Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Elovici, Yuval
add a person with the name Elovici, Yuval
 

Other publications of authors with the same name

Nesto - Network selection and traffic offloading system for android mobile devices., , , , and . IWCMC, page 337-342. IEEE, (2013)Efficient Multidimensional Suppression for K-Anonymity., , , and . IEEE Trans. Knowl. Data Eng., 22 (3): 334-347 (2010)Automated Static Code Analysis for Classifying Android Applications Using Machine Learning., , and . CIS, page 329-333. IEEE Computer Society, (2010)A decision theoretic approach to combining information filtering., , and . Online Information Review, 33 (5): 920-942 (2009)Unknown malcode detection via text categorization and the imbalance problem., , , , and . ISI, page 156-161. IEEE, (2008)Unknown malcode detection - A chronological evaluation., , and . ISI, page 267-268. IEEE, (2008)ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files., , , , , , and . JISIC, page 91-98. IEEE, (2014)Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries., , , and . JISIC, page 152-159. IEEE, (2014)TDS - An Innovative Terrorist Detection System.. Fighting Terror in Cyberspace, volume 65 of Series in Machine Perception and Artificial Intelligence, WorldScientific, (2005)An Overview of IDS Using Anomaly Detection., and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)