USB-based attacks N Nissim, R Yahalom, Y Elovici Computers & Security 70, 675-688, 2017 | 45 | 2017 |
Improving the effectiveness of intrusion detection systems for hierarchical data R Yahalom, A Steren, Y Nameri, M Roytman, A Porgador, Y Elovici Knowledge-Based Systems 168, 59-69, 2019 | 16 | 2019 |
Constrained anonymization of production data: a constraint satisfaction problem approach R Yahalom, E Shmueli, T Zrihen Workshop on Secure Data Management, 41-53, 2010 | 14 | 2010 |
Structure‐based identification of catalytic residues R Yahalom, D Reshef, A Wiener, S Frankel, N Kalisman, B Lerner, ... Proteins: Structure, Function, and Bioinformatics 79 (6), 1952-1963, 2011 | 13 | 2011 |
Mining roles from web application usage patterns N Gal-Oz, Y Gonen, R Yahalom, E Gudes, B Rozenberg, E Shmueli International Conference on Trust, Privacy and Security in Digital Business …, 2011 | 12 | 2011 |
Camls: A constraint-based apriori algorithm for mining long sequences Y Gonen, N Gal-Oz, R Yahalom, E Gudes International Conference on Database Systems for Advanced Applications, 63-77, 2010 | 7 | 2010 |
Identifying knots of trust in virtual communities N Gal-Oz, R Yahalom, E Gudes IFIP International Conference on Trust Management, 67-81, 2011 | 6 | 2011 |
Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic R Yahalom, D Barishev, A Steren, Y Nameri, M Roytman, A Porgador, ... Data in Brief 23, 103863, 2019 | 3 | 2019 |
Constrained obfuscation of relational databases E Shmueli, T Zrihen, R Yahalom, T Tassa Information Sciences 286, 35-62, 2014 | 3 | 2014 |
Model for detection of anomalous discrete data sequences R Yahalom, A Progador, Y Elovici US Patent App. 16/326,237, 2019 | | 2019 |
CAMLS: A Constraint-based Apriori Algorithm for Mining Long Sequences | | |