N-baiot—network-based detection of iot botnet attacks using deep autoencoders Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ... IEEE Pervasive Computing 17 (3), 12-22, 2018 | 338 | 2018 |
Security testbed for Internet-of-Things devices S Siboni, V Sachidananda, Y Meidan, M Bohadana, Y Mathov, S Bhairav, ... IEEE transactions on reliability 68 (1), 23-44, 2019 | 59 | 2019 |
Opening Pandora’s box: effective techniques for reverse engineering IoT devices O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren International Conference on Smart Card Research and Advanced Applications, 1-21, 2017 | 19 | 2017 |
Reverse engineering IoT devices: Effective techniques and methods O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren IEEE Internet of Things Journal 5 (6), 4965-4976, 2018 | 17 | 2018 |
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples E Levy, Y Mathov, Z Katzir, A Shabtai, Y Elovici arXiv preprint arXiv:2010.03180, 2020 | 3 | 2020 |
Enhancing Real-World Adversarial Patches with 3D Modeling Techniques Y Mathov, L Rokach, Y Elovici arXiv preprint arXiv:2102.05334, 2021 | | 2021 |
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations TB Senior, Y Mathov, A Shabtai, Y Elovici arXiv preprint arXiv:2010.12809, 2020 | | 2020 |
When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders E Nehemya, Y Mathov, A Shabtai, Y Elovici arXiv preprint arXiv:2010.09246, 2020 | | 2020 |
Challenges for Security Assessment of Enterprises in the IoT Era Y Mathov, N Agmon, A Shabtai, R Puzis, NO Tippenhauer, Y Elovici arXiv preprint arXiv:1906.10922, 2019 | | 2019 |