UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 405
1.
  • Adversarial Machine Learnin... Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
    Rosenberg, Ishai; Shabtai, Asaf; Elovici, Yuval ... ACM computing surveys, 06/2021, Volume: 54, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    In recent years, machine learning algorithms, and more specifically deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are ...
Full text

PDF
2.
  • Dynamic Malware Analysis in... Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
    Or-Meir, Ori; Nissim, Nir; Elovici, Yuval ... ACM computing surveys, 09/2020, Volume: 52, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Although malicious software (malware) has been around since the early days of computers, the sophistication and innovation of malware has increased over the years. In particular, the latest crop of ...
Full text

PDF
3.
  • N-BaIoT-Network-Based Detec... N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
    Meidan, Yair; Bohadana, Michael; Mathov, Yael ... IEEE pervasive computing, 07/2018, Volume: 17, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    The proliferation of IoT devices that can be more easily compromised than desktop computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is a need for new ...
Full text

PDF
4.
  • ODINI: Escaping Sensitive D... ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields
    Guri, Mordechai; Zadov, Boris; Elovici, Yuval IEEE transactions on information forensics and security, 2020, Volume: 15
    Journal Article
    Peer reviewed
    Open access

    Air-gapped computers are devices that are kept isolated from the Internet, because they store and process sensitive information. When highly sensitive data is involved, an air-gapped computer might ...
Full text

PDF
5.
  • The Security of IP-Based Vi... The Security of IP-Based Video Surveillance Systems
    Kalbo, Naor; Mirsky, Yisroel; Shabtai, Asaf ... Sensors (Basel, Switzerland), 08/2020, Volume: 20, Issue: 17
    Journal Article
    Peer reviewed
    Open access

    Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and ...
Full text

PDF
6.
  • “Andromaly”: a behavioral m... “Andromaly”: a behavioral malware detection framework for android devices
    Shabtai, Asaf; Kanonov, Uri; Elovici, Yuval ... Journal of intelligent information systems, 02/2012, Volume: 38, Issue: 1
    Journal Article
    Peer reviewed

    This article presents Andromaly—a framework for detecting malware on Android mobile devices. The proposed framework realizes a Host-based Malware Detection System that continuously monitors various ...
Full text
7.
  • Towards the Detection of GP... Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream
    Davidovich, Barak; Nassi, Ben; Elovici, Yuval Sensors (Basel, Switzerland), 03/2022, Volume: 22, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    A Global Positioning System (GPS) spoofing attack can be launched against any commercial GPS sensor in order to interfere with its navigation capabilities. These sensors are installed in a variety of ...
Full text
8.
  • Virtual Breathalyzer: Towar... Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices
    Nassi, Ben; Shams, Jacob; Rokach, Lior ... Sensors (Basel, Switzerland), 05/2022, Volume: 22, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    Driving under the influence of alcohol is a widespread phenomenon in the US where it is considered a major cause of fatal accidents. In this research, we present Virtual Breathalyzer, a novel ...
Full text
9.
Full text
10.
  • Information Security Threat... Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions
    Kotak, Jaidip; Habler, Edan; Brodt, Oleg ... Sensors (Basel, Switzerland), 04/2023, Volume: 23, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    During the COVID-19 pandemic, most organizations were forced to implement a work-from-home policy, and in many cases, employees have not been expected to return to the office on a full-time basis. ...
Full text
1 2 3 4 5
hits: 405

Load filters