D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 46 Citations 8,587 165 World Ranking 4404 National Ranking 79

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

His scientific interests lie mostly in Computer security, Firewall, Application firewall, Distributed computing and Computer network. In general Computer security study, his work on Smart card, Physical access and Cryptographic protocol often relates to the realm of Orthogonality, thereby connecting several areas of interest. His studies deal with areas such as Network topology and Network security as well as Firewall.

His work deals with themes such as Security policy, DMZ and Intranet, which intersect with Application firewall. Avishai Wool has researched Distributed computing in several fields, including Consistency, Intersection and Row. Avishai Wool combines subjects such as The Internet and Cryptography with his study of Computer network.

His most cited work include:

  • A quantitative study of firewall configuration errors (359 citations)
  • Fang: a firewall analysis engine (266 citations)
  • Firmato: a novel firewall management toolkit (180 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Computer network, Algorithm, Encryption and Cryptography are his primary areas of study. His work in the fields of Computer security, such as Firewall and Smart card, overlaps with other areas such as Electronic voting. His Firewall study incorporates themes from Network security and Network packet.

He usually deals with Computer network and limits it to topics linked to The Internet and Distributed computing and Cluster analysis. His Algorithm study integrates concerns from other disciplines, such as Key and Theoretical computer science. His work on Broadcast encryption and Key management as part of general Encryption research is often related to Service provider, thus linking different fields of science.

He most often published in these fields:

  • Computer security (26.16%)
  • Computer network (21.51%)
  • Algorithm (16.28%)

What were the highlights of his more recent work (between 2014-2021)?

  • Algorithm (16.28%)
  • Anomaly detection (6.40%)
  • Real-time computing (9.30%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Algorithm, Anomaly detection, Real-time computing, Computer security and Programmable logic controller. His Algorithm research incorporates themes from Ciphertext and Key. As part of one scientific family, Avishai Wool deals mainly with the area of Anomaly detection, narrowing it down to issues related to the SCADA, and often Modbus, Artificial intelligence and Pattern recognition.

His work carried out in the field of Real-time computing brings together such families of science as Classifier, Spoofing attack and Robustness. Avishai Wool studies Cryptography, a branch of Computer security. He focuses mostly in the field of Programmable logic controller, narrowing it down to topics relating to Deterministic finite automaton and, in certain cases, Markov chain, Scheduling, Asynchronous communication, Intrusion detection system and Multiplexing.

Between 2014 and 2021, his most popular works were:

  • Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems (60 citations)
  • Field classification, modeling and anomaly detection in unknown CAN bus networks ☆ (51 citations)
  • Implementing public-key cryptography on passive RFID tags is practical (31 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • The Internet

Avishai Wool mostly deals with Real-time computing, Anomaly detection, Computer security, Cryptography and Programmable logic controller. His research integrates issues of Orthogonal frequency-division multiplexing, MIMO, MIMO-OFDM, Computer network and Channel state information in his study of Real-time computing. His Anomaly detection research is multidisciplinary, incorporating elements of Classifier, SCADA, Modbus and CAN bus.

Avishai Wool regularly links together related areas like Sequence in his Computer security studies. His studies in Cryptography integrate themes in fields like Embedded software, Gate count, Embedded system, Symmetric-key algorithm and Encryption. The study incorporates disciplines such as Deterministic finite automaton, Scheduling, Asynchronous communication, Algorithm and Multiplexing in addition to Programmable logic controller.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A quantitative study of firewall configuration errors

A. Wool.
IEEE Computer (2004)

580 Citations

Fang: a firewall analysis engine

A. Mayer;A. Wool;E. Ziskind.
ieee symposium on security and privacy (2000)

404 Citations

Firmato: a novel firewall management toolkit

Y. Bartal;A. Mayer;K. Nissim;A. Wool.
ieee symposium on security and privacy (1999)

371 Citations

Picking Virtual Pockets using Relay Attacks on Contactless Smartcard

Z. Kfir;A. Wool.
international workshop on security (2005)

345 Citations

Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems

Niv Goldenberg;Avishai Wool.
International Journal of Critical Infrastructure Protection (2013)

326 Citations

The Load, Capacity, and Availability of Quorum Systems

Moni Naor;Avishai Wool.
SIAM Journal on Computing (1998)

316 Citations

Cracking the Bluetooth PIN

Yaniv Shaked;Avishai Wool.
international conference on mobile systems, applications, and services (2005)

301 Citations

Probabilistic Quorum Systems

Dahlia Malkhi;Michael K Reiter;Avishai Wool;Rebecca N Wright.
Information & Computation (2001)

290 Citations

Computational Experience with Approximation Algorithms for the Set Covering Problem

T. Grossman;A. Wool.
European Journal of Operational Research (1994)

226 Citations

Firmato: A novel firewall management toolkit

Yair Bartal;Alain Mayer;Kobbi Nissim;Avishai Wool.
ACM Transactions on Computer Systems (2004)

224 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Avishai Wool

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 40

Ehab Al-Shaer

Ehab Al-Shaer

Carnegie Mellon University

Publications: 33

Brant L. Candelore

Brant L. Candelore

Sony (Japan)

Publications: 33

Alex X. Liu

Alex X. Liu

Michigan State University

Publications: 26

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 23

Dahlia Malkhi

Dahlia Malkhi

Diem Association

Publications: 22

Mohamed G. Gouda

Mohamed G. Gouda

The University of Texas at Austin

Publications: 20

Yingying Chen

Yingying Chen

Rutgers, The State University of New Jersey

Publications: 16

Gregory R. Ganger

Gregory R. Ganger

Carnegie Mellon University

Publications: 16

Amos Beimel

Amos Beimel

Ben-Gurion University of the Negev

Publications: 15

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 14

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 14

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 14

Gerhard P. Hancke

Gerhard P. Hancke

University of Pretoria

Publications: 13

Frédéric Cuppens

Frédéric Cuppens

Polytechnique Montréal

Publications: 13

Georg Carle

Georg Carle

Technical University of Munich

Publications: 13

Trending Scientists

Saverio Mascolo

Saverio Mascolo

Polytechnic University of Bari

Frank K. Hwang

Frank K. Hwang

National Yang Ming Chiao Tung University

Etsuo Niki

Etsuo Niki

University of Tokyo

Benu Adhikari

Benu Adhikari

RMIT University

Amir A. Zadpoor

Amir A. Zadpoor

Delft University of Technology

Yihe Zhang

Yihe Zhang

China University of Geosciences

Manolo Gouy

Manolo Gouy

Claude Bernard University Lyon 1

Jonathan F. Wendel

Jonathan F. Wendel

Iowa State University

John R. Benemann

John R. Benemann

University of California, Berkeley

Klaus Peter Hofmann

Klaus Peter Hofmann

Charité - University Medicine Berlin

Michael Petrides

Michael Petrides

Montreal Neurological Institute and Hospital

Eduardo Soriano

Eduardo Soriano

University of Barcelona

J. Eric Ahlskog

J. Eric Ahlskog

Mayo Clinic

Luigi Terracciano

Luigi Terracciano

University Hospital of Basel

Kenneth Cusi

Kenneth Cusi

University of Florida

Mary Shaw

Mary Shaw

University of Bristol

Something went wrong. Please try again later.