Endoscopic device comprising linear staplers and a video camera on its distal end E Sonnenschein, A Govrin, Y Avidor, Y Elovici, M Sonnenschein US Patent 7,841,503, 2010 | 1641 | 2010 |
N-baiot—network-based detection of iot botnet attacks using deep autoencoders Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ... IEEE Pervasive Computing 17 (3), 12-22, 2018 | 1302 | 2018 |
Kitsune: an ensemble of autoencoders for online network intrusion detection Y Mirsky, T Doitshman, Y Elovici, A Shabtai arXiv preprint arXiv:1802.09089, 2018 | 1161 | 2018 |
“Andromaly”: a behavioral malware detection framework for android devices A Shabtai, U Kanonov, Y Elovici, C Glezer, Y Weiss Journal of Intelligent Information Systems 38 (1), 161-190, 2012 | 1056 | 2012 |
Devices and methods for treating morbid obesity E Sonnenschein, A Govrin, Y Avidor, Y Elovici, M Sonnenschein US Patent 8,678,994, 2014 | 696 | 2014 |
Google android: A comprehensive security assessment A Shabtai, Y Fledel, U Kanonov, Y Elovici, S Dolev, C Glezer IEEE Security & Privacy 8 (2), 35-44, 2010 | 600 | 2010 |
ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ... Proceedings of the symposium on applied computing, 506-509, 2017 | 475 | 2017 |
Online social networks: threats and solutions M Fire, R Goldschmidt, Y Elovici IEEE Communications Surveys & Tutorials 16 (4), 2019-2036, 2014 | 461 | 2014 |
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey A Shabtai, R Moskovitch, Y Elovici, C Glezer information security technical report 14 (1), 16-29, 2009 | 446 | 2009 |
Detecting unknown malicious code by applying classification techniques on opcode patterns A Shabtai, R Moskovitch, C Feher, S Dolev, Y Elovici Security Informatics 1, 1-22, 2012 | 320 | 2012 |
Dynamic malware analysis in the modern era—A state of the art survey O Or-Meir, N Nissim, Y Elovici, L Rokach ACM Computing Surveys (CSUR) 52 (5), 1-48, 2019 | 319 | 2019 |
Data leakage detection/prevention solutions A Shabtai, Y Elovici, L Rokach, A Shabtai, Y Elovici, L Rokach A Survey of Data Leakage Detection and Prevention Solutions, 17-37, 2012 | 294 | 2012 |
Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures I Homoliak, F Toffalini, J Guarnizo, Y Elovici, M Ochoa ACM Computing Surveys (CSUR) 52 (2), 1-40, 2019 | 285 | 2019 |
Detection of unauthorized IoT devices using machine learning techniques Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ... arXiv preprint arXiv:1709.04647, 2017 | 279 | 2017 |
Securing Android-powered mobile devices using SELinux A Shabtai, Y Fledel, Y Elovici IEEE Security & Privacy 8 (3), 36-44, 2009 | 260 | 2009 |
Automated static code analysis for classifying android applications using machine learning A Shabtai, Y Fledel, Y Elovici 2010 international conference on computational intelligence and security …, 2010 | 258 | 2010 |
Link prediction in social networks using computationally efficient topological features M Fire, L Tenenboim, O Lesser, R Puzis, L Rokach, Y Elovici 2011 IEEE third international conference on privacy, security, risk and …, 2011 | 251 | 2011 |
Unknown malcode detection using opcode representation R Moskovitch, C Feher, N Tzachar, E Berger, M Gitelman, S Dolev, ... Intelligence and Security Informatics: First European Conference, EuroISI …, 2008 | 249 | 2008 |
{CT-GAN}: Malicious tampering of 3d medical imagery using deep learning Y Mirsky, T Mahler, I Shelef, Y Elovici 28th USENIX Security Symposium (USENIX Security 19), 461-478, 2019 | 237 | 2019 |
Mobile malware detection through analysis of deviations in application network behavior A Shabtai, L Tenenboim-Chekina, D Mimran, L Rokach, B Shapira, ... Computers & Security 43, 1-18, 2014 | 233 | 2014 |