Volgen
Rami Puzis
Rami Puzis
Software and Information Systems Engineering Department, Ben-Gurion University of the Negev
Geverifieerd e-mailadres voor bgu.ac.il - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Link prediction in social networks using computationally efficient topological features
M Fire, L Tenenboim, O Lesser, R Puzis, L Rokach, Y Elovici
2011 IEEE third international conference on privacy, security, risk and …, 2011
2362011
Routing betweenness centrality
S Dolev, Y Elovici, R Puzis
Journal of the ACM (JACM) 57 (4), 1-27, 2010
1862010
EEG-triggered dynamic difficulty adjustment for multiplayer games
A Stein, Y Yotam, R Puzis, G Shani, M Taieb-Maimon
Entertainment computing 25, 14-25, 2018
1062018
Augmented betweenness centrality for environmentally aware traffic monitoring in transportation networks
R Puzis, Y Altshuler, Y Elovici, S Bekhor, Y Shiftan, A Pentland
Journal of Intelligent Transportation Systems 17 (1), 91-105, 2013
1012013
Computationally efficient link prediction in a variety of social networks
M Fire, L Tenenboim-Chekina, R Puzis, O Lesser, L Rokach, Y Elovici
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (1), 1-25, 2014
952014
Organization mining using online social networks
M Fire, R Puzis
Networks and Spatial Economics 16, 545-578, 2016
882016
Fast algorithm for successive computation of group betweenness centrality
R Puzis, Y Elovici, S Dolev
Physical Review E 76 (5), 056709, 2007
782007
Finding the most prominent group in complex networks
R Puzis, Y Elovici, S Dolev
AI communications 20 (4), 287-296, 2007
782007
System and method for assessing cybersecurity awareness
A Shabtai, R Puzis, L Rokach, L Orevi, G Malinsky, Z Katzir, R Bitton
US Patent 10,454,958, 2019
762019
Data mining opportunities in geosocial networks for improving road safety
M Fire, D Kagan, R Puzis, L Rokach, Y Elovici
2012 IEEE 27th Convention of Electrical and Electronics Engineers in Israel, 1-4, 2012
592012
Potential search: A bounded-cost search algorithm
R Stern, R Puzis, A Felner
Proceedings of the International Conference on Automated Planning and …, 2011
592011
Taxonomy of mobile users' security awareness
R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach, A Shabtai
Computers & Security 73, 266-293, 2018
552018
Creation and management of social network honeypots for detecting targeted cyber attacks
A Paradise, A Shabtai, R Puzis, A Elyashar, Y Elovici, M Roshandel, ...
IEEE transactions on computational social systems 4 (3), 65-79, 2017
522017
Heuristics for speeding up betweenness centrality computation
R Puzis, P Zilberman, Y Elovici, S Dolev, U Brandes
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
512012
Combined network analysis and machine learning allows the prediction of metabolic pathways from tomato metabolomics data
D Toubiana, R Puzis, L Wen, N Sikron, A Kurmanbayeva, A Soltabayeva, ...
Communications biology 2 (1), 214, 2019
502019
Incremental deployment of network monitors based on group betweenness centrality
S Dolev, Y Elovici, R Puzis, P Zilberman
Information Processing Letters 109 (20), 1172-1176, 2009
482009
Collaborative attack on Internet users' anonymity
R Puzis, D Yagil, Y Elovici, D Braha
Internet Research, 2009
462009
Anti-reconnaissance tools: Detecting targeted socialbots
A Paradise, R Puzis, A Shabtai
IEEE Internet Computing 18 (5), 11-19, 2014
442014
Link prediction in highly fractional data sets
M Fire, R Puzis, Y Elovici
Handbook of computational approaches to counterterrorism, 283-300, 2013
412013
Potential-based bounded-cost search and Anytime Non-Parametric A⁎
R Stern, A Felner, J Van Den Berg, R Puzis, R Shah, K Goldberg
Artificial Intelligence 214, 1-25, 2014
402014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20