Yuval Elovici
Yuval Elovici
Director of Telekom Innovation Laboratories at Ben Gurion University
Dirección de correo verificada de bgu.ac.il - Página principal
Título
Citado por
Citado por
Año
“Andromaly”: a behavioral malware detection framework for android devices
A Shabtai, U Kanonov, Y Elovici, C Glezer, Y Weiss
Journal of Intelligent Information Systems 38 (1), 161-190, 2012
7102012
Endoscopic device comprising linear staplers and a video camera on its distal end
E Sonnenschein, A Govrin, Y Avidor, Y Elovici, M Sonnenschein
US Patent 7,841,503, 2010
6432010
Google android: A comprehensive security assessment
A Shabtai, Y Fledel, U Kanonov, Y Elovici, S Dolev, C Glezer
IEEE Security & Privacy 8 (2), 35-44, 2010
5162010
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
A Shabtai, R Moskovitch, Y Elovici, C Glezer
information security technical report 14 (1), 16-29, 2009
2492009
Securing android-powered mobile devices using selinux
A Shabtai, Y Fledel, Y Elovici
IEEE Security & Privacy 8 (3), 36-44, 2009
2212009
Online social networks: threats and solutions
M Fire, R Goldschmidt, Y Elovici
IEEE Communications Surveys & Tutorials 16 (4), 2019-2036, 2014
2122014
Detecting unknown malicious code by applying classification techniques on opcode patterns
A Shabtai, R Moskovitch, C Feher, S Dolev, Y Elovici
Security Informatics 1 (1), 1, 2012
1932012
Automated static code analysis for classifying android applications using machine learning
A Shabtai, Y Fledel, Y Elovici
2010 International Conference on Computational Intelligence and Security …, 2010
1902010
Link prediction in social networks using computationally efficient topological features
M Fire, L Tenenboim, O Lesser, R Puzis, L Rokach, Y Elovici
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1832011
Unknown malcode detection using opcode representation
R Moskovitch, C Feher, N Tzachar, E Berger, M Gitelman, S Dolev, ...
European conference on intelligence and security informatics, 204-215, 2008
1722008
A survey of data leakage detection and prevention solutions
A Shabtai, Y Elovici, L Rokach
Springer Science & Business Media, 2012
1652012
Routing betweenness centrality
S Dolev, Y Elovici, R Puzis
Journal of the ACM (JACM) 57 (4), 1-27, 2010
1402010
Improving malware detection by applying multi-inducer ensemble
E Menahem, A Shabtai, L Rokach, Y Elovici
Computational Statistics & Data Analysis 53 (4), 1483-1494, 2009
1382009
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
A Shabtai, U Kanonov, Y Elovici
Journal of Systems and Software 83 (8), 1524-1537, 2010
1352010
Google android: A state-of-the-art review of security mechanisms
A Shabtai, Y Fledel, U Kanonov, Y Elovici, S Dolev
arXiv preprint arXiv:0912.5101, 2009
1342009
N-baiot—network-based detection of iot botnet attacks using deep autoencoders
Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ...
IEEE Pervasive Computing 17 (3), 12-22, 2018
1332018
Mobile malware detection through analysis of deviations in application network behavior
A Shabtai, L Tenenboim-Chekina, D Mimran, L Rokach, B Shapira, ...
Computers & Security 43, 1-18, 2014
1312014
System that provides early detection, alert, and response to electronic threats
Y Elovici, G Tachan, A Shabtai
US Patent 8,171,554, 2012
1222012
Efficient multidimensional suppression for k-anonymity
S Kisilevich, L Rokach, Y Elovici, B Shapira
IEEE Transactions on Knowledge and Data Engineering 22 (3), 334-347, 2009
1222009
Detection of unknown computer worms based on behavioral classification of the host
R Moskovitch, Y Elovici, L Rokach
Computational Statistics & Data Analysis 52 (9), 4544-4566, 2008
1162008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20