Mind your privacy: Privacy leakage through BCI applications using machine learning methods
Landau, Ofir, Cohen, Aviad, Gordon, Shirley, Nissim, Nir
Published in Knowledge-based systems (21.06.2020)
Published in Knowledge-based systems (21.06.2020)
Get full text
Journal Article
CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices
Kintzlinger, Matan, Cohen, Aviad, Nissim, Nir, Rav-Acha, Moshe, Khalameizer, Vladimir, Elovici, Yuval, Shahar, Yuval, Katze, Amos
Published in IEEE access (01.01.2020)
Published in IEEE access (01.01.2020)
Get full text
Journal Article
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology
Nissim, Nir, Cohen, Aviad, Elovici, Yuval
Published in IEEE transactions on information forensics and security (01.03.2017)
Published in IEEE transactions on information forensics and security (01.03.2017)
Get full text
Journal Article
The infinite race between steganography and steganalysis in images
Muralidharan, Trivikram, Cohen, Aviad, Cohen, Assaf, Nissim, Nir
Published in Signal processing (01.12.2022)
Published in Signal processing (01.12.2022)
Get full text
Journal Article