N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
Meidan, Yair, Bohadana, Michael, Mathov, Yael, Mirsky, Yisroel, Shabtai, Asaf, Breitenbacher, Dominik, Elovici, Yuval
Published in IEEE pervasive computing (01.07.2018)
Published in IEEE pervasive computing (01.07.2018)
Get full text
Journal Article
The Security of IP-Based Video Surveillance Systems
Kalbo, Naor, Mirsky, Yisroel, Shabtai, Asaf, Elovici, Yuval
Published in Sensors (Basel, Switzerland) (26.08.2020)
Published in Sensors (Basel, Switzerland) (26.08.2020)
Get full text
Journal Article
CHAIMELEON Project: Creation of a Pan-European Repository of Health Imaging Data for the Development of AI-Powered Cancer Management Tools
Bonmatí, Luis Martí, Miguel, Ana, Suárez, Amelia, Aznar, Mario, Beregi, Jean Paul, Fournier, Laure, Neri, Emanuele, Laghi, Andrea, França, Manuela, Sardanelli, Francesco, Penzkofer, Tobias, Lambin, Phillipe, Blanquer, Ignacio, Menzel, Marion I, Seymour, Karine, Figueiras, Sergio, Krischak, Katharina, Martínez, Ricard, Mirsky, Yisroel, Yang, Guang, Alberich-Bayarri, Ángel
Published in Frontiers in oncology (24.02.2022)
Published in Frontiers in oncology (24.02.2022)
Get full text
Journal Article
DDoS Attacks on 9-1-1 Emergency Services
Mirsky, Yisroel, Guri, Mordechai
Published in IEEE transactions on dependable and secure computing (01.11.2021)
Published in IEEE transactions on dependable and secure computing (01.11.2021)
Get full text
Journal Article
Lightweight collaborative anomaly detection for the IoT using blockchain
Mirsky, Yisroel, Golomb, Tomer, Elovici, Yuval
Published in Journal of parallel and distributed computing (01.11.2020)
Published in Journal of parallel and distributed computing (01.11.2020)
Get full text
Journal Article
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs
Mirsky, Yisroel, Kalbo, Naor, Elovici, Yuval, Shabtai, Asaf
Published in IEEE transactions on information forensics and security (01.06.2019)
Published in IEEE transactions on information forensics and security (01.06.2019)
Get full text
Journal Article
DICOM Images Have Been Hacked! Now What?
Desjardins, Benoit, Mirsky, Yisroel, Ortiz, Markel Picado, Glozman, Zeev, Tarbox, Lawrence, Horn, Robert, Horii, Steven C
Published in American journal of roentgenology (1976) (01.04.2020)
Published in American journal of roentgenology (1976) (01.04.2020)
Get full text
Journal Article
The Threat of Offensive AI to Organizations
Mirsky, Yisroel, Demontis, Ambra, Kotak, Jaidip, Shankar, Ram, Gelei, Deng, Yang, Liu, Zhang, Xiangyu, Pintor, Maura, Lee, Wenke, Elovici, Yuval, Biggio, Battista
Published in Computers & security (01.01.2023)
Published in Computers & security (01.01.2023)
Get full text
Journal Article
Anomaly detection for smartphone data streams
Mirsky, Yisroel, Shabtai, Asaf, Shapira, Bracha, Elovici, Yuval, Rokach, Lior
Published in Pervasive and mobile computing (01.02.2017)
Published in Pervasive and mobile computing (01.02.2017)
Get full text
Journal Article
Machine learning methods for SIR prediction in cellular networks
Rozenblit, Orit, Haddad, Yoram, Mirsky, Yisroel, Azoulay, Rina
Published in Physical communication (01.12.2018)
Published in Physical communication (01.12.2018)
Get full text
Journal Article
An Encryption System for Securing Physical Signals
Mirsky, Yisroel, Fedidat, Benjamin, Haddad, Yoram
Published in Security and Privacy in Communication Networks (2020)
Published in Security and Privacy in Communication Networks (2020)
Get full text
Book Chapter
A linear downlink power control algorithm for wireless networks
Mirsky, Yisroel, Haddad, Yoram
Published in 2013 Wireless Telecommunications Symposium (WTS) (01.04.2013)
Published in 2013 Wireless Telecommunications Symposium (WTS) (01.04.2013)
Get full text
Conference Proceeding