The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Aviad Cohen" ( http://dblp.L3S.de/Authors/Aviad_Cohen )

  Author page on DBLP  Author page in RDF  Community of Aviad Cohen in ASPL-2

Publication years (Num. hits)
1989-2018 (17)
Publication types (Num. hits)
article(9) inproceedings(8)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7 occurrences of 7 keywords

Results
Found 18 publication records. Showing 17 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nir Nissim, Yuval Lapidot, Aviad Cohen, Yuval Elovici Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining. Search on Bibsonomy Knowl.-Based Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aviad Cohen, Nir Nissim Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aviad Cohen, Nir Nissim, Yuval Elovici Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nir Nissim, Aviad Cohen, Yuval Elovici ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nir Nissim, Aviad Cohen, Jian Wu 0006, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles Scholarly Digital Libraries as a Platform for Malware Distribution. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aviad Cohen, Nir Nissim, Lior Rokach, Yuval Elovici SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shai Shalev-Shwartz, Nir Ben-Zrihem, Aviad Cohen, Amnon Shashua Long-term Planning by Short-term Prediction. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren Bar-Ad, Yuval Elovici Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework. Search on Bibsonomy Security Informatics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nir Nissim, Aviad Cohen, Chanan Glezer, Yuval Elovici Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. Search on Bibsonomy Computers & Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yisroel Mirsky, Aviad Cohen, Roni Stern, Ariel Felner, Lior Rokach, Yuval Elovici, Bracha Shapira Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains. Search on Bibsonomy SOCS The full citation details ... 2015 DBLP  BibTeX  RDF
1Nir Nissim, Aviad Cohen, Yuval Elovici Boosting the Detection of Malicious Documents Using Designated Active Learning Methods. Search on Bibsonomy ICMLA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aviad Cohen, Lev Finkelstein, Avi Mendelson, Ronny Ronen, Dmitry Rudoy On Estimating Optimal Performance of CPU Dynamic Thermal Management. Search on Bibsonomy Computer Architecture Letters The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DVS, optimal control, DTM
1Aviad Cohen, Yuri Rabinovich, Assaf Schuster, Hadas Shachnai Optimal Bounds on Tail Probabilities - A Simplified Approach. Search on Bibsonomy IPPS/SPDP Workshops The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Yosi Ben-Asher, Aviad Cohen, Assaf Schuster Low Crosstalk Address Encodings for Optical Message Switching Systems.. Search on Bibsonomy IPPS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Yosi Ben-Asher, Aviad Cohen, Assaf Schuster, Jop F. Sibeyn The Impact of Task-Length Parameters on the Performance of the Random Load-Balancing Algorithm. Search on Bibsonomy IPPS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Aviad Cohen, Avi Wigderson Dispersers, Deterministic Amplification, and Weak Random Sources (Extended Abstract) Search on Bibsonomy FOCS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF weak bit fixing sources, RP algorithm, BPP algorithm, deterministic amplification, bipartite multigraphs, probabilistic algorithms, dispersers, error probability, weak random sources
Displaying result #1 - #17 of 17 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license