Aviad cohen
Aviad cohen
Ph.D student and a researcher, Software and Information Systems Engineering in Ben-Gurion University
Verified email at post.bgu.ac.il - Homepage
TitleCited byYear
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey
N Nissim, A Cohen, C Glezer, Y Elovici
Computers & Security 48, 246-266, 2015
ALDOCX: detection of unknown malicious microsoft office documents using designated active learning methods based on new structural feature extraction methodology
N Nissim, A Cohen, Y Elovici
IEEE Transactions on Information Forensics and Security 12 (3), 631-646, 2016
Alpd: Active learning framework for enhancing the detection of malicious pdf files
N Nissim, A Cohen, R Moskovitch, A Shabtai, M Edry, O Bar-Ad, Y Elovici
2014 IEEE Joint Intelligence and Security Informatics Conference, 91-98, 2014
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods
A Cohen, N Nissim, L Rokach, Y Elovici
Expert Systems With Applications 63, 324-343, 2016
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory
A Cohen, N Nissim
Expert Systems with Applications 102, 158-178, 2018
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework
N Nissim, A Cohen, R Moskovitch, A Shabtai, M Edri, O BarAd, Y Elovici
Security Informatics 5 (1), 1, 2016
Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining
N Nissim, Y Lapidot, A Cohen, Y Elovici
Knowledge-Based Systems 153, 147-175, 2018
Novel Set of General Descriptive Features For Enhanced Detection of Malicious Emails Using Machine Learning Methods
A Cohen, N Nissim, Y Elovici
Expert Systems with Applications, 2018
Boosting the detection of malicious documents using designated active learning methods
N Nissim, A Cohen, Y Elovici
2015 IEEE 14th International Conference on Machine Learning and Applications …, 2015
Search problems in the domain of multiplication: Case study on anomaly detection using markov chains
Y Mirsky, A Cohen, R Stern, A Felner, L Rokack, Y Elovici, B Shapira
Eighth Annual Symposium on Combinatorial Search, 2015
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud
N Nissim, O Lahav, A Cohen, Y Elovici, L Rokach
Computers & Security 87, 101590, 2019
Scholarly Digital Libraries as a Platform for Malware Distribution.
N Nissim, A Cohen, J Wu, A Lanzi, L Rokach, Y Elovici, CL Giles
SG-CRC, 107-128, 2017
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework
N Nissim, A Cohen, J Wu, A Lanzi, L Rokach, Y Elovici, L Giles
IEEE Access 7, 110050-110073, 2019
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
D Nahmias, A Cohen, N Nissim, Y Elovici
2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019
The system can't perform the operation now. Try again later.
Articles 1–14