Author of the publication

Link Prediction in Social Networks Using Computationally Efficient Topological Features.

, , , , , and . SocialCom/PASSAT, page 73-80. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Elovici, Yuval
add a person with the name Elovici, Yuval
 

Other publications of authors with the same name

Efficient Multidimensional Suppression for K-Anonymity., , , and . IEEE Trans. Knowl. Data Eng., 22 (3): 334-347 (2010)A decision theoretic approach to combining information filtering., , and . Online Information Review, 33 (5): 920-942 (2009)Active learning to improve the detection of unknown computer worms activity., , , and . FUSION, page 1-8. IEEE, (2008)Unknown malcode detection via text categorization and the imbalance problem., , , , and . ISI, page 156-161. IEEE, (2008)Unknown malcode detection - A chronological evaluation., , and . ISI, page 267-268. IEEE, (2008)ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files., , , , , , and . JISIC, page 91-98. IEEE, (2014)Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries., , , and . JISIC, page 152-159. IEEE, (2014)TDS - An Innovative Terrorist Detection System.. Fighting Terror in Cyberspace, volume 65 of Series in Machine Perception and Artificial Intelligence, WorldScientific, (2005)An Overview of IDS Using Anomaly Detection., and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Nesto - Network selection and traffic offloading system for android mobile devices., , , , and . IWCMC, page 337-342. IEEE, (2013)