{"id":28,"date":"2018-03-14T13:45:36","date_gmt":"2018-03-14T13:45:36","guid":{"rendered":"http:\/\/132.72.80.218\/wp\/?page_id=28"},"modified":"2025-02-17T09:15:37","modified_gmt":"2025-02-17T07:15:37","slug":"home","status":"publish","type":"page","link":"https:\/\/cyber.bgu.ac.il\/yuval\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28\" class=\"elementor elementor-28\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be3dba2 e-con-full e-flex e-con e-parent\" data-id=\"be3dba2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-693a8178 elementor-cta--layout-image-right elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"693a8178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t\t\t\t<a class=\"elementor-cta\" href=\"#\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/cyber.bgu.ac.il\/yuval\/wp-content\/uploads\/2018\/03\/Yuval-Elovici.jpg);\" role=\"img\" aria-label=\"Yuval-Elovici\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tWelcome to my home page!\t\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tI am a Professor at the Software and Information Systems Engineering and Director of Deutsche Telekom Laboratories at Ben-Gurion University of the Negev\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b1a012a e-flex e-con-boxed e-con e-parent\" data-id=\"b1a012a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3fade9ca e-con-full e-flex e-con e-child\" data-id=\"3fade9ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ab2c0c elementor-widget elementor-widget-heading\" data-id=\"8ab2c0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Research Interests<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c260c4 elementor-widget elementor-widget-text-editor\" data-id=\"8c260c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"elementor-icon-list-text\">Computer and Network Security<\/span><\/p><p><span class=\"elementor-icon-list-text\">Privacy and Anonymity in the Electronic Society<\/span><\/p><p><span class=\"elementor-icon-list-text\">Social Network Security<\/span><\/p><p><span class=\"elementor-icon-list-text\">Complex Networks<\/span><\/p><p><span class=\"elementor-icon-list-text\">Detection of Malicious Code Using Machine Learning Techniques<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-673dbea elementor-align-center elementor-mobile-align-center elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-button\" data-id=\"673dbea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/scholar.google.com\/citations?user=ruZDm9QAAAAJ&#038;hl=en\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scholar: Yuval Elovici<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3e1d66 elementor-align-center elementor-mobile-align-center elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-button\" data-id=\"e3e1d66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/dblp.org\/pid\/38\/4086.html\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DBLP: Yuval Elovici     <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c69cd48 e-flex e-con-boxed e-con e-parent\" data-id=\"c69cd48\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c91d872 e-con-full e-flex e-con e-child\" data-id=\"c91d872\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0524941 elementor-widget elementor-widget-heading\" data-id=\"0524941\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Academic Administration<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb6fa00 elementor-widget elementor-widget-text-editor\" data-id=\"cb6fa00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>4\/2014-Current<br \/>Director of The Cyber-Security Research Center at\u00a0Ben-Gurion University.<\/p><p>12\/2005-Current<br \/>Director of Deutsche-Telekom Laboratories at Ben-Gurion University.<br \/>\u00a0<br \/>9\/2008-Current<br \/>Member of the Curriculum committee, Ben-Gurion University, Department of Information Systems Engineering.<br \/>\u00a0<br \/>12\/2003-7\/2006<br \/>Head of the Software Engineering Program, Ben-Gurion University, Faculty of Engineering Sciences.<br \/>\u00a0<br \/>6\/2003-10\/2005<br \/>Member of the Graduate Studies Committee, Ben-Gurion University, Department of Information Systems Engineering.<br \/>\u00a0<br \/>8\/2001-Current<br \/>Member of the University Committee for Information Security, Ben-Gurion University.\u00a0<br \/>\u00a0<br \/>10\/2000-10\/2005<br \/>Head of the Computing and Infrastructure Committee, Ben-Gurion University, Department of Information Systems Engineering.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a929c33 e-flex e-con-boxed e-con e-parent\" data-id=\"a929c33\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b5a681d e-con-full e-flex e-con e-child\" data-id=\"b5a681d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-31ad7a5 elementor-widget elementor-widget-heading\" data-id=\"31ad7a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Educational Activities\ufeff - Courses taught<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa29c8f elementor-widget elementor-widget-text-editor\" data-id=\"fa29c8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<table class=\" alignleft\" style=\"height: 689px;\" border=\"0\" width=\"308\" cellpadding=\"5\" align=\"center\"><tbody><tr><td>File Organization and Processing<\/td><td>3rd year<\/td><td>Ben-Gurion University<\/td><\/tr><tr><td>Data Security<\/td><td>3rd year<\/td><td>Ben-Gurion University<\/td><\/tr><tr><td>Distributed DB and Client Server Systems<\/td><td>4th year<\/td><td>Ben-Gurion University<\/td><\/tr><tr><td>Computer and Network Security<\/td><td>3rd year<\/td><td>Ben-Gurion University<\/td><\/tr><tr><td>Seminar Project<\/td><td>4th year<\/td><td>Ben-Gurion University<\/td><\/tr><tr><td>Applied Cryptography<\/td><td>Graduate<\/td><td>Ben-Gurion University<\/td><\/tr><tr><td>Information in Decision Making<\/td><td>Graduate<\/td><td>Ben-Gurion University<\/td><\/tr><tr><td>Privacy in the Electronic Society<\/td><td>Graduate<\/td><td>Ben-Gurion University<\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4ffbeb e-flex e-con-boxed e-con e-parent\" data-id=\"d4ffbeb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2acbe22 e-con-full e-flex e-con e-child\" data-id=\"2acbe22\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-860ebef elementor-widget elementor-widget-heading\" data-id=\"860ebef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Professional Activities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a90924 elementor-widget elementor-widget-text-editor\" data-id=\"8a90924\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ff6600;\"><strong>Positions in Academic Administration<\/strong><\/span><\/p><p><b><strong>04\/2014-Now<\/strong><\/b><\/p><p>Title: Director of BGU Cyber Security Research Center.<\/p><p>Institution: Ben-Gurion University.<\/p><p><b><strong>12\/2005-Now<\/strong><\/b><\/p><p>Director of Telekom Innovation Laboratories at Ben-Gurion University; Ben-Gurion University<\/p><p>The institute&#8217;s focus is applied research and its activities include, among others: specifying, developing, and evaluating emerging Information and Communication Technologies (ICT). Members of the institute are engaged in applied research based on strategic plans outlined by Deutsche Telekom AG (DTAG). The institute&#8217;s research areas currently include: Big Data Analytics, Cyber Security, Android Security. The research is conducted by BGU faculty members (about 10), together with graduate students and scientific programmers (approximately 80). The institute submits one patent per month as well as about 60 scientific publications that are accepted to leading conferences and journals per year.<\/p><p><b><strong>10\/2012-Now<\/strong><\/b><\/p><p>Member of the Doctoral Committee, Ben-Gurion University, Department of Information Systems Engineering.<\/p><p><b><strong>9\/2008-Now<\/strong><\/b><\/p><p>Member of the Curriculum Committee, Ben-Gurion University, Department of Information Systems Engineering.<\/p><p><b><strong>12\/2003-7\/2006<\/strong><\/b><\/p><p>Head of the Software Engineering Program, Ben-Gurion University, Faculty of Engineering Sciences.<\/p><p>The Software Engineering Program is a part of the Department of Information Systems Engineering and the Department of Computer Sciences. This unique Israeli program includes over 240 students, who study for four years toward a B.Sc. in Software Engineering.<\/p><p><b><strong>6\/2003-10\/2005<\/strong><\/b><\/p><p>Member of the Graduate Studies Committee, Ben-Gurion University, Department of Information Systems Engineering.<\/p><p><b><strong>8\/2001-Now\u00a0\u00a0\u00a0<\/strong><\/b><\/p><p>Member of the University Committee for Information Security, Ben-Gurion University.<\/p><p>This committee is responsible for defining the university\u2019s strategy with regard to computer and network security, as well as ongoing supervision of the compliance of university authorities with the latest privacy laws.<\/p><p><b><strong>10\/2000-10\/2005<\/strong><\/b><\/p><p>Head of the Computing and Infrastructure Committee, Ben-Gurion University, Department of Information Systems Engineering.<\/p><p>When the Department of Information Systems Engineering was established, I was responsible for designing four new computer labs and supervised the purchase of the equipment for the labs. I consulted and assisted the technical team in maintaining the department\u2019s computer and communications infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-855cfee elementor-widget elementor-widget-text-editor\" data-id=\"855cfee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ff6600;\"><b><strong>Professional Functions outside Universities\/Institutions<\/strong><\/b><\/span><\/p><p><strong>09\/2014-Now<\/strong><\/p><p>Title: iTrust Research Director<\/p><p>Institution: Singapore University of Technology and Design (SUTD).<\/p><p><strong>01\/2013-Now<\/strong><\/p><p>Title: Member of a national committee that advises the Israeli government in the area of cyber security R&amp;D.<\/p><p>Institution: State of Israel.<\/p><p><strong>1\/201<\/strong><strong>2-12\/2014<\/strong><\/p><p>Title: Head of the Scientific and Technological Committee of the Cabarnit Consortium.<\/p><p>Institution: Cabarnit Consortium.<\/p><p>Cabarnit is a consortium of seven computer and network security hi-tech companies and 10 academic groups from various universities in Israel. The consortium&#8217;s annual budget is around $7M and is financed by the Israeli Ministry of Trade and Commerce. I was nominated by the consortium to head a scientific and technological committee that is responsible for monitoring scientific and technological developments and identifying new potential members from the industry and academia.<\/p><p><strong>09\/2008-9\/2010<\/strong><\/p><p>Title: Member of a national committee that advises the Israeli government in the area of protection of critical infrastructures.<\/p><p>Institution: State of Israel, Prime Minister\u2019s Office.<strong>\u00a0<\/strong><\/p><p><strong>11\/2004-10\/2006<\/strong><\/p><p>Title: Member of a committee that advises the Israeli Parliament on new laws for protecting personal information stored in digital repositories.<\/p><p>Institution: State of Israel, Ministry of Justice.<\/p><p>The Deputy Chief Prosecutor established a committee mandated to recommend modifications to Israeli privacy laws so these can better meet the new challenges of the Information Age. My role in the committee was to present new IT capabilities and their potential impact on matters of privacy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Welcome to my home page! I am a Professor at the Software and Information Systems Engineering and Director of Deutsche Telekom Laboratories at Ben-Gurion University of the Negev Research Interests Computer and Network Security Privacy and Anonymity in the Electronic Society Social Network Security Complex Networks Detection of Malicious Code Using Machine Learning Techniques Scholar: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":138,"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":636,"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/pages\/28\/revisions\/636"}],"wp:attachment":[{"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}