Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey A Shabtai, R Moskovitch, Y Elovici, C Glezer information security technical report 14 (1), 16-29, 2009 | 449 | 2009 |
Detecting unknown malicious code by applying classification techniques on opcode patterns A Shabtai, R Moskovitch, C Feher, S Dolev, Y Elovici Security Informatics 1, 1-22, 2012 | 315 | 2012 |
Unknown malcode detection using opcode representation R Moskovitch, C Feher, N Tzachar, E Berger, M Gitelman, S Dolev, ... Intelligence and Security Informatics: First European Conference, EuroISI …, 2008 | 249 | 2008 |
User identity verification via mouse dynamics C Feher, Y Elovici, R Moskovitch, L Rokach, A Schclar Information Sciences 201, 19-36, 2012 | 186 | 2012 |
Medical temporal-knowledge discovery via temporal abstraction R Moskovitch, Y Shahar AMIA annual symposium proceedings 2009, 452, 2009 | 152 | 2009 |
A framework for a distributed, hybrid, multiple-ontology clinical-guideline library, and automated guideline-support tools Y Shahar, O Young, E Shalom, M Galperin, A Mayaffit, R Moskovitch, ... Journal of Biomedical Informatics 37 (5), 325-344, 2004 | 149 | 2004 |
Identity theft, computers and behavioral biometrics R Moskovitch, C Feher, A Messerman, N Kirschnick, T Mustafic, ... 2009 IEEE International Conference on Intelligence and Security Informatics …, 2009 | 148 | 2009 |
Classification-driven temporal discretization of multivariate time series R Moskovitch, Y Shahar Data Mining and Knowledge Discovery 29, 871-913, 2015 | 139 | 2015 |
Detection of unknown computer worms based on behavioral classification of the host R Moskovitch, Y Elovici, L Rokach Computational Statistics & Data Analysis 52 (9), 4544-4566, 2008 | 139 | 2008 |
Unknown malcode detection via text categorization and the imbalance problem R Moskovitch, D Stopel, C Feher, N Nissim, Y Elovici 2008 IEEE international conference on intelligence and security informatics …, 2008 | 137 | 2008 |
Novel active learning methods for enhanced PC malware detection in windows OS N Nissim, R Moskovitch, L Rokach, Y Elovici Expert Systems with Applications 41 (13), 5843-5857, 2014 | 133 | 2014 |
Classification of multivariate time series via temporal abstraction and time intervals mining R Moskovitch, Y Shahar Knowledge and Information Systems 45, 35-74, 2015 | 122 | 2015 |
Applying machine learning techniques for detection of malicious code in network traffic Y Elovici, A Shabtai, R Moskovitch, G Tahan, C Glezer KI 2007: Advances in Artificial Intelligence: 30th Annual German Conference …, 2007 | 121 | 2007 |
Method and system for detecting malicious behavioral patterns in a computer, using machine learning R Moskovitch, D Stopel, Z Boger, Y Shahar, Y Elovici US Patent 8,516,584, 2013 | 120 | 2013 |
Fast time intervals mining using the transitivity of temporal relations R Moskovitch, Y Shahar Knowledge and Information Systems 42, 21-48, 2015 | 109 | 2015 |
DEGEL: A hybrid, multiple-ontology framework for specification and retrieval of clinical guidelines Y Shahar, O Young, E Shalom, A Mayaffit, R Moskovitch, A Hessing, ... Artificial Intelligence in Medicine: 9th Conference on Artificial …, 2003 | 86 | 2003 |
Unknown malcode detection and the imbalance problem R Moskovitch, D Stopel, C Feher, N Nissim, N Japkowicz, Y Elovici Journal in computer virology 5, 295-308, 2009 | 85 | 2009 |
Method and system for detecting malicious behavioral patterns in a computer, using machine learning R Moskovitch, D Stopel, Z Boger, Y Shahar, Y Elovici US Patent 8,490,194, 2013 | 83 | 2013 |
Unknown malcode detection using classifiers with optimal training sets R Moskovitch, Y Elovici US Patent 8,776,231, 2014 | 82 | 2014 |
Continuous verification using keystroke dynamics T Shimshon, R Moskovitch, L Rokach, Y Elovici 2010 International conference on computational intelligence and security …, 2010 | 82 | 2010 |