Volgen
Eitan Menahem
Eitan Menahem
IBM
Geverifieerd e-mailadres voor post.bgu.ac.il - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Improving malware detection by applying multi-inducer ensemble
E Menahem, A Shabtai, L Rokach, Y Elovici
Computational Statistics & Data Analysis 53 (4), 1483-1494, 2009
1742009
Troika–an improved stacking schema for classification tasks
E Menahem, L Rokach, Y Elovici
Information Sciences 179 (24), 4097-4122, 2009
1182009
F-sign: Automatic, function-based signature generation for malware
A Shabtai, E Menahem, Y Elovici
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010
532010
Combining one-class classifiers via meta learning
E Menahem, L Rokach, Y Elovici
Proceedings of the 22nd ACM international conference on Information …, 2013
372013
OSPF vulnerability to persistent poisoning attacks: a systematic analysis
G Nakibly, A Sosnovich, E Menahem, A Waizel, Y Elovici
Proceedings of the 30th Annual Computer security applications Conference …, 2014
232014
Stacking schema for classification tasks
E Menahem, L Rokach, Y Elovici
US Patent 8,244,652, 2012
182012
XML-AD: Detecting anomalous patterns in XML documents
E Menahem, A Schclar, L Rokach, Y Elovici
Information Sciences 326, 71-88, 2016
17*2016
Visualizing insider threats: An effective interface for security analytics
B Haim, E Menahem, Y Wolfsthal, C Meenan
Proceedings of the 22nd International Conference on Intelligent User …, 2017
132017
Metric anomaly detection via asymmetric risk minimization
A Kontorovich, D Hendler, E Menahem
Similarity-Based Pattern Recognition: First International Workshop, SIMBAD …, 2011
92011
Owning the Routing Table. Part II
G Nakibly, E Menahem, A Waizel, Y Elovici
Black Hat, 2013
82013
ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks
E Menahem, Y Elovici, N Amar, G Nakibly
AISEC, 55-66, 2013
52013
Poster: Detecting malware through temporal function-based features
E Menahem, A Shabtai, A Levhar
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
42013
Network-based intrusion detection systems go active!
E Menahem, G Nakibly, Y Elovici
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
42012
Detecting spammers via aggregated historical data set
E Menahem, R Pusiz, Y Elovici
Network and System Security: 6th International Conference, NSS 2012 …, 2012
42012
Detecting malicious executable files by performing static analysis on executable files' overlay
A Finkelshtein, E Menahem
US Patent 10,846,403, 2020
22020
Challenge generation for verifying users of computing devices
A Jarrous, A Shulman-Peleg, E Menahem
US Patent 10,082,954, 2018
22018
Owning the Routing Table
G Nakibly, E Menahem, A Waizel, Y Elovici
Part II. Presentation at Black Hat USA, 2013
22013
Degrading the Network’s Quality of Service via Traffic Diversion Attacks
E Menahem, G Nakibly, Y Elovici
Tech. rep., 12 2012, 0
2
Automated detection of personal information in free text
A Finkelshtein, B Haim, E Menahem
US Patent 11,429,790, 2022
12022
Challenge generation for verifying users of computing devices
A Jarrous, A Shulman-Peleg, E Menahem
US Patent App. 14/949,984, 2017
12017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20