Ran Yahalom
Cited by
Cited by
USB-based attacks
N Nissim, R Yahalom, Y Elovici
Computers & Security 70, 675-688, 2017
Improving the effectiveness of intrusion detection systems for hierarchical data
R Yahalom, A Steren, Y Nameri, M Roytman, A Porgador, Y Elovici
Knowledge-Based Systems 168, 59-69, 2019
Constrained anonymization of production data: a constraint satisfaction problem approach
R Yahalom, E Shmueli, T Zrihen
Workshop on Secure Data Management, 41-53, 2010
Structure‐based identification of catalytic residues
R Yahalom, D Reshef, A Wiener, S Frankel, N Kalisman, B Lerner, ...
Proteins: Structure, Function, and Bioinformatics 79 (6), 1952-1963, 2011
Mining roles from web application usage patterns
N Gal-Oz, Y Gonen, R Yahalom, E Gudes, B Rozenberg, E Shmueli
International Conference on Trust, Privacy and Security in Digital Business …, 2011
Camls: A constraint-based apriori algorithm for mining long sequences
Y Gonen, N Gal-Oz, R Yahalom, E Gudes
International Conference on Database Systems for Advanced Applications, 63-77, 2010
Identifying knots of trust in virtual communities
N Gal-Oz, R Yahalom, E Gudes
IFIP International Conference on Trust Management, 67-81, 2011
Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic
R Yahalom, D Barishev, A Steren, Y Nameri, M Roytman, A Porgador, ...
Data in Brief 23, 103863, 2019
Constrained obfuscation of relational databases
E Shmueli, T Zrihen, R Yahalom, T Tassa
Information Sciences 286, 35-62, 2014
Model for detection of anomalous discrete data sequences
R Yahalom, A Progador, Y Elovici
US Patent App. 16/326,237, 2019
CAMLS: A Constraint-based Apriori Algorithm for Mining Long Sequences
The system can't perform the operation now. Try again later.
Articles 1–11