabtai A.,  Elovici Y:
    ”FOOD: Fast Out-Of-Distribution Detector”. IJCNN 2021: 1-8.
  1. Nassi Pirutin Y.,  Swissa R.,  Shamir A.,  Elovici Y., Boris Z: ”POSTER: Recovering Songs from a Hanging Light Bulb”. CCS 2021: 2381-2383.
  1. Nassi Pirutin Y.,  Cohen Galor T.,  Elovici Y.,  Zadov B:
    ”Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED”. CCS 2021: 1900-1914.
  1. CaoBerend D., Tolmach P., Amit G., Levy M.,  Liu Y.,  Shabtai A., Elovici Y. ”Fair and accurate age prediction using distribution aware data curation and augmentation”. WACV 2022: 2867-2877
Close Menu