D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 66 Citations 15,582 505 World Ranking 1472 National Ranking 30

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Artificial intelligence
  • Computer network

The scientist’s investigation covers issues in Artificial intelligence, Machine learning, Data mining, Malware and Computer security. His Classifier study, which is part of a larger body of work in Artificial intelligence, is frequently linked to Static program analysis, bridging the gap between disciplines. Yuval Elovici works mostly in the field of Machine learning, limiting it down to concerns involving Host and, occasionally, Network intrusion detection, Channel network, Local area network, Feature extraction and False positive rate.

The various areas that Yuval Elovici examines in his Data mining study include Active learning, Process, Statistical classification, Task and Data set. His work deals with themes such as Android, Anomaly detection, Mobile device and Behavioral pattern, which intersect with Malware. His Computer security research incorporates elements of Software, Identity, The Internet and Internet privacy.

His most cited work include:

  • Andromaly: a behavioral malware detection framework for android devices (588 citations)
  • Endoscopic device comprising linear staplers and a video camera on its distal end (458 citations)
  • Google Android: A Comprehensive Security Assessment (335 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Artificial intelligence, Malware, Data mining and Machine learning are his primary areas of study. Yuval Elovici combines subjects such as Anomaly detection, The Internet, World Wide Web, Botnet and Internet privacy with his study of Computer security. Much of his study explores Artificial intelligence relationship to Pattern recognition.

The Malware study which covers Mobile device that intersects with Mobile computing. His Data mining study frequently draws connections between adjacent fields such as Statistical classification. His Machine learning study integrates concerns from other disciplines, such as Computer worm and Robustness.

He most often published in these fields:

  • Computer security (28.76%)
  • Artificial intelligence (21.80%)
  • Malware (17.48%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (28.76%)
  • Artificial intelligence (21.80%)
  • Malware (17.48%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Artificial intelligence, Malware, Machine learning and Computer network. His study in the fields of Attack surface under the domain of Computer security overlaps with other disciplines such as Drone. As a part of the same scientific study, Yuval Elovici usually deals with the Artificial intelligence, concentrating on Pattern recognition and frequently concerns with Detector.

His work in Malware addresses issues such as Covert channel, which are connected to fields such as Password and Electrical engineering. His Network security and Server study in the realm of Computer network connects with subjects such as Digital watermarking. His Deep learning research includes themes of Convolutional neural network, Data mining and Authentication.

Between 2017 and 2021, his most popular works were:

  • N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders (219 citations)
  • Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. (137 citations)
  • N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders (108 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Artificial intelligence
  • Computer network

Yuval Elovici mostly deals with Artificial intelligence, Malware, Computer security, Machine learning and Anomaly detection. In Artificial intelligence, Yuval Elovici works on issues like Pattern recognition, which are connected to Biometrics. His Malware study combines topics from a wide range of disciplines, such as Air gap, Software, Cloud computing and Executable.

Computer security and Life-critical system are frequently intertwined in his study. His research integrates issues of Adversarial system, Internet access and Robustness in his study of Machine learning. His work carried out in the field of Anomaly detection brings together such families of science as False positive paradox, Autoencoder, Pipeline, Blockchain and Botnet.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Andromaly: a behavioral malware detection framework for android devices

Asaf Shabtai;Uri Kanonov;Yuval Elovici;Chanan Glezer.
intelligent information systems (2012)

918 Citations

Endoscopic device comprising linear staplers and a video camera on its distal end

Elazar Sonnenschein;Amir Govrin;Yoav Avidor;Yuval Elovici.
(2007)

912 Citations

N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

Yair Meidan;Michael Bohadana;Yael Mathov;Yisroel Mirsky.
IEEE Pervasive Computing (2018)

626 Citations

Google Android: A Comprehensive Security Assessment

A. Shabtai;Y. Fledel;U. Kanonov;Y. Elovici.
ieee symposium on security and privacy (2010)

582 Citations

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.

Yisroel Mirsky;Tomer Doitshman;Yuval Elovici;Asaf Shabtai.
network and distributed system security symposium (2018)

441 Citations

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey

Asaf Shabtai;Robert Moskovitch;Yuval Elovici;Chanan Glezer.
Information Security Technical Report (2009)

361 Citations

Online Social Networks: Threats and Solutions

Michael Fire;Roy Goldschmidt;Yuval Elovici.
IEEE Communications Surveys and Tutorials (2014)

328 Citations

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis

Yair Meidan;Michael Bohadana;Asaf Shabtai;Juan David Guarnizo.
symposium on applied computing (2017)

295 Citations

Securing Android-Powered Mobile Devices Using SELinux

Asaf Shabtai;Yuval Fledel;Yuval Elovici.
ieee symposium on security and privacy (2010)

254 Citations

Detecting unknown malicious code by applying classification techniques on OpCode patterns

Asaf Shabtai;Robert Moskovitch;Clint Feher;Shlomi Dolev.
Security Informatics (2012)

252 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Yuval Elovici

Frederick E. Shelton

Frederick E. Shelton

Johnson & Johnson (United States)

Publications: 296

Jerome R. Morgan

Jerome R. Morgan

Johnson & Johnson (United States)

Publications: 106

Jeffrey S. Swayze

Jeffrey S. Swayze

Johnson & Johnson (United States)

Publications: 74

Chester O. Baxter

Chester O. Baxter

Johnson & Johnson (United States)

Publications: 68

Taylor W. Aronhalt

Taylor W. Aronhalt

Johnson & Johnson (United States)

Publications: 52

Iv Frederick E. Shelton

Iv Frederick E. Shelton

Johnson & Johnson (United States)

Publications: 43

Charles J. Scheib

Charles J. Scheib

Johnson & Johnson (United States)

Publications: 31

Mauro Conti

Mauro Conti

University of Padua

Publications: 30

Lior Rokach

Lior Rokach

Ben-Gurion University of the Negev

Publications: 30

Asaf Shabtai

Asaf Shabtai

Ben-Gurion University of the Negev

Publications: 27

Rajarshi Gupta

Rajarshi Gupta

Coinbase

Publications: 22

Alex Pentland

Alex Pentland

MIT

Publications: 19

Nor Badrul Anuar

Nor Badrul Anuar

University of Malaya

Publications: 16

Bret W. Smith

Bret W. Smith

Johnson & Johnson

Publications: 16

Sakir Sezer

Sakir Sezer

Queen's University Belfast

Publications: 15

Kevin L. Houser

Kevin L. Houser

Johnson & Johnson (United States)

Publications: 14

Trending Scientists

Tieshan Li

Tieshan Li

University of Electronic Science and Technology of China

John R. Lombardi

John R. Lombardi

City College of New York

Tien T. Tsong

Tien T. Tsong

Academia Sinica

Jean Manca

Jean Manca

Hasselt University

Marc Diederich

Marc Diederich

Seoul National University

Norimasa Sawada

Norimasa Sawada

Sapporo Medical University

Michael Winton

Michael Winton

Geophysical Fluid Dynamics Laboratory

Kevin P. Gallo

Kevin P. Gallo

National Oceanic and Atmospheric Administration

Sang-Wook Yeh

Sang-Wook Yeh

Hanyang University

Paul F. Smith

Paul F. Smith

University of Otago

Kathrin U. Jansen

Kathrin U. Jansen

Pfizer (United States)

David M. Almeida

David M. Almeida

Pennsylvania State University

Rosette Lidereau

Rosette Lidereau

Institute Curie

Ayumi Shintani

Ayumi Shintani

Vanderbilt University

Kim Usher

Kim Usher

University of New England

Anne Phillips

Anne Phillips

London School of Economics and Political Science

Something went wrong. Please try again later.