2021
Itay Hazan, Oded Margalit, Lior Rokach. Supporting unknown number of users in keystroke dynamics models. Knowledge-Based Systems 221 (2021): 106982.
2020
Matan Levi and Itay Hazan. Deep Learning Based Sequential Mining for User Authentication in Web Applications. International Workshop on Emerging Technologies for Authorization and Authentication. Springer, Cham, 2020.
Itay Hazan, Oded Margalit, Lior Rokach. Keystroke dynamics obfuscation using key grouping. Expert Systems with Applications 143 (2020): 113091.
Anton Puzanov, Senyang Zhang, and Kobi Cohen: Deep reinforcement one-shot learning for artificially intelligent classification in expert aided systems. Engineering Applications of Artificial Intelligence 91 (2020): 103589
Roni Mateless, Daniel Rejabek, Oded Margalit, and Robert Moskovitch: Decompiled APK based malicious code classification. Future Generation Computer Systems (2020): 0167-739X.
2019
Eden Abadi and Itay Hazan. Improved Feature Engineering for Free-Text Keystroke Dynamics. International Workshop on Security and Trust Management. Springer, Cham, 2020.
Itay Hazan, Oded Margalit, and Lior Rokach. Securing keystroke dynamics from replay attacks. Applied Soft Computing (2019): 105798.
Matan Levi and Itay Hazan: User profiling using sequential mining over web elements. 10th IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)
Eyal Gutflaish, Aryeh Kontorovich, Sivan Sabato, Ofer Biller, and Oded Sofer: Temporal Anomaly Detection: Calibrating the Surprise. AAAI 2019: 3755-3762
2018
Anton Puzanov, and Kobi Cohen: Deep reinforcement one-shot learning for change point detection. 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2018.
Matan Levi, Yair Allouche, and Aryeh Kontorovich: Advanced Analytics for Connected Car Cybersecurity. VTC Spring 2018: 1-7
Hagit Grushka-Cohen, Ofer Biller, Oded Sofer, Lior Rokach, and Bracha Shapira: Simulating user activity for assessing effect of sampling on DB activity monitoring anomaly detection. Policy-Based Autonomic Data Governance 2018
Oded Margalit: Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric Rules. CSCML 2018: 278-282
2017
Guy Danon and Mark Last: A Syntactic Approach to Domain-Specific Automatic Question Generation. eprint arXiv:1712.09827 (12/2017)
Tomer Cohen, Danny Hendler, and Dennis Potashnik: Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract). CSCML 2017: 34-49
Gal Frishman, Yaniv Ben-Itzhak, and Oded Margalit: Cluster-Based Load Balancing for Better Network Security. Big-DAMA@SIGCOMM 2017: 7-12
Bar Haim, Eitan Menahem, Yaron Wolfsthal, and Christopher Meenan: Visualizing Insider Threats: An Effective Interface for Security Analytics. IUI Companion 2017: 39-42
2016
Eitan Menahem, Alon Schclar, Lior Rokach, and Yuval Elovici: XML-AD: Detecting anomalous patterns in XML documents. Inf. Sci. 326: 71-88 (2016)
Aviv Ron, Alexandra Shulman-Peleg, and Anton Puzanov: Analysis and Mitigation of NoSQL Injections. IEEE Security & Privacy 14(2): 30-39 (2016)
Oded Margalit: Using Computer Programming Competition for Cyber Education. SwSTE 2016: 104-107
2015
Yaron Amsalem, Anton Puzanov, Anton Bedinerman, Maxim Kutcher, and Ofer Hadar: DCT-based cyber defense techniques. In Applications of Digital Image Processing XXXVIII (Vol. 9599, p. 95991F). International Society for Optics and Photonics 2015.
Aviv Ron, Alexandra Shulman-Peleg, and Emanuel Bronshtein: No SQL, No Injection? Examining NoSQL Security. CoRR abs/1506.04082 (2015)
2014
Gadi Aleksandrowicz, Alexander Ivrii, Oded Margalit, and Dan Rasin: Generating Modulo-2 Linear Invariants for Hardware Model Checking. Haifa Verification Conference 2014: 54-67
Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, and Yuval Elovici: OSPF vulnerability to persistent poisoning attacks: a systematic analysis. ACSAC 2014: 336-345
2013
Eitan Menahem, Yuval Elovici, Nir Amar, and Gabi Nakibly: ACTIDS: an active strategy for detecting and localizing network attacks. AISec 2013: 55-66
Eitan Menahem, Asaf Shabtai, and Adi Levhar: Detecting malware through temporal function-based features. ACM Conference on Computer and Communications Security 2013: 1379-1382
Eitan Menahem, Lior Rokach, and Yuval Elovici: Combining one-class classifiers via meta learning. CIKM 2013: 2435-2440
Oded Margalit: On the riddle of coding equality function in the garden hose model. ITA 2014: 1-5 2013
Eitan Menahem, Gabi Nakibly, and Yuval Elovici: ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks. CoRR abs/1306.4845 (2013)
Danny Harnik, Ronen I. Kat, Oded Margalit, Dmitry Sotnikov, and Avishay Traeger: To Zip or not to Zip: effective resource usage for real-time compression. FAST 2013: 229-242
2012
Oded Margalit: Better Bounds for Event Sequencing Testing. ICST Workshops 2013: 281-284 2012
Danny Harnik, Oded Margalit, Dalit Naor, Dmitry Sotnikov, and Gil Vernik: Estimation of deduplication ratios in large data sets. MSST 2012: 1-11
Yael Ben-Haim, Alexander Ivrii, Oded Margalit, and Arie Matsliah: Perfect Hashing and CNF Encodings of Cardinality Constraints. SAT 2012: 397-409
Eitan Menahem, Gabi Nakibly, and Yuval Elovici: Network-based intrusion detection systems go active! ACM Conference on Computer and Communications Security 2012: 1004-1006
Eitan Menahem, Rami Pusiz, and Yuval Elovici: Detecting Spammers via Aggregated Historical Data Set. NSS 2012: 248-262
Eitan Menahem and Rami Puzis: Detecting Spammers via Aggregated Historical Data Set. CoRR abs/1205.1357 (2012)
Eitan Menahem, Alon Schclar, Lior Rokach, and Yuval Elovici: Securing Your Transactions: Detecting Anomalous Patterns In XML Documents. CoRR abs/1209.1797 (2012)
2011
Asaf Shabtai, Eitan Menahem, and Yuval Elovici: F-Sign: Automatic, Function-Based Signature Generation for Malware. IEEE Trans. Systems, Man, and Cybernetics, Part C 41(4): 494-508 (2011)
Aryeh Kontorovich, Danny Hendler, and Eitan Menahem: Metric Anomaly Detection via Asymmetric Risk Minimization. SIMBAD 2011: 17-30
Eitan Menahem, Lior Rokach, and Yuval Elovici: Combining One-Class Classifiers via Meta-Learning. CoRR abs/1112.5246 (2011)
Ehud Aharoni, Shai Fine, Yaara Goldschmidt, Ofer Lavi, Oded Margalit, Michal Rosen-Zvi, and Lavi Shpigelman: Smarter log analysis. IBM Journal of Research and Development 55(5): 10 (2011)
Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, and Yuval Elovici: Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content. Security and Communication Networks 4(8): 947-965 (2011)
2010
Yuval Fledel, Asaf Shabtai, Dennis Potashnik, and Yuval Elovici: Google Android: An Updated Security Review. MobiCASE 2010: 401-414