His scientific interests lie mostly in Computer security, Firewall, Application firewall, Distributed computing and Computer network. In general Computer security study, his work on Smart card, Physical access and Cryptographic protocol often relates to the realm of Orthogonality, thereby connecting several areas of interest. His studies deal with areas such as Network topology and Network security as well as Firewall.
His work deals with themes such as Security policy, DMZ and Intranet, which intersect with Application firewall. Avishai Wool has researched Distributed computing in several fields, including Consistency, Intersection and Row. Avishai Wool combines subjects such as The Internet and Cryptography with his study of Computer network.
Computer security, Computer network, Algorithm, Encryption and Cryptography are his primary areas of study. His work in the fields of Computer security, such as Firewall and Smart card, overlaps with other areas such as Electronic voting. His Firewall study incorporates themes from Network security and Network packet.
He usually deals with Computer network and limits it to topics linked to The Internet and Distributed computing and Cluster analysis. His Algorithm study integrates concerns from other disciplines, such as Key and Theoretical computer science. His work on Broadcast encryption and Key management as part of general Encryption research is often related to Service provider, thus linking different fields of science.
His primary scientific interests are in Algorithm, Anomaly detection, Real-time computing, Computer security and Programmable logic controller. His Algorithm research incorporates themes from Ciphertext and Key. As part of one scientific family, Avishai Wool deals mainly with the area of Anomaly detection, narrowing it down to issues related to the SCADA, and often Modbus, Artificial intelligence and Pattern recognition.
His work carried out in the field of Real-time computing brings together such families of science as Classifier, Spoofing attack and Robustness. Avishai Wool studies Cryptography, a branch of Computer security. He focuses mostly in the field of Programmable logic controller, narrowing it down to topics relating to Deterministic finite automaton and, in certain cases, Markov chain, Scheduling, Asynchronous communication, Intrusion detection system and Multiplexing.
Avishai Wool mostly deals with Real-time computing, Anomaly detection, Computer security, Cryptography and Programmable logic controller. His research integrates issues of Orthogonal frequency-division multiplexing, MIMO, MIMO-OFDM, Computer network and Channel state information in his study of Real-time computing. His Anomaly detection research is multidisciplinary, incorporating elements of Classifier, SCADA, Modbus and CAN bus.
Avishai Wool regularly links together related areas like Sequence in his Computer security studies. His studies in Cryptography integrate themes in fields like Embedded software, Gate count, Embedded system, Symmetric-key algorithm and Encryption. The study incorporates disciplines such as Deterministic finite automaton, Scheduling, Asynchronous communication, Algorithm and Multiplexing in addition to Programmable logic controller.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A quantitative study of firewall configuration errors
A. Wool.
IEEE Computer (2004)
Fang: a firewall analysis engine
A. Mayer;A. Wool;E. Ziskind.
ieee symposium on security and privacy (2000)
Firmato: a novel firewall management toolkit
Y. Bartal;A. Mayer;K. Nissim;A. Wool.
ieee symposium on security and privacy (1999)
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
Z. Kfir;A. Wool.
international workshop on security (2005)
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
Niv Goldenberg;Avishai Wool.
International Journal of Critical Infrastructure Protection (2013)
The Load, Capacity, and Availability of Quorum Systems
Moni Naor;Avishai Wool.
SIAM Journal on Computing (1998)
Cracking the Bluetooth PIN
Yaniv Shaked;Avishai Wool.
international conference on mobile systems, applications, and services (2005)
Probabilistic Quorum Systems
Dahlia Malkhi;Michael K Reiter;Avishai Wool;Rebecca N Wright.
Information & Computation (2001)
Computational Experience with Approximation Algorithms for the Set Covering Problem
T. Grossman;A. Wool.
European Journal of Operational Research (1994)
Firmato: A novel firewall management toolkit
Yair Bartal;Alain Mayer;Kobbi Nissim;Avishai Wool.
ACM Transactions on Computer Systems (2004)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Tel Aviv University
Weizmann Institute of Science
Hebrew University of Jerusalem
Weizmann Institute of Science
University of California, Santa Cruz
Diem Association
Duke University
Johns Hopkins University
Rensselaer Polytechnic Institute
Texas A&M University
Polytechnic University of Bari
National Yang Ming Chiao Tung University
University of Tokyo
RMIT University
Delft University of Technology
China University of Geosciences
Claude Bernard University Lyon 1
Iowa State University
University of California, Berkeley
Charité - University Medicine Berlin
Montreal Neurological Institute and Hospital
University of Barcelona
Mayo Clinic
University Hospital of Basel
University of Florida
University of Bristol