UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2
hits: 15
1.
  • N-BaIoT-Network-Based Detec... N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
    Meidan, Yair; Bohadana, Michael; Mathov, Yael ... IEEE pervasive computing, 07/2018, Volume: 17, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    The proliferation of IoT devices that can be more easily compromised than desktop computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is a need for new ...
Full text

PDF
2.
  • Security Testbed for Intern... Security Testbed for Internet-of-Things Devices
    Siboni, Shachar; Sachidananda, Vinay; Meidan, Yair ... IEEE transactions on reliability, 2019-March, 2019-3-00, Volume: 68, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The Internet of Things (IoT) is a global ecosystem of information and communication technologies aimed at connecting any type of object (thing), at any time, and in any place, to each other and to ...
Full text

PDF
3.
  • DeepStream: Autoencoder-bas... DeepStream: Autoencoder-based stream temporal clustering and anomaly detection
    Harush, Shimon; Meidan, Yair; Shabtai, Asaf Computers & security, July 2021, 2021-07-00, 20210701, Volume: 106
    Journal Article
    Peer reviewed
    Open access

    The increasing number of IoT devices in “smart” environments, such as homes, offices, and cities, produce seemingly endless data streams and drive many daily decisions. Consequently, there is growing ...
Full text
4.
  • D-Score: An expert-based me... D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks
    Meidan, Yair; Benatar, Daniel; Bitton, Ron ... Computers & security, March 2023, 2023-03-00, Volume: 126
    Journal Article
    Peer reviewed
    Open access

    IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting such attacks ...
Full text
5.
  • A novel approach for detect... A novel approach for detecting vulnerable IoT devices connected behind a home NAT
    Meidan, Yair; Sachidananda, Vinay; Peng, Hongyi ... Computers & security, October 2020, 2020-10-00, 20201001, Volume: 97
    Journal Article
    Peer reviewed
    Open access

    Telecommunication service providers (telcos) are exposed to cyber-attacks executed by compromised IoT devices connected to their customers’ networks. Such attacks might have severe effects on the ...
Full text

PDF
6.
  • CADeSH: Collaborative Anoma... CADeSH: Collaborative Anomaly Detection for Smart Homes
    Meidan, Yair; Avraham, Dan; Libhaber, Hanan ... IEEE internet of things journal, 05/2023, Volume: 10, Issue: 10
    Journal Article
    Open access

    Although home Internet of Things (IoT) devices are typically plain and task oriented, the context of their daily use may affect their traffic patterns. That is, a given IoT device will probably not ...
Full text
7.
  • Cycle-Time Key Factor Ident... Cycle-Time Key Factor Identification and Prediction in Semiconductor Manufacturing Using Machine Learning and Data Mining
    Meidan, Yair; Lerner, Boaz; Rabinowitz, Gad ... IEEE transactions on semiconductor manufacturing, 05/2011, Volume: 24, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Within the complex and competitive semiconductor manufacturing industry, lot cycle time (CT) remains one of the key performance indicators. Its reduction is of strategic importance as it contributes ...
Full text

PDF
8.
  • GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation
    Malul, Ehud; Meidan, Yair; Mimran, Dudu ... 05/2024
    Journal Article
    Open access

    A key challenge associated with Kubernetes configuration files (KCFs) is that they are often highly complex and error-prone, leading to security vulnerabilities and operational setbacks. Rule-based ...
Full text
9.
  • CADeSH: Collaborative Anomaly Detection for Smart Homes
    Meidan, Yair; Avraham, Dan; Libhaber, Hanan ... arXiv.org, 03/2023
    Paper, Journal Article
    Open access

    Although home IoT (Internet of Things) devices are typically plain and task oriented, the context of their daily use may affect their traffic patterns. For this reason, anomaly-based intrusion ...
Full text
10.
  • D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks
    Meidan, Yair; Benatar, Daniel; Bitton, Ron ... arXiv.org, 03/2023
    Paper, Journal Article
    Open access

    IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting such attacks ...
Full text
1 2
hits: 15

Load filters