Follow
Ran Yahalom
Title
Cited by
Cited by
Year
USB-based attacks
N Nissim, R Yahalom, Y Elovici
Computers & Security 70, 675-688, 2017
1052017
Improving the effectiveness of intrusion detection systems for hierarchical data
R Yahalom, A Steren, Y Nameri, M Roytman, A Porgador, Y Elovici
Knowledge-Based Systems 168, 59-69, 2019
372019
Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic
R Yahalom, D Barishev, A Steren, Y Nameri, M Roytman, A Porgador, ...
Data in brief 23, 103863, 2019
182019
Constrained anonymization of production data: a constraint satisfaction problem approach
R Yahalom, E Shmueli, T Zrihen
Workshop on Secure Data Management, 41-53, 2010
162010
Structure‐based identification of catalytic residues
R Yahalom, D Reshef, A Wiener, S Frankel, N Kalisman, B Lerner, ...
Proteins: Structure, Function, and Bioinformatics 79 (6), 1952-1963, 2011
142011
Mining roles from web application usage patterns
N Gal-Oz, Y Gonen, R Yahalom, E Gudes, B Rozenberg, E Shmueli
Trust, Privacy and Security in Digital Business: 8th International …, 2011
132011
Camls: A constraint-based apriori algorithm for mining long sequences
Y Gonen, N Gal-Oz, R Yahalom, E Gudes
Database Systems for Advanced Applications: 15th International Conference …, 2010
82010
Identifying knots of trust in virtual communities
N Gal-Oz, R Yahalom, E Gudes
Trust Management V: 5th IFIP WG 11.11 International Conference, IFIPTM 2011 …, 2011
72011
RT spoofing attacks on MIL-STD-1553 communication traffic
R Yahalom, D Barishev, A Steren, Y Nameri, M Roytman, A Porgador, ...
Mendeley Data 3, 2019
62019
Small Versions of the Extracted Features Datasets for 9 Attacks on IP Camera and IoT Networks Generated by Mirskey et al
R Yahalom, A Steren, Y Nameri, M Roytman
Mendeley Data, 2018
52018
Constrained obfuscation of relational databases
E Shmueli, T Zrihen, R Yahalom, T Tassa
Information Sciences 286, 35-62, 2014
32014
Model for detection of anomalous discrete data sequences
R Yahalom, A Progador, Y Elovici
US Patent App. 16/326,237, 2019
12019
CAMLS: A Constraint-based Apriori Algorithm for Mining Long Sequences
The system can't perform the operation now. Try again later.
Articles 1–13