Improving malware detection by applying multi-inducer ensemble E Menahem, A Shabtai, L Rokach, Y Elovici Computational Statistics & Data Analysis 53 (4), 1483-1494, 2009 | 216 | 2009 |
Troika–an improved stacking schema for classification tasks E Menahem, L Rokach, Y Elovici Information Sciences 179 (24), 4097-4122, 2009 | 143 | 2009 |
F-sign: Automatic, function-based signature generation for malware A Shabtai, E Menahem, Y Elovici IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 65 | 2010 |
Combining one-class classifiers via meta learning E Menahem, L Rokach, Y Elovici Proceedings of the 22nd ACM international conference on Information …, 2013 | 40 | 2013 |
Stacking schema for classification tasks E Menahem, L Rokach, Y Elovici US Patent 8,244,652, 2012 | 28 | 2012 |
OSPF vulnerability to persistent poisoning attacks: a systematic analysis G Nakibly, A Sosnovich, E Menahem, A Waizel, Y Elovici Proceedings of the 30th Annual Computer security applications Conference …, 2014 | 26 | 2014 |
XML-AD: Detecting anomalous patterns in XML documents E Menahem, A Schclar, L Rokach, Y Elovici Information Sciences 326, 71-88, 2016 | 18* | 2016 |
Visualizing insider threats: An effective interface for security analytics B Haim, E Menahem, Y Wolfsthal, C Meenan Companion Proceedings of the 22nd International Conference on Intelligent …, 2017 | 16 | 2017 |
Owning the Routing Table. Part II G Nakibly, E Menahem, A Waizel, Y Elovici Black Hat, 2013 | 11 | 2013 |
Detecting malicious executable files by performing static analysis on executable files' overlay A Finkelshtein, E Menahem US Patent 10,846,403, 2020 | 10 | 2020 |
Metric anomaly detection via asymmetric risk minimization A Kontorovich, D Hendler, E Menahem Similarity-Based Pattern Recognition: First International Workshop, SIMBAD …, 2011 | 10 | 2011 |
Automated detection of personal information in free text A Finkelshtein, B Haim, E Menahem US Patent 11,429,790, 2022 | 6 | 2022 |
Poster: Detecting malware through temporal function-based features E Menahem, A Shabtai, A Levhar Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 5 | 2013 |
ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks E Menahem, Y Elovici, N Amar, G Nakibly AISEC, 55-66, 2013 | 5 | 2013 |
Network-based intrusion detection systems go active! E Menahem, G Nakibly, Y Elovici Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 4 | 2012 |
Detecting spammers via aggregated historical data set E Menahem, R Pusiz, Y Elovici Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 4 | 2012 |
Challenge generation for verifying users of computing devices A Jarrous, A Shulman-Peleg, E Menahem US Patent 10,082,954, 2018 | 3 | 2018 |
Monte-carlo adversarial autoencoder for multi-source domain adaptation A Puzanov, E Menahem, A Finkelshtein, N Agmon US Patent App. 17/177,234, 2022 | 2 | 2022 |
Owning the Routing Table G Nakibly, E Menahem, A Waizel, Y Elovici Part II. Presentation at Black Hat USA, 2013 | 2 | 2013 |
Degrading the Network’s Quality of Service via Traffic Diversion Attacks E Menahem, G Nakibly, Y Elovici Tech. rep., 12 2012, 0 | 2 | |