UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

2 3 4 5 6
hits: 405
31.
  • User Authentication Based o... User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study
    Chong, Penny; Elovici, Yuval; Binder, Alexander IEEE transactions on information forensics and security, 2020, Volume: 15
    Journal Article
    Peer reviewed

    Recently conducted research demonstrated the potential use of mouse dynamics as a behavioral biometric for user authentication systems. However, the state-of-the-art methods in this field rely on ...
Full text
32.
  • Lightweight collaborative a... Lightweight collaborative anomaly detection for the IoT using blockchain
    Mirsky, Yisroel; Golomb, Tomer; Elovici, Yuval Journal of parallel and distributed computing, November 2020, 2020-11-00, Volume: 145
    Journal Article
    Peer reviewed
    Open access

    Due to their rapid growth and deployment, the Internet of things (IoT) have become a central aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which can be ...
Full text

PDF
33.
  • Insight Into Insiders and IT Insight Into Insiders and IT
    Homoliak, Ivan; Toffalini, Flavio; Guarnizo, Juan ... ACM computing surveys, 05/2019, Volume: 52, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Insider threats are one of today’s most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural taxonomy and novel ...
Full text

PDF
34.
  • Novel set of general descri... Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods
    Cohen, Aviad; Nissim, Nir; Elovici, Yuval Expert systems with applications, 11/2018, Volume: 110
    Journal Article
    Peer reviewed

    •We propose a novel set of general descriptive features for malicious email detection.•We leverage our features with ML for the detection of malicious email.•Our novel set of features enhances the ...
Full text
35.
  • Introduction to the Special... Introduction to the Special Issue on Data Mining for Cybersecurity
    Japkowicz, Nathalie; Elovici, Yuval IEEE intelligent systems, 03/2018, Volume: 33, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Data mining techniques that explore data in order to discover hidden patterns and develop predictive models have proven to be effective in tackling information security challenges.
Full text
36.
Full text

PDF
37.
  • Enhancing real-world advers... Enhancing real-world adversarial patches through 3D modeling of complex target scenes
    Mathov, Yael; Rokach, Lior; Elovici, Yuval Neurocomputing (Amsterdam), 08/2022, Volume: 499
    Journal Article
    Peer reviewed
    Open access

    Display omitted •Real-world adversarial patch using 3D modeling techniques.•Using a 3D digital replica of the target scene to improve the patch’s performance.•An evaluation process that enables ...
Full text
38.
  • Fansmitter: Acoustic data e... Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise
    Guri, Mordechai; Solewicz, Yosef; Elovici, Yuval Computers & security, April 2020, 2020-04-00, 20200401, Volume: 91
    Journal Article
    Peer reviewed

    Computers that contain sensitive information are often maintained in air-gapped isolation. In this defensive measure, a computer is disconnected from the Internet - logically and physically - ...
Full text
39.
  • Security Testbed for Intern... Security Testbed for Internet-of-Things Devices
    Siboni, Shachar; Sachidananda, Vinay; Meidan, Yair ... IEEE transactions on reliability, 2019-March, 2019-3-00, Volume: 68, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The Internet of Things (IoT) is a global ecosystem of information and communication technologies aimed at connecting any type of object (thing), at any time, and in any place, to each other and to ...
Full text

PDF
40.
Full text
2 3 4 5 6
hits: 405

Load filters