Search filters

List of works by Yuval Elovici

3D Marketplace: Distributed Attestation of 3D Designs on Blockchain

manuscript published in 2019

A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists’ Perspective

scientific article published in 2022

A model of the information security investment decision-making process

scientific article published in 2016

A novel approach for detecting vulnerable IoT devices connected behind a home NAT

scientific article published in 2020

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies

An Active Learning Framework for Efficient Condition Severity Classification

An optical covert-channel to leak data through an air-gap

Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph

scientific article published in 2023

BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations

Collaborative attack on Internet users' anonymity

Combined network analysis and machine learning allows the prediction of metabolic pathways from tomato metabolomics data

scientific article published on 18 June 2019

Data mining opportunities in geosocial networks for improving road safety

Database encryption

Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic

scientific article published on 20 March 2019

Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments

scientific article published on 27 January 2020

Detecting unknown malicious code by applying classification techniques on OpCode patterns

article

Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS)

Detection of malicious PDF files and directions for enhancements: A state-of-the art survey

scientific article published in 2015

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey

article

Detection of unknown computer worms based on behavioral classification of the host

article

Digital Audio Signature for 3D Printing Integrity

scientific article published in 2019

DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback

scientific article published in 2018

Ethical considerations when employing fake identities in online social networks for research

scientific article

Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems

scientific article published on 31 August 2022

Exfiltration of Information from Air-Gapped Machines Using Monitor's LED Indicator

F-Sign: Automatic, Function-Based Signature Generation for Malware

Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise

scientific article published in 2020

Fast algorithm for successive computation of group betweenness centrality.

scientific article published on 29 November 2007

Friend or foe? Fake profile identification in online social networks

article by Michael Fire et al published 23 May 2014 in Social Network Analysis and Mining

Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks

scientific article published on 10 March 2020

Guest editorial: Special issue on data mining for information security

scientific article published in 2013

Guided socialbots: Infiltrating the social networks of specific organizations’ employees

Homing socialbots

Implementing a database encryption solution, design and implementation issues

scientific article published in 2014

Improving condition severity classification with an efficient active learning based framework

scientific article

Improving malware detection by applying multi-inducer ensemble

Increased cyber-biosecurity for DNA synthesis

scientific article published on 27 November 2020

Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods

scientific article published on 26 April 2017

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method

Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework

Large-Scale Shill Bidder Detection in E-commerce

scientific article published on 26 May 2023

Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis

scientific article published in 2019

Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques

scientific article published on 28 August 2019

Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content

article

N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

scientific article published on 11 October 2018

ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields

scientific article published in 2020

On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers

Online Social Networks: Threats and Solutions

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations

scientific article published on 21 November 2023

Organizational Intrusion: Organization Mining Using Socialbots

PRAW?A PRivAcy model for the Web

article

PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines

scientific article published in 2020

Routing betweenness centrality

SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods

scholarly article by Aviad Cohen et al published November 2016 in Expert Systems with Applications

Secure Crowdsource-Based Open-Source Code Verification (SC)^2V

scientific article published on 21 May 2024

Securing Android-Powered Mobile Devices Using SELinux

Security of Open Radio Access Networks

scientific article published in 2022

Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal

scientific article published on 29 October 2020

Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)

Stop bugging me! Evading modern-day wiretapping using adversarial perturbations

scientific article published in 2022

The Security of IP-Based Video Surveillance Systems

scientific article published on 26 August 2020

The Social Amplifier—Reaction of Human Communities to Emergencies

The role of network setting and gender in online content popularity

USB-based attacks

scientific article published in 2017

USBee: Air-gap covert-channel via electromagnetic emission from USB

Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud

scientific article published in 2019

Xerox Day Vulnerability

scientific article published in 2019

“Andromaly”: a behavioral malware detection framework for android devices