default search action
Amit Dvir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj:
OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification. Comput. Commun. 213: 271-284 (2024) - [j30]Or Haim Anidjar, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj:
Extending limited datasets with GAN-like self-supervision for SMS spam detection. Comput. Secur. 145: 103998 (2024) - [j29]Chen Hajaj, Porat Aharon, Ran Dubin, Amit Dvir:
The art of time-bending: Data augmentation and early prediction for efficient traffic classification. Expert Syst. Appl. 252: 124166 (2024) - [j28]Aviram Zilberman, Amit Dvir, Ariel Stulman:
SPRINKLER: A Multi-RPL Man-in-the-Middle Identification Scheme in IoT Networks. IEEE Trans. Mob. Comput. 23(10): 9971-9988 (2024) - [j27]Aviram Zilberman, Ariel Stulman, Amit Dvir:
Identifying a Malicious Node in a UAV Network. IEEE Trans. Netw. Serv. Manag. 21(1): 1226-1240 (2024) - [c35]Nathan Dillbary, Roi Yozevitch, Amit Dvir, Ran Dubin, Chen Hajaj:
Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification. CCNC 2024: 266-271 - [i20]Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj:
CBR - Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution. CoRR abs/2403.11206 (2024) - [i19]Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj:
Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework. CoRR abs/2405.11247 (2024) - [i18]Udi Aharon, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj:
Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning. CoRR abs/2405.11258 (2024) - [i17]Yehonatan Zion, Porat Aharon, Ran Dubin, Amit Dvir, Chen Hajaj:
Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques. CoRR abs/2407.16539 (2024) - [i16]Revital Marbel, Yanir Cohen, Ran Dubin, Amit Dvir, Chen Hajaj:
Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services' User Anomalies. CoRR abs/2409.12726 (2024) - 2023
- [j26]Nadav Schweitzer, Liad Cohen, Amit Dvir, Ariel Stulman:
Persuasive: A node isolation attack variant for OLSR-based MANETs and its mitigation. Ad Hoc Networks 148: 103192 (2023) - [j25]Nadav Schweitzer, Amit Dvir, Ariel Stulman:
Network wormhole attacks without a traditional wormhole. Ad Hoc Networks 151: 103286 (2023) - [j24]Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj:
When a RF beats a CNN and GRU, together - A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification. Comput. Secur. 124: 103000 (2023) - [j23]Or Haim Anidjar, Yannick Estève, Chen Hajaj, Amit Dvir, Itshak Lapidot:
Speech and multilingual natural language framework for speaker change detection and diarization. Expert Syst. Appl. 213(Part): 119238 (2023) - [j22]Harel Berger, Amit Dvir, Enrico Mariconti, Chen Hajaj:
Breaking the structure of MaMaDroid. Expert Syst. Appl. 228: 120429 (2023) - [i15]Eli Belkind, Ran Dubin, Amit Dvir:
Open Image Content Disarm And Reconstruction. CoRR abs/2307.14057 (2023) - 2022
- [j21]Harel Berger, Chen Hajaj, Enrico Mariconti, Amit Dvir:
Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier. IEEE Access 10: 1317-1333 (2022) - [j20]Avraham Treistman, Dror Mughaz, Ariel Stulman, Amit Dvir:
Word embedding dimensionality reduction using dynamic variance thresholding (DyVaT). Expert Syst. Appl. 208: 118157 (2022) - [c34]Ofek Bader, Adi Lichy, Chen Hajaj, Ran Dubin, Amit Dvir:
MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification. CCNC 2022: 527-533 - [d1]Amit Dvir, Yehonatan Zion, Jonathan Muehlstein, Ofir Pele, Ran Dubin:
Robust Machine Learning for Encrypted Traffic Classification. IEEE DataPort, 2022 - [i14]Harel Berger, Chen Hajaj, Enrico Mariconti, Amit Dvir:
MaMaDroid2.0 - The Holes of Control Flow Graphs. CoRR abs/2202.13922 (2022) - [i13]Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen:
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks. CoRR abs/2205.04293 (2022) - [i12]Harel Berger, Chen Hajaj, Amit Dvir:
Problem-Space Evasion Attacks in the Android OS: a Survey. CoRR abs/2205.14576 (2022) - [i11]Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj:
When a RF Beats a CNN and GRU, Together - A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification. CoRR abs/2206.08004 (2022) - [i10]Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj:
Open-Source Framework for Encrypted Internet and Malicious Traffic Classification. CoRR abs/2206.10144 (2022) - 2021
- [j19]Aviram Zilberman, Yoram Haddad, Sefi Erlich, Yossi Peretz, Amit Dvir:
SDN Wireless Controller Placement Problem-The 4G LTE-U Case. IEEE Access 9: 16225-16238 (2021) - [j18]Aviram Zilberman, Yoram Haddad, Sefi Erlich, Yossi Peretz, Amit Dvir:
Heterogeneous SDN controller placement problem - The Wi-Fi and 4G LTE-U case. Comput. Networks 198: 108376 (2021) - [j17]Harel Berger, Amit Z. Dvir, Moti Geva:
A wrinkle in time: a case study in DNS poisoning. Int. J. Inf. Sec. 20(3): 313-329 (2021) - [j16]Or Haim Anidjar, Itshak Lapidot, Chen Hajaj, Amit Dvir, Issachar Gilad:
Hybrid Speech and Text Analysis Methods for Speaker Change Detection. IEEE ACM Trans. Audio Speech Lang. Process. 29: 2324-2338 (2021) - [c33]Or Haim Anidjar, Itshak Lapidot, Chen Hajaj, Amit Dvir:
A Thousand Words are Worth More Than One Recording: Word-Embedding Based Speaker Change Detection. Interspeech 2021: 3121-3125 - 2020
- [j15]Amit Dvir, Angelos K. Marnerides, Ran Dubin, Nehor Golan, Chen Hajaj:
Encrypted video traffic clustering demystified. Comput. Secur. 96: 101917 (2020) - [j14]Vinh-Thong Ta, Amit Dvir:
A secure road traffic congestion detection and notification concept based on V2I communications. Veh. Commun. 25: 100283 (2020) - [c32]Nitay Hason, Amit Dvir, Chen Hajaj:
Robust Malicious Domain Detection. CSCML 2020: 45-61 - [c31]Harel Berger, Chen Hajaj, Amit Dvir:
Evasion Is Not Enough: A Case Study of Android Malware. CSCML 2020: 167-174 - [i9]Harel Berger, Chen Hajaj, Amit Dvir:
When the Guard failed the Droid: A case study of Android malware. CoRR abs/2003.14123 (2020) - [i8]Or Haim Anidjar, Chen Hajaj, Amit Dvir, I. Gilad:
A Thousand Words are Worth More Than One Recording: NLP Based Speaker Change Point Detection. CoRR abs/2006.01206 (2020) - [i7]Chen Hajaj, Nitay Hason, Nissim Harel, Amit Dvir:
Less is More: Robust and Novel Features for Malicious Domain Detection. CoRR abs/2006.01449 (2020)
2010 – 2019
- 2019
- [j13]Ran Dubin, Raffael Shalala, Amit Dvir, Ofir Pele, Ofer Hadar:
A fair server adaptation algorithm for HTTP adaptive streaming using video complexity. Multim. Tools Appl. 78(9): 11203-11222 (2019) - [j12]Amit Dvir, Nissim Harel, Ran Dubin, Refael Barkan, Raffael Shalala, Ofer Hadar:
MiSAL - A minimal quality representation switch logic for adaptive streaming. Multim. Tools Appl. 78(18): 26483-26508 (2019) - [j11]Amit Dvir, Yoram Haddad, Aviram Zilberman:
The controller placement problem for wireless SDN. Wirel. Networks 25(8): 4963-4978 (2019) - [c30]Amit Dvir, Angelos K. Marnerides, Ran Dubin, Nehor Golan:
Clustering the Unknown - The Youtube Case. ICNC 2019: 402-407 - [i6]Harel Berger, Amit Z. Dvir, Moti Geva:
A wrinkle in time: A case study in DNS poisoning. CoRR abs/1906.10928 (2019) - 2018
- [j10]Amit Dvir, Vinh-Thong Ta, Sefi Erlich, Levente Buttyán:
STWSN: A novel secure distributed transport protocol for wireless sensor networks. Int. J. Commun. Syst. 31(18) (2018) - [j9]Ran Dubin, Ofer Hadar, Amit Dvir, Ofir Pele:
Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming. KSII Trans. Internet Inf. Syst. 12(8): 3804-3819 (2018) - [j8]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Katz, Ori Mashiach:
Adaptation logic for HTTP dynamic adaptive streaming using geo-predictive crowdsourcing for mobile users. Multim. Syst. 24(1): 19-31 (2018) - [c29]Amit Dvir, Yoram Haddad, Aviram Zilberman:
Wireless controller placement problem. CCNC 2018: 1-4 - [c28]Raffael Shalala, Ran Dubin, Ofer Hadar, Amit Dvir:
Video QoE Prediction Based on User Profile. ICNC 2018: 588-592 - [c27]Vinh-Thong Ta, Amit Dvir, Yalin Arie:
Securing Road Traffic Congestion Detection by Incorporating V2I Communications. WOWMOM 2018: 1-6 - 2017
- [j7]Michael F. Stewart, Rajgopal Kannan, Amit Dvir, Bhaskar Krishnamachari:
CASPaR: Congestion avoidance shortest path routing for delay tolerant networks. Int. J. Distributed Sens. Networks 13(11) (2017) - [j6]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar:
I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification. IEEE Trans. Inf. Forensics Secur. 12(12): 3039-3049 (2017) - [c26]Jonathan Muehlstein, Yehonatan Zion, Maor Bahumi, Itay Kirshenboim, Ran Dubin, Amit Dvir, Ofir Pele:
Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application. CCNC 2017: 1-6 - [c25]Eyal Berliner, Avi Herbon, Yuval Hadas, Boaz Ben-Moshe, Amit Dvir:
Passive assessment of QoS in a WLAN for Sudden Onset Disasters (SODs). INFOCOM Workshops 2017: 712-717 - 2016
- [c24]Eyal Berliner, Boaz Ben-Moshe, Amit Dvir, Yuval Hadas:
Wireless infrastructure deployment model for sudden-onset disasters through real-time monitoring. CAMAD 2016: 194-200 - [c23]Ran Dubin, Ofer Hadar, Itay Richman, Ofir Trabelsi, Amit Dvir, Ofir Pele:
Video quality representation classification of Safari encrypted DASH streams. DMIAF 2016: 213-216 - [c22]Michael F. Stewart, Rajgopal Kannan, Amit Dvir, Bhaskar Krishnamachari:
CASPaR: Congestion avoidance shortest path routing for delay tolerant networks. ICNC 2016: 1-5 - [i5]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Richman, Ofir Trabelsi:
Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari. CoRR abs/1602.00489 (2016) - [i4]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar:
I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification. CoRR abs/1602.00490 (2016) - [i3]Ran Dubin, Amit Dvir, Ofir Pele, Ofer Hadar, Itay Katz, Ori Mashiach:
Adaptation Logic for HTTP Dynamic Adaptive Streaming using Geo-Predictive Crowdsourcing. CoRR abs/1602.02030 (2016) - [i2]Jonathan Muehlstein, Yehonatan Zion, Maor Bahumi, Itay Kirshenboim, Ran Dubin, Amit Dvir, Ofir Pele:
Analyzing HTTPS Encrypted Traffic to Identify User Operating System, Browser and Application. CoRR abs/1603.04865 (2016) - 2015
- [c21]Ran Dubin, Ofer Hadar, Yariv Freifeld, Aviv Ruham, Amit Dvir, Nissim Harel, Refael Barkan:
Hybrid Clustered Peer-Assisted DASH-SVC System. CIT/IUCC/DASC/PICom 2015: 1651-1656 - [c20]Ran Dubin, Amit Dvir, Ofer Hadar, Tomer Frid, Alex Vesker:
Novel ad insertion technique for MPEG-DASH. CCNC 2015: 582-587 - [c19]Ran Dubin, Amit Dvir, Ofer Hadar, Raffael Shalala, Ofir Ahark:
Video complexity hybrid traffic shaping for HTTP Adaptive Streaming. CCNC 2015: 683-688 - [c18]Ran Dubin, Amit Dvir, Ofer Hadar, Nissim Harel, Refael Barkan:
Multicast adaptive logic for Dynamic Adaptive Streaming over HTTP network. INFOCOM Workshops 2015: 269-274 - 2014
- [j5]Roi Yozevitch, Boaz Ben-Moshe, Amit Dvir:
GNSS Accuracy Improvement Using Rapid Shadow Transitions. IEEE Trans. Intell. Transp. Syst. 15(3): 1113-1122 (2014) - [c17]Ta Vinh Thong, Amit Dvir, Levente Buttyán:
Formal Security Verification of Transport Protocols for Wireless Sensor Networks. ICCSAMA 2014: 389-403 - 2013
- [c16]Amit Dvir, Levente Buttyán, Ta Vinh Thong:
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains. ICC 2013: 2073-2078 - [c15]Ran Dubin, Ofer Hadar, Amit Dvir:
The effect of client buffer and MBR consideration on DASH Adaptation Logic. WCNC 2013: 2178-2183 - [c14]Boaz Ben-Moshe, Eyal Berliner, Amit Dvir:
Performance monitoring framework for Wi-Fi MANET. WCNC 2013: 4463-4468 - [c13]Roi Yozevitch, Boaz Ben-Moshe, Amit Dvir:
Accurate lane detection using commercial GNSS devices. WPNC 2013: 1-5 - [i1]Ta Vinh Thong, Amit Dvir:
On formal and automatic security verification of WSN transport protocols. IACR Cryptol. ePrint Arch. 2013: 14 (2013) - 2012
- [j4]Boaz Ben-Moshe, Amit Dvir, Michael Segal, Arie Tamir:
Centdian Computation in Cactus Graphs. J. Graph Algorithms Appl. 16(2): 199-224 (2012) - [c12]Boaz Ben-Moshe, Eyal Berliner, Anders Branderud, Amit Dvir, Harel Levi:
Modeling adaptive rate video transmission in Wi-Fi MANET. PM2HW2N@MSWiM 2012: 167-174 - 2011
- [c11]Boaz Ben-Moshe, Eyal Berliner, Amit Dvir, Aharon Gorodischer:
A joint framework of passive monitoring system for complex wireless networks. CCNC 2011: 55-59 - [c10]Boaz Ben-Moshe, Amit Dvir, Akiv Solomon:
Analysis and optimization of live streaming for over the top video. CCNC 2011: 60-64 - [c9]Boaz Ben-Moshe, Amit Dvir, Adi Rotman:
Development and optimization of cache element for access layer. CCNC 2011: 1126-1127 - [c8]Amit Dvir, Tamás Holczer, Levente Buttyán:
VeRA - Version Number and Rank Authentication in RPL. MASS 2011: 709-714 - 2010
- [j3]Amit Dvir, Michael Segal:
Placing and maintaining a core node in wirelessad hoc networks. Wirel. Commun. Mob. Comput. 10(6): 826-842 (2010) - [c7]Amit Dvir, Athanasios V. Vasilakos:
Backpressure-based routing protocol for DTNs. SIGCOMM 2010: 405-406 - [c6]Boaz Ben-Moshe, Amit Dvir, Michael Segal, Arie Tamir:
Centdian Computation for Sensor Networks. TAMC 2010: 187-198
2000 – 2009
- 2009
- [c5]Amit Dvir, Niklas Carlsson:
Power-aware recovery for geographic routing. WCNC 2009: 2851-2856 - 2008
- [j2]Amit Dvir, Michael Segal:
The (k, l) Coredian Tree for Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 6(1-2): 123-144 (2008) - [c4]Amit Dvir, Michael Segal:
The (k, l) Coredian Tree for Ad Hoc Networks. ICDCS Workshops 2008: 267-272 - 2007
- [j1]Yehuda Ben-Shimol, Boaz Ben-Moshe, Yoav Ben-Yehezkel, Amit Dvir, Michael Segal:
Automated antenna positioning algorithms for wireless fixed-access networks. J. Heuristics 13(3): 243-263 (2007) - [c3]Amit Dvir, Michael Segal:
Placing and Maintaining a Core Node in Wireless Ad Hoc Sensor Networks. Networking 2007: 13-24 - 2006
- [c2]Amit Dvir, Yehuda Ben-Shimol, Yoav Ben-Yehezkel, Michael Segal:
Automated antenna positioning for wireless networks. CCNC 2006: 902-906 - 2004
- [c1]Yehuda Ben-Shimol, Amit Dvir, Michael Segal:
SPLAST: a novel approach for multicasting in mobile wireless ad hoc networks. PIMRC 2004: 1011-1015
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint