default search action
Rami Puzis
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c59]Maor Reuben, Lisa Friedland, Rami Puzis, Nir Grinberg:
Leveraging Exposure Networks for Detecting Fake News Sources. KDD 2024: 5635-5646 - [i34]Dov Shirtz, Inna Koberman, Aviad Elyashar, Rami Puzis, Yuval Elovici:
Enhancing Energy Sector Resilience: Integrating Security by Design Principles. CoRR abs/2402.11543 (2024) - [i33]Beni Ifland, Elad Duani, Rubin Krief, Miro Ohana, Aviram Zilberman, Andres Murillo, Ofir Manor, Ortal Lavi, Hikichi Kenji, Asaf Shabtai, Yuval Elovici, Rami Puzis:
GeNet: A Multimodal LLM-Based Co-Pilot for Network Topology and Configuration. CoRR abs/2407.08249 (2024) - [i32]Maor Reuben, Ortal Slobodin, Aviad Elyashar, Idan-Chaim Cohen, Orna Braun-Lewensohn, Odeya Cohen, Rami Puzis:
Assessment and manipulation of latent constructs in pre-trained language models using psychometric scales. CoRR abs/2409.19655 (2024) - 2023
- [j40]David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis:
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage. IEEE Access 11: 27974-27991 (2023) - [j39]Jedrzej Rybicki, Tatiana Frenklach, Rami Puzis:
DISCONA: distributed sample compression for nearest neighbor algorithm. Appl. Intell. 53(17): 19976-19989 (2023) - [j38]Xin Li, Liav Bachar, Rami Puzis:
Centrality Learning: Auralization and Route Fitting. Entropy 25(8): 1115 (2023) - [j37]Florian Klaus Kaiser, Uriel Dardik, Aviad Elitzur, Polina Zilberman, Nir Daniel, Marcus Wiens, Frank Schultmann, Yuval Elovici, Rami Puzis:
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph. IEEE Trans. Dependable Secur. Comput. 20(6): 4793-4809 (2023) - [j36]Liad Dekel, Ilia Leybovich, Polina Zilberman, Rami Puzis:
MABAT: A Multi-Armed Bandit Approach for Threat-Hunting. IEEE Trans. Inf. Forensics Secur. 18: 477-490 (2023) - [j35]Aviad Elyashar, Rami Puzis, Michael Fire:
It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees. IEEE Trans. Knowl. Data Eng. 35(2): 1651-1666 (2023) - [j34]Ari Adler, Lior Bass, Yuval Elovici, Rami Puzis:
How Polynomial Regression Improves DeNATing. IEEE Trans. Netw. Serv. Manag. 20(4): 5000-5011 (2023) - [c58]Adi Offer, Aviram Zilberman, Asaf Shabtai, Yuval Elovici, Rami Puzis:
CDGeB: Cloud Data Geolocation Benchmark. CCSW@CCS 2023: 69-74 - [c57]Nir Daniel, Florian Klaus Kaiser, Anton Dzega, Aviad Elyashar, Rami Puzis:
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT. ESORICS Workshops (2) 2023: 76-91 - [c56]Ofir Cohen, Ron Bitton, Asaf Shabtai, Rami Puzis:
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment. ESORICS (3) 2023: 431-451 - [c55]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. IDEAS 2023: 79-86 - [c54]Alon Freund, Rami Puzis, Michael Segal:
Link2speed: VANET speed assessment via link-state analysis. WCNC 2023: 1-6 - [i31]Natan Semyonov, Rami Puzis, Asaf Shabtai, Gilad Katz:
ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network. CoRR abs/2305.06786 (2023) - 2022
- [j33]Edita Grolman, Dvir Cohen, Tatiana Frenklach, Asaf Shabtai, Rami Puzis:
How and when to stop the co-training process. Expert Syst. Appl. 187: 115841 (2022) - [j32]Amir Olswang, Tom Gonda, Rami Puzis, Guy Shani, Bracha Shapira, Noam Tractinsky:
Prioritizing vulnerability patches in large networks. Expert Syst. Appl. 193: 116467 (2022) - [j31]Maor Reuben, Aviad Elyashar, Rami Puzis:
Iterative query selection for opaque search engines with pseudo relevance feedback. Expert Syst. Appl. 201: 117027 (2022) - [j30]Adir Solomon, Michael Michaelshvili, Ron Bitton, Bracha Shapira, Lior Rokach, Rami Puzis, Asaf Shabtai:
Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowl. Based Syst. 246: 108709 (2022) - [c53]Rami Puzis:
Can One Hear the Position of Nodes? COMPLEX NETWORKS (2) 2022: 649-660 - [c52]Aviad Elyashar, Jorge Bendahan, Rami Puzis:
Detecting Clickbait in Online Social Media: You Won't Believe How We Did It. CSCML 2022: 377-387 - [d2]Liad Dekel, Polina Zilberman, Rami Puzis, Uriel Dardik, Aviad Elitzur:
Attack DB OTX-XFORCE-VT. IEEE DataPort, 2022 - [d1]David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis:
MulVAL Interaction Rules Mapped to MITRE ATT&CK. IEEE DataPort, 2022 - [i30]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. CoRR abs/2204.02057 (2022) - [i29]David Tayouri, Nick Baum, Asaf Shabtai, Rami Puzis:
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage. CoRR abs/2208.05750 (2022) - [i28]Rami Puzis:
Can one hear the position of nodes? CoRR abs/2211.06325 (2022) - [i27]Moti Cohen, Lior Rokach, Rami Puzis:
Cross Version Defect Prediction with Class Dependency Embeddings. CoRR abs/2212.14404 (2022) - 2021
- [j29]Tatiana Frenklach, Dvir Cohen, Asaf Shabtai, Rami Puzis:
Android malware detection via an app similarity graph. Comput. Secur. 109: 102386 (2021) - [j28]Ofir Landau, Rami Puzis, Nir Nissim:
Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security in Cyber Space. ACM Comput. Surv. 53(1): 17:1-17:38 (2021) - [j27]Adi Farshteindiker, Rami Puzis:
Leadership Hijacking in Docker Swarm and Its Consequences. Entropy 23(7): 914 (2021) - [j26]Aviad Elyashar, Rami Puzis, Michael Fire:
How does that name sound? Name representation learning using accent-specific speech generation. Knowl. Based Syst. 227: 107229 (2021) - [j25]Sharon Guerstein, Victoria Romeo-Aznar, Ma'ayan Dekel, Oren Miron, Nadav Davidovitch, Rami Puzis, Shai Pilosof:
The interplay between vaccination and social distancing strategies affects COVID19 population-level outcomes. PLoS Comput. Biol. 17(8) (2021) - [j24]Elad Rapaport, Ingmar Poese, Polina Zilberman, Oliver Holschke, Rami Puzis:
Spillover Today? Predicting Traffic Overflows on Private Peering of Major Content Providers. IEEE Trans. Netw. Serv. Manag. 18(4): 4169-4182 (2021) - [c51]Liav Bachar, Aviad Elyashar, Rami Puzis:
Learning Centrality by Learning to Route. COMPLEX NETWORKS 2021: 247-259 - [c50]Assaf Wagner, Rami Puzis:
Lawful Interception in WebRTC Peer-To-Peer Communication. CSCML 2021: 153-170 - 2020
- [j23]Bronislav Sidik, Rami Puzis, Polina Zilberman, Yuval Elovici:
PALE: Time Bounded Practical Agile Leader Election. IEEE Trans. Parallel Distributed Syst. 31(2): 470-485 (2020) - [c49]Ron Bitton, Kobi Boymgold, Rami Puzis, Asaf Shabtai:
Evaluating the Information Security Awareness of Smartphone Users. CHI 2020: 1-13 - [c48]Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:
Security Ranking of IoT Devices Using an AHP Model. CSCML 2020: 29-44 - [c47]Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. ESORICS (1) 2020: 88-109 - [c46]Aviad Elyashar, Sagi Uziel, Abigail Paradise, Rami Puzis:
The Chameleon Attack: Manipulating Content Display in Online Social Media. WWW 2020: 848-859 - [i26]Aviad Elyashar, Sagi Uziel, Abigail Paradise, Rami Puzis:
The Chameleon Attack: Manipulating Content Display in Online Social Media. CoRR abs/2001.05668 (2020) - [i25]Sigal Shaked, Amos Zamir, Roman Vainshtein, Moshe Unger, Lior Rokach, Rami Puzis, Bracha Shapira:
Sequence Preserving Network Traffic Generation. CoRR abs/2002.09832 (2020) - [i24]Sunders Bruskin, Polina Zilberman, Rami Puzis, Shay Shwarz:
SoK: A Survey of Open Source Threat Emulators. CoRR abs/2003.01518 (2020) - [i23]Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai:
DANTE: A framework for mining and monitoring darknet traffic. CoRR abs/2003.02575 (2020) - [i22]Rami Puzis, Polina Zilberman, Yuval Elovici:
ATHAFI: Agile Threat Hunting And Forensic Investigation. CoRR abs/2003.03663 (2020) - [i21]Aviad Elyashar, Rami Puzis, Michael Fire:
How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning. CoRR abs/2005.11838 (2020) - [i20]Elad Rapaport, Ingmar Poese, Polina Zilberman, Oliver Holschke, Rami Puzis:
Predicting traffic overflows on private peering. CoRR abs/2010.01380 (2020) - [i19]Dor Farbiash, Rami Puzis:
Cyberbiosecurity: DNA Injection Attack in Synthetic Biology. CoRR abs/2011.14224 (2020) - [i18]Aviad Elyashar, Maor Reuben, Rami Puzis:
Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback. CoRR abs/2012.12498 (2020)
2010 – 2019
- 2019
- [j22]David Toubiana, Rami Puzis, Avi Sadka, Eduardo Blumwald:
A Genetic Algorithm to Optimize Weighted Gene Co-Expression Network Analysis. J. Comput. Biol. 26(12): 1349-1366 (2019) - [j21]Mordechai Guri, Rami Puzis, Kim-Kwang Raymond Choo, Sergey Rubinshtein, Gabi Kedma, Yuval Elovici:
Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145 (2019) - [j20]Rami Puzis, Liron Samama-Kachko, Barak Hagbi, Roni Stern, Ariel Felner:
Target oriented network intelligence collection: effective exploration of social networks. World Wide Web 22(4): 1447-1480 (2019) - [c45]Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba:
Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities. CSCML 2019: 178-197 - [c44]Reuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis, Ariel Felner:
New Goal Recognition Algorithms Using Attack Graphs. CSCML 2019: 260-278 - [c43]Aviad Elitzur, Rami Puzis, Polina Zilberman:
Attack Hypothesis Generation. EISIC 2019: 40-47 - [c42]Elad Rapaport, Oren Shriki, Rami Puzis:
EEGNAS: Neural Architecture Search for Electroencephalography Data Analysis and Decoding. HBAI@IJCAI 2019: 3-20 - [c41]Lior Perry, Bracha Shapira, Rami Puzis:
NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports. ISI 2019: 80-85 - [c40]Noga Agmon, Asaf Shabtai, Rami Puzis:
Deployment optimization of IoT devices through attack graph analysis. WiSec 2019: 192-202 - [i17]Rami Puzis, Hadar Polad, Bracha Shapira:
Attack Graph Obfuscation. CoRR abs/1903.02601 (2019) - [i16]Noga Agmon, Asaf Shabtai, Rami Puzis:
Deployment Optimization of IoT Devices through Attack Graph Analysis. CoRR abs/1904.05853 (2019) - [i15]Ron Bitton, Kobi Boymgold, Rami Puzis, Asaf Shabtai:
Evaluating the Information Security Awareness of Smartphone Users. CoRR abs/1906.10229 (2019) - [i14]Yael Mathov, Noga Agmon, Asaf Shabtai, Rami Puzis, Nils Ole Tippenhauer, Yuval Elovici:
Challenges for Security Assessment of Enterprises in the IoT Era. CoRR abs/1906.10922 (2019) - [i13]Aviad Elyashar, Rami Puzis, Michael Fire:
It Runs in the Family: Searching for Similar Names using Digitized Family Trees. CoRR abs/1912.04003 (2019) - 2018
- [j19]Ron Bitton, Andrey Finkelshtein, Lior Sidi, Rami Puzis, Lior Rokach, Asaf Shabtai:
Taxonomy of mobile users' security awareness. Comput. Secur. 73: 266-293 (2018) - [j18]Adi Stein, Yair Yotam, Rami Puzis, Guy Shani, Meirav Taieb-Maimon:
EEG-triggered dynamic difficulty adjustment for multiplayer games. Entertain. Comput. 25: 14-25 (2018) - [j17]Edita Grolman, Andrey Finkelshtein, Rami Puzis, Asaf Shabtai, Gershon Celniker, Ziv Katzir, Liron Rosenfeld:
Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis. IEEE Intell. Syst. 33(2): 40-53 (2018) - [c39]Abigail Paradise, Dvir Cohen, Asaf Shabtai, Rami Puzis:
ProfileGen: Generation of Automatic and Realistic Artificial Profiles. ASONAM 2018: 581-583 - [c38]Tom Gonda, Tal Pascal, Rami Puzis, Guy Shani, Bracha Shapira:
Analysis of Attack Graph Representations for Ranking Vulnerability Fixes. GCAI 2018: 215-228 - [c37]Mayank Agarwal, Rami Puzis, Jawad Haj-Yahya, Polina Zilberman, Yuval Elovici:
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic. SEC 2018: 216-230 - [c36]Ilia Leybovich, Rami Puzis, Roni Stern, Maor Reuben:
Focused SANA: Speeding Up Network Alignment. SOCS 2018: 168-172 - [r2]Abigail Paradise, Rami Puzis, Asaf Shabtai:
Socialbots. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [r1]Elina Yaakobovich, Rami Puzis, Yuval Elovici:
Incentives in Collaborative Applications. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - [i12]Bronislav Sidik, Rami Puzis, Polina Zilberman, Yuval Elovici:
PALE: Partially Asynchronous Agile Leader Election. CoRR abs/1801.03734 (2018) - [i11]Abigail Paradise, Dvir Cohen, Asaf Shabtai, Rami Puzis:
Generation of Automatic and Realistic Artificial Profiles. CoRR abs/1807.00125 (2018) - 2017
- [j16]Shlomi Maliah, Rami Puzis, Guy Shani:
Shortest path tree sampling for landmark selection in large networks. J. Complex Networks 5(5): 795-815 (2017) - [j15]Abigail Paradise, Asaf Shabtai, Rami Puzis, Aviad Elyashar, Yuval Elovici, Mehran Roshandel, Christoph Peylo:
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. IEEE Trans. Comput. Soc. Syst. 4(3): 65-79 (2017) - [j14]Polina Zilberman, Rami Puzis, Yuval Elovici:
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers. IEEE Trans. Dependable Secur. Comput. 14(5): 521-534 (2017) - [c35]Aviad Elyashar, Jorge Bendahan, Rami Puzis, Maria-Amparo Sanmateu:
Measurement of Online Discussion Authenticity within Online Social Media. ASONAM 2017: 627-629 - [c34]Tom Gonda, Rami Puzis, Bracha Shapira:
Scalable Attack Path Finding for Increased Security. CSCML 2017: 234-249 - [c33]Hadar Polad, Rami Puzis, Bracha Shapira:
Attack Graph Obfuscation. CSCML 2017: 269-287 - [c32]Tomer Gluck, Rami Puzis, Yossi Oren, Asaf Shabtai:
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case. EuroS&P Workshops 2017: 99-103 - [c31]Tal Hadad, Rami Puzis, Bronislav Sidik, Nir Ofek, Lior Rokach:
Application Marketplace Malware Detection by User Feedback Analysis. ICISSP (Revised Selected Papers) 2017: 1-19 - [c30]Tal Hadad, Bronislav Sidik, Nir Ofek, Rami Puzis, Lior Rokach:
User Feedback Analysis for Mobile Malware Detection. ICISSP 2017: 83-94 - [c29]Luiza Nacshon, Rami Puzis, Polina Zilberman:
DiscOF: Balanced flow discovery in OpenFlow. NFV-SDN 2017: 1-6 - [i10]Andrey Finkelstein, Ron Biton, Rami Puzis, Asaf Shabtai:
Classification of Smartphone Users Using Internet Traffic. CoRR abs/1701.00220 (2017) - [i9]Ori Ossmy, Ofir Tam, Rami Puzis, Lior Rokach, Ohad Inbar, Yuval Elovici:
MindDesktop: a general purpose brain computer interface. CoRR abs/1705.07490 (2017) - [i8]Aviad Elyashar, Jorge Bendahan, Rami Puzis:
Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media. CoRR abs/1708.02763 (2017) - [i7]Aviad Elyashar, Jorge Bendahan, Rami Puzis:
Detecting Clickbait in Online Social Media: You Won't Believe How We Did It. CoRR abs/1710.06699 (2017) - 2016
- [j13]Rami Puzis, Dov Shirtz, Yuval Elovici:
A particle swarm model for estimating reliability and scheduling system maintenance. Enterp. Inf. Syst. 10(4): 349-377 (2016) - [j12]Shlomi Dolev, Jonathan Goldfeld, Rami Puzis, Muni Venkateswarlu K.:
Efficient online detection of temporal patterns. PeerJ Comput. Sci. 2: e53 (2016) - [c28]Sukrit Gupta, Rami Puzis, Konstantin Kilimnik:
Comparative Network Analysis Using KronFit. CompleNet 2016: 363-375 - [c27]Andrey Finkelshtein, Rami Puzis, Asaf Shabtai, Bronislav Sidik:
Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic. SBP-BRiMS 2016: 239-249 - [c26]Sergey Rubinshtein, Rami Puzis:
Modeling and Reconstruction of Multi-stage Attacks. SwSTE 2016: 135-137 - [i6]Ben Feher, Lior Sidi, Asaf Shabtai, Rami Puzis:
The Security of WebRTC. CoRR abs/1601.00184 (2016) - [i5]Luiza Nacshon, Rami Puzis, Polina Zilberman:
Floware: Balanced Flow Monitoring in Software Defined Networks. CoRR abs/1608.03307 (2016) - [i4]Luiza Nacshon, Rami Puzis, Amparo Sanmateho:
Pinpoint Influential Posts and Authors. CoRR abs/1609.02945 (2016) - 2015
- [j11]Rami Puzis, Yuval Elovici, Polina Zilberman, Shlomi Dolev, Ulrik Brandes:
Topology manipulations for speeding betweenness centrality computation. J. Complex Networks 3(1): 84-112 (2015) - [c25]Yasmin Bokobza, Abigail Paradise, Guy Rapaport, Rami Puzis, Bracha Shapira, Asaf Shabtai:
Leak Sinks: The Threat of Targeted Social Eavesdropping. ASONAM 2015: 375-382 - [c24]Abigail Paradise, Asaf Shabtai, Rami Puzis:
Hunting Organization-Targeted Socialbots. ASONAM 2015: 537-540 - [c23]Roni Stern, Scott Kiesel, Rami Puzis, Ariel Felner, Wheeler Ruml:
Max Is More than Min: Solving Maximization Problems with Heuristic Search. IJCAI 2015: 4324-4330 - [c22]Alon Palombo, Roni Stern, Rami Puzis, Ariel Felner, Scott Kiesel, Wheeler Ruml:
Solving the Snake in the Box Problem with Heuristic Search: First Results. SOCS 2015: 96-104 - [c21]Zahy Bnaya, Alon Palombo, Rami Puzis, Ariel Felner:
Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search. SOCS 2015: 156-160 - [p2]Rami Puzis, Yuval Elovici:
Active Discovery of Hidden Profiles in Social Networks Using Malware. Cyber Warfare 2015: 221-235 - 2014
- [j10]Roni Stern, Ariel Felner, Jur van den Berg, Rami Puzis, Rajat Shah, Ken Goldberg:
Potential-based bounded-cost search and Anytime Non-Parametric A*. Artif. Intell. 214: 1-25 (2014) - [j9]Abigail Paradise, Rami Puzis, Asaf Shabtai:
Anti-Reconnaissance Tools: Detecting Targeted Socialbots. IEEE Internet Comput. 18(5): 11-19 (2014) - [c20]Liron Samama-Kachko, Rami Puzis, Roni Stern, Ariel Felner:
Extended Framework for Target Oriented Network Intelligence Collection. SOCS 2014: 131-138 - [c19]Roni Tzvi Stern, Scott Kiesel, Rami Puzis, Ariel Felner, Wheeler Ruml:
Max is More than Min: Solving Maximization Problems with Heuristic Search. SOCS 2014: 148-156 - 2013
- [j8]Rami Puzis, Yaniv Altshuler, Yuval Elovici, Shlomo Bekhor, Yoram Shiftan, Alex Pentland:
Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks. J. Intell. Transp. Syst. 17(1): 91-105 (2013) - [j7]Rami Puzis, Manish Purohit, V. S. Subrahmanian:
Betweenness computation in the single graph representation of hypergraphs. Soc. Networks 35(4): 561-572 (2013) - [j6]Michael Fire, Lena Tenenboim-Chekina, Rami Puzis, Ofrit Lesser, Lior Rokach, Yuval Elovici:
Computationally efficient link prediction in a variety of social networks. ACM Trans. Intell. Syst. Technol. 5(1): 10:1-10:25 (2013) - [c18]Zahy Bnaya, Rami Puzis, Roni Stern, Ariel Felner:
Volatile Multi-Armed Bandits for Guaranteed Targeted Social Crawling. AAAI (Late-Breaking Developments) 2013 - [c17]Roni Tzvi Stern, Liron Samama, Rami Puzis, Tal Beja, Zahy Bnaya, Ariel Felner:
TONIC: Target Oriented Network Intelligence Collection for the Social Web. AAAI 2013: 1184-1190 - [c16]Zahy Bnaya, Rami Puzis, Roni Stern, Ariel Felner:
Bandit Algorithms for Social Network Queries. SocialCom 2013: 148-153 - [c15]Yury Puzis, Yevgen Borodin, Rami Puzis, I. V. Ramakrishnan:
Predictive web automation assistant for people with vision impairments. WWW 2013: 1031-1040 - [i3]Michael Fire, Rami Puzis, Yuval Elovici:
Organization Mining Using Online Social Networks. CoRR abs/1303.3741 (2013) - 2012
- [c14]Eitan Menahem, Rami Puzis, Yuval Elovici:
Detecting Spammers via Aggregated Historical Data Set. NSS 2012: 248-262 - [c13]Rami Puzis, Polina Zilberman, Yuval Elovici, Shlomi Dolev, Ulrik Brandes:
Heuristics for Speeding Up Betweenness Centrality Computation. SocialCom/PASSAT 2012: 302-311 - [i2]Eitan Menahem, Rami Puzis:
Detecting Spammers via Aggregated Historical Data Set. CoRR abs/1205.1357 (2012) - 2011
- [j5]Rami Puzis, Meytal Tubi, Yuval Elovici, Chanan Glezer, Shlomi Dolev:
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks. ACM Trans. Model. Comput. Simul. 22(1): 5:1-5:26 (2011) - [c12]Roni Tzvi Stern, Rami Puzis, Ariel Felner:
Potential Search: A Bounded-Cost Search Algorithm. ICAPS 2011 - [c11]Talya Porat, Inbal Rief, Rami Puzis, Yuval Elovici:
LoOkie - it feels like being there. CHI Extended Abstracts 2011: 1873-1878 - [c10]Shlomi Dolev, Jonathan Goldfeld, Rami Puzis:
On-Line Detection and Prediction of Temporal Patterns. Haifa Verification Conference 2011: 254-256 - [c9]Ori Ossmy, Ofir Tam, Rami Puzis, Lior Rokach, Ohad Inbar, Yuval Elovici:
MindDesktop - Computer Accessibility for Severely Handicapped. ICEIS (4) 2011: 316-320 - [c8]Michael Fire, Lena Tenenboim, Ofrit Lesser, Rami Puzis, Lior Rokach, Yuval Elovici:
Link Prediction in Social Networks Using Computationally Efficient Topological Features. SocialCom/PASSAT 2011: 73-80 - 2010
- [j4]Shlomi Dolev, Yuval Elovici, Rami Puzis:
Routing betweenness centrality. J. ACM 57(4): 25:1-25:27 (2010) - [c7]Emily Rozenshine-Kemelmakher, Rami Puzis, Ariel Felner, Yuval Elovici:
Cost Benefit Deployment of DNIPS. ICC 2010: 1-5 - [c6]Eyal Cohen, Shlomi Dolev, Sergey Frenkel, Rami Puzis, Michael Rosenblit:
Nanotechnology Based Optical Solution for NP-Hard Problems. OSC 2010: 86-99 - [c5]Roni Tzvi Stern, Rami Puzis, Ariel Felner:
Potential Search: A New Greedy Anytime Heuristic Search. SOCS 2010: 119-120 - [p1]Rami Puzis, Meytal Tubi, Yuval Elovici:
Optimizing Targeting of Intrusion Detection Systems in Social Networks. Handbook of Social Network Technologies 2010: 549-568
2000 – 2009
- 2009
- [j3]Rami Puzis, Dana Yagil, Yuval Elovici, Dan Braha:
Collaborative attack on Internet users' anonymity. Internet Res. 19(1): 60-77 (2009) - [j2]Shlomi Dolev, Yuval Elovici, Rami Puzis, Polina Zilberman:
Incremental deployment of network monitors based on Group Betweenness Centrality. Inf. Process. Lett. 109(20): 1172-1176 (2009) - [c4]Erez Shmueli, Alexander Kruglov, Rami Puzis, Yuval Elovici, Roman Englert, Chanan Glezer:
An Attentive Digital Signage System. MuC (Workshopband) 2009: 10-15 - [i1]Shlomi Dolev, Yuval Elovici, Rami Puzis, Polina Zilberman:
Incremental Deployment of Network Monitors Based on Group Betweenness Centrality. CoRR abs/0904.0352 (2009) - 2008
- [c3]Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev:
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. EuroISI 2008: 191-203 - 2007
- [j1]Rami Puzis, Yuval Elovici, Shlomi Dolev:
Finding the most prominent group in complex networks. AI Commun. 20(4): 287-296 (2007) - [c2]Meytal Tubi, Rami Puzis, Yuval Elovici:
Deployment of DNIDS in Social Networks. ISI 2007: 59-65 - [c1]Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici:
Simulating Threats Propagation within the NSP Infrastructure. ISI 2007: 380
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint