The scientist’s investigation covers issues in Artificial intelligence, Machine learning, Data mining, Malware and Computer security. His Classifier study, which is part of a larger body of work in Artificial intelligence, is frequently linked to Static program analysis, bridging the gap between disciplines. Yuval Elovici works mostly in the field of Machine learning, limiting it down to concerns involving Host and, occasionally, Network intrusion detection, Channel network, Local area network, Feature extraction and False positive rate.
The various areas that Yuval Elovici examines in his Data mining study include Active learning, Process, Statistical classification, Task and Data set. His work deals with themes such as Android, Anomaly detection, Mobile device and Behavioral pattern, which intersect with Malware. His Computer security research incorporates elements of Software, Identity, The Internet and Internet privacy.
Computer security, Artificial intelligence, Malware, Data mining and Machine learning are his primary areas of study. Yuval Elovici combines subjects such as Anomaly detection, The Internet, World Wide Web, Botnet and Internet privacy with his study of Computer security. Much of his study explores Artificial intelligence relationship to Pattern recognition.
The Malware study which covers Mobile device that intersects with Mobile computing. His Data mining study frequently draws connections between adjacent fields such as Statistical classification. His Machine learning study integrates concerns from other disciplines, such as Computer worm and Robustness.
His primary areas of study are Computer security, Artificial intelligence, Malware, Machine learning and Computer network. His study in the fields of Attack surface under the domain of Computer security overlaps with other disciplines such as Drone. As a part of the same scientific study, Yuval Elovici usually deals with the Artificial intelligence, concentrating on Pattern recognition and frequently concerns with Detector.
His work in Malware addresses issues such as Covert channel, which are connected to fields such as Password and Electrical engineering. His Network security and Server study in the realm of Computer network connects with subjects such as Digital watermarking. His Deep learning research includes themes of Convolutional neural network, Data mining and Authentication.
Yuval Elovici mostly deals with Artificial intelligence, Malware, Computer security, Machine learning and Anomaly detection. In Artificial intelligence, Yuval Elovici works on issues like Pattern recognition, which are connected to Biometrics. His Malware study combines topics from a wide range of disciplines, such as Air gap, Software, Cloud computing and Executable.
Computer security and Life-critical system are frequently intertwined in his study. His research integrates issues of Adversarial system, Internet access and Robustness in his study of Machine learning. His work carried out in the field of Anomaly detection brings together such families of science as False positive paradox, Autoencoder, Pipeline, Blockchain and Botnet.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Andromaly: a behavioral malware detection framework for android devices
Asaf Shabtai;Uri Kanonov;Yuval Elovici;Chanan Glezer.
intelligent information systems (2012)
Endoscopic device comprising linear staplers and a video camera on its distal end
Elazar Sonnenschein;Amir Govrin;Yoav Avidor;Yuval Elovici.
(2007)
N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
Yair Meidan;Michael Bohadana;Yael Mathov;Yisroel Mirsky.
IEEE Pervasive Computing (2018)
Google Android: A Comprehensive Security Assessment
A. Shabtai;Y. Fledel;U. Kanonov;Y. Elovici.
ieee symposium on security and privacy (2010)
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
Yisroel Mirsky;Tomer Doitshman;Yuval Elovici;Asaf Shabtai.
network and distributed system security symposium (2018)
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
Asaf Shabtai;Robert Moskovitch;Yuval Elovici;Chanan Glezer.
Information Security Technical Report (2009)
Online Social Networks: Threats and Solutions
Michael Fire;Roy Goldschmidt;Yuval Elovici.
IEEE Communications Surveys and Tutorials (2014)
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis
Yair Meidan;Michael Bohadana;Asaf Shabtai;Juan David Guarnizo.
symposium on applied computing (2017)
Securing Android-Powered Mobile Devices Using SELinux
Asaf Shabtai;Yuval Fledel;Yuval Elovici.
ieee symposium on security and privacy (2010)
Detecting unknown malicious code by applying classification techniques on OpCode patterns
Asaf Shabtai;Robert Moskovitch;Clint Feher;Shlomi Dolev.
Security Informatics (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Ben-Gurion University of the Negev
Ben-Gurion University of the Negev
Ben-Gurion University of the Negev
Ben-Gurion University of the Negev
Ben-Gurion University of the Negev
MIT
University of South Florida
Singapore University of Technology and Design
Weizmann Institute of Science
Northeastern University
University of Electronic Science and Technology of China
City College of New York
Academia Sinica
Hasselt University
Seoul National University
Sapporo Medical University
Geophysical Fluid Dynamics Laboratory
National Oceanic and Atmospheric Administration
Hanyang University
University of Otago
Pfizer (United States)
Pennsylvania State University
Institute Curie
Vanderbilt University
University of New England
London School of Economics and Political Science