Остановите войну!
for scientists:
default search action
Rami Puzis
- > Home > Persons > Rami Puzis
Publications
- 2024
- [i32]Dov Shirtz, Inna Koberman, Aviad Elyashar, Rami Puzis, Yuval Elovici:
Enhancing Energy Sector Resilience: Integrating Security by Design Principles. CoRR abs/2402.11543 (2024) - 2023
- [j37]Florian Klaus Kaiser, Uriel Dardik, Aviad Elitzur, Polina Zilberman, Nir Daniel, Marcus Wiens, Frank Schultmann, Yuval Elovici, Rami Puzis:
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph. IEEE Trans. Dependable Secur. Comput. 20(6): 4793-4809 (2023) - [j34]Ari Adler, Lior Bass, Yuval Elovici, Rami Puzis:
How Polynomial Regression Improves DeNATing. IEEE Trans. Netw. Serv. Manag. 20(4): 5000-5011 (2023) - [c58]Adi Offer, Aviram Zilberman, Asaf Shabtai, Yuval Elovici, Rami Puzis:
CDGeB: Cloud Data Geolocation Benchmark. CCSW@CCS 2023: 69-74 - [c55]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. IDEAS 2023: 79-86 - 2022
- [i30]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. CoRR abs/2204.02057 (2022) - 2020
- [j23]Bronislav Sidik, Rami Puzis, Polina Zilberman, Yuval Elovici:
PALE: Time Bounded Practical Agile Leader Election. IEEE Trans. Parallel Distributed Syst. 31(2): 470-485 (2020) - [c48]Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:
Security Ranking of IoT Devices Using an AHP Model. CSCML 2020: 29-44 - [c47]Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. ESORICS (1) 2020: 88-109 - [i23]Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai:
DANTE: A framework for mining and monitoring darknet traffic. CoRR abs/2003.02575 (2020) - [i22]Rami Puzis, Polina Zilberman, Yuval Elovici:
ATHAFI: Agile Threat Hunting And Forensic Investigation. CoRR abs/2003.03663 (2020) - 2019
- [j21]Mordechai Guri, Rami Puzis, Kim-Kwang Raymond Choo, Sergey Rubinshtein, Gabi Kedma, Yuval Elovici:
Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145 (2019) - [i14]Yael Mathov, Noga Agmon, Asaf Shabtai, Rami Puzis, Nils Ole Tippenhauer, Yuval Elovici:
Challenges for Security Assessment of Enterprises in the IoT Era. CoRR abs/1906.10922 (2019) - 2018
- [c37]Mayank Agarwal, Rami Puzis, Jawad Haj-Yahya, Polina Zilberman, Yuval Elovici:
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic. SEC 2018: 216-230 - [r1]Elina Yaakobovich, Rami Puzis, Yuval Elovici:
Incentives in Collaborative Applications. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [i12]Bronislav Sidik, Rami Puzis, Polina Zilberman, Yuval Elovici:
PALE: Partially Asynchronous Agile Leader Election. CoRR abs/1801.03734 (2018) - 2017
- [j15]Abigail Paradise, Asaf Shabtai, Rami Puzis, Aviad Elyashar, Yuval Elovici, Mehran Roshandel, Christoph Peylo:
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. IEEE Trans. Comput. Soc. Syst. 4(3): 65-79 (2017) - [j14]Polina Zilberman, Rami Puzis, Yuval Elovici:
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers. IEEE Trans. Dependable Secur. Comput. 14(5): 521-534 (2017) - [i9]Ori Ossmy, Ofir Tam, Rami Puzis, Lior Rokach, Ohad Inbar, Yuval Elovici:
MindDesktop: a general purpose brain computer interface. CoRR abs/1705.07490 (2017) - 2016
- [j13]Rami Puzis, Dov Shirtz, Yuval Elovici:
A particle swarm model for estimating reliability and scheduling system maintenance. Enterp. Inf. Syst. 10(4): 349-377 (2016) - 2015
- [j11]Rami Puzis, Yuval Elovici, Polina Zilberman, Shlomi Dolev, Ulrik Brandes:
Topology manipulations for speeding betweenness centrality computation. J. Complex Networks 3(1): 84-112 (2015) - [p2]Rami Puzis, Yuval Elovici:
Active Discovery of Hidden Profiles in Social Networks Using Malware. Cyber Warfare 2015: 221-235 - 2013
- [j8]Rami Puzis, Yaniv Altshuler, Yuval Elovici, Shlomo Bekhor, Yoram Shiftan, Alex Pentland:
Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks. J. Intell. Transp. Syst. 17(1): 91-105 (2013) - [j6]Michael Fire, Lena Tenenboim-Chekina, Rami Puzis, Ofrit Lesser, Lior Rokach, Yuval Elovici:
Computationally efficient link prediction in a variety of social networks. ACM Trans. Intell. Syst. Technol. 5(1): 10:1-10:25 (2013) - [i3]Michael Fire, Rami Puzis, Yuval Elovici:
Organization Mining Using Online Social Networks. CoRR abs/1303.3741 (2013) - 2012
- [c14]Eitan Menahem, Rami Puzis, Yuval Elovici:
Detecting Spammers via Aggregated Historical Data Set. NSS 2012: 248-262 - [c13]Rami Puzis, Polina Zilberman, Yuval Elovici, Shlomi Dolev, Ulrik Brandes:
Heuristics for Speeding Up Betweenness Centrality Computation. SocialCom/PASSAT 2012: 302-311 - 2011
- [j5]Rami Puzis, Meytal Tubi, Yuval Elovici, Chanan Glezer, Shlomi Dolev:
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks. ACM Trans. Model. Comput. Simul. 22(1): 5:1-5:26 (2011) - [c11]Talya Porat, Inbal Rief, Rami Puzis, Yuval Elovici:
LoOkie - it feels like being there. CHI Extended Abstracts 2011: 1873-1878 - [c9]Ori Ossmy, Ofir Tam, Rami Puzis, Lior Rokach, Ohad Inbar, Yuval Elovici:
MindDesktop - Computer Accessibility for Severely Handicapped. ICEIS (4) 2011: 316-320 - [c8]Michael Fire, Lena Tenenboim, Ofrit Lesser, Rami Puzis, Lior Rokach, Yuval Elovici:
Link Prediction in Social Networks Using Computationally Efficient Topological Features. SocialCom/PASSAT 2011: 73-80 - 2010
- [j4]Shlomi Dolev, Yuval Elovici, Rami Puzis:
Routing betweenness centrality. J. ACM 57(4): 25:1-25:27 (2010) - [c7]Emily Rozenshine-Kemelmakher, Rami Puzis, Ariel Felner, Yuval Elovici:
Cost Benefit Deployment of DNIPS. ICC 2010: 1-5 - [p1]Rami Puzis, Meytal Tubi, Yuval Elovici:
Optimizing Targeting of Intrusion Detection Systems in Social Networks. Handbook of Social Network Technologies 2010: 549-568 - 2009
- [j3]Rami Puzis, Dana Yagil, Yuval Elovici, Dan Braha:
Collaborative attack on Internet users' anonymity. Internet Res. 19(1): 60-77 (2009) - [j2]Shlomi Dolev, Yuval Elovici, Rami Puzis, Polina Zilberman:
Incremental deployment of network monitors based on Group Betweenness Centrality. Inf. Process. Lett. 109(20): 1172-1176 (2009) - [c4]Erez Shmueli, Alexander Kruglov, Rami Puzis, Yuval Elovici, Roman Englert, Chanan Glezer:
An Attentive Digital Signage System. MuC (Workshopband) 2009: 10-15 - [i1]Shlomi Dolev, Yuval Elovici, Rami Puzis, Polina Zilberman:
Incremental Deployment of Network Monitors Based on Group Betweenness Centrality. CoRR abs/0904.0352 (2009) - 2008
- [c3]Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev:
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. EuroISI 2008: 191-203 - 2007
- [j1]Rami Puzis, Yuval Elovici, Shlomi Dolev:
Finding the most prominent group in complex networks. AI Commun. 20(4): 287-296 (2007) - [c2]Meytal Tubi, Rami Puzis, Yuval Elovici:
Deployment of DNIDS in Social Networks. ISI 2007: 59-65 - [c1]Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici:
Simulating Threats Propagation within the NSP Infrastructure. ISI 2007: 380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint