Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Torgny Andersson
Robert J. Zomer
Scott A. Starks
Junjie Li
Yong Chen
Hikaru Fujisaki
Michael Terry
Zhihao Li
Radu Timofte
Ahmed Amri
Home
/
Author
/
NIR NISSIM
Author Info
Open Visualization
Name
Affiliation
Papers
NIR NISSIM
Deutsche Telekom Laboratories at Ben-Gurion University, Be'er Sheva, 84105, Israel
44
Collaborators
Citations
PageRank
65
199
19.42
Referers
Referees
References
387
653
505
Search Limit
100
653
Publications (44 rows)
Collaborators (65 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
The infinite race between steganography and steganalysis in images
0
0.34
2022
Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms
0
0.34
2022
A time-interval-based active learning framework for enhanced PE malware acquisition and detection
0
0.34
2022
Time-interval temporal patterns can beat and explain the malware
0
0.34
2022
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis
0
0.34
2021
Cardio-ML: Detection of malicious clinical programmings aimed at cardiac implantable electronic devices based on machine learning and a missing values resemblance framework
0
0.34
2021
Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments
1
0.41
2021
Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments
0
0.34
2021
Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security in Cyber Space
0
0.34
2020
Mind your privacy: Privacy leakage through BCI applications using machine learning methods
0
0.34
2020
MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images.
0
0.34
2020
Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
1
0.35
2020
CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices.
0
0.34
2020
ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks
0
0.34
2020
Temporal Probabilistic Profiles for Sepsis Prediction in the ICU
4
0.44
2019
Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems.
0
0.34
2019
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework
0
0.34
2019
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud.
1
0.36
2019
Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
6
0.61
2019
Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis
3
0.40
2019
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
1
0.35
2019
Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods.
0
0.34
2018
Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices.
0
0.34
2018
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory.
11
0.60
2018
Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining.
5
0.43
2018
Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods.
6
0.45
2017
Temporal Pattern Discovery for Accurate Sepsis Diagnosis in ICU Patients.
0
0.34
2017
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology.
12
0.75
2017
USB-based attacks.
0
0.34
2017
Scholarly Digital Libraries as a Platform for Malware Distribution.
0
0.34
2017
ALDROID: efficient update of Android anti-virus software using designated active learning methods.
11
0.56
2016
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
4
0.40
2016
Improving condition severity classification with an efficient active learning based framework.
5
0.42
2016
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework.
8
0.45
2016
Boosting The Detection Of Malicious Documents Using Designated Active Learning Methods
4
0.46
2015
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
4
0.40
2015
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files
9
0.47
2014
Novel active learning methods for enhanced PC malware detection in windows OS.
14
0.62
2014
Detecting unknown computer worm activity via support vector machines and active learning
27
0.85
2012
Unknown malcode detection and the imbalance problem
29
0.98
2009
Malicious Code Detection Using Active Learning
13
0.81
2008
Active learning to improve the detection of unknown computer worms activity.
3
0.37
2008
Improving the Detection of Unknown Computer Worms Activity Using Active Learning
6
0.40
2007
Malicious Code Detection and Acquisition Using Active Learning
11
0.65
2007
1