Yisroel Mirsky
Yisroel Mirsky
Georgia Institute of Technology (Georgia Tech) and Ben-Gurion University
Verified email at gatech.edu
TitleCited byYear
N-BaIoT—Network-based detection of IoT botnet attacks using deep autoencoders
Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ...
IEEE Pervasive Computing 17 (3), 12-22, 2018
962018
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using Thermal Manipulations
Y Guri, Mordechai and Monitz, Matan and Mirski, Yisroel and Elovici
CSF, 2015
89*2015
GSMem: Data Exfiltration from Air-Gapped Computers over {GSM} Frequencies
M Guri, A Kachlon, O Hasson, G Kedma, Y Mirsky, Y Elovici
USENIX Security Symposium 2015, 849-864, 2015
842015
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
Y Mirsky, T Doitshman, Y Elovici, A Shabtai
The Network and Distributed System Security Symposium (NDSS) 2018, 2018
802018
Sherlock vs moriarty: A smartphone dataset for cybersecurity research
Y Mirsky, A Shabtai, L Rokach, B Shapira, Y Elovici
Proceedings of the 2016 ACM workshop on Artificial intelligence and security …, 2016
282016
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Y Mirsky, T Mahler, I Shelef, Y Elovici
USENIX Security Symposium 2019, 2019
212019
Anomaly detection for smartphone data streams
Y Mirsky, A Shabtai, B Shapira, Y Elovici, L Rokach
Pervasive and Mobile Computing 35, 83-107, 2017
172017
Ciota: Collaborative iot anomaly detection via blockchain
T Golomb, Y Mirsky, Y Elovici
NDSS DISS Workshop 2018, 2018
162018
9-1-1 DDoS: attacks, analysis and mitigation
M Guri, Y Mirsky, Y Elovici
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 218-232, 2017
14*2017
pcstream: A stream clustering algorithm for dynamically detecting and managing temporal contexts
Y Mirsky, B Shapira, L Rokach, Y Elovici
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 119-133, 2015
132015
Power efficient femtocell distribution strategies
Y Haddad, Y Mirsky
SoftCOM 2011, 19th International Conference on Software, Telecommunications …, 2011
102011
HVACKer: Bridging the Air-Gap by
Y Mirsky, M Guri, Y Elovici
IN DEPTH SECURITY VOL. II, 109, 2017
9*2017
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs
Y Mirsky, N Kalbo, Y Elovici, A Shabtai
IEEE Transactions on Information Forensics and Security, 1-16, 2018
52018
Enhanced situation space mining for data streams
Y Mirsky, T Halpern, R Upadhyay, S Toledo, Y Elovici
Proceedings of the Symposium on Applied Computing, 842-849, 2017
42017
Search problems in the domain of multiplication: Case study on anomaly detection using markov chains
Y Mirsky, A Cohen, R Stern, A Felner, L Rokack, Y Elovici, B Shapira
Eighth Annual Symposium on Combinatorial Search, 2015
32015
Predicting Wireless Coverage Maps Using Radial Basis Networks
Y Mirsky, Y Haddad, O Rozenblit, R Azoulay
Consumer Communications & Networking Conference (CCNC), 2018 14th IEEE Annual, 2018
22018
Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices
LB Kimon, Y Mirsky, L Rokach, B Shapira
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 816-828, 2018
12018
User verification on mobile devices using sequences of touch gestures
L Ben Kimon, Y Mirsky, L Rokach, B Shapira
Proceedings of the 25th Conference on User Modeling, Adaptation and …, 2017
12017
DICOM Images Have Been Hacked! Now What?
B Desjardins, Y Mirsky, MP Ortiz, Z Glozman, L Tarbox, R Horn, SC Horii
American Journal of Roentgenology, 1-9, 2019
2019
The Security of IP-based Video Surveillance Systems
N Kalbo, Y Mirsky, A Shabtai, Y Elovici
arXiv preprint arXiv:1910.10749, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20