Alert button
Picture for Yuval Elovici

Yuval Elovici

Alert button

GLOD: Gaussian Likelihood Out of Distribution Detector

Add code
Bookmark button
Alert button
Aug 21, 2020
Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici

Figure 1 for GLOD: Gaussian Likelihood Out of Distribution Detector
Figure 2 for GLOD: Gaussian Likelihood Out of Distribution Detector
Figure 3 for GLOD: Gaussian Likelihood Out of Distribution Detector
Viaarxiv icon

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Add code
Bookmark button
Alert button
Aug 10, 2020
Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

Figure 1 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 2 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 3 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Figure 4 for An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions
Viaarxiv icon

Adversarial Learning in the Cyber Security Domain

Add code
Bookmark button
Alert button
Jul 05, 2020
Ihai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach

Figure 1 for Adversarial Learning in the Cyber Security Domain
Figure 2 for Adversarial Learning in the Cyber Security Domain
Figure 3 for Adversarial Learning in the Cyber Security Domain
Figure 4 for Adversarial Learning in the Cyber Security Domain
Viaarxiv icon

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

Add code
Bookmark button
Alert button
Jun 30, 2020
Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai

Figure 1 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 2 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 3 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Figure 4 for Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Viaarxiv icon

Lightweight Collaborative Anomaly Detection for the IoT using Blockchain

Add code
Bookmark button
Alert button
Jun 18, 2020
Yisroel Mirsky, Tomer Golomb, Yuval Elovici

Figure 1 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 2 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 3 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Figure 4 for Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Viaarxiv icon

DANTE: A framework for mining and monitoring darknet traffic

Add code
Bookmark button
Alert button
Mar 05, 2020
Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai

Figure 1 for DANTE: A framework for mining and monitoring darknet traffic
Figure 2 for DANTE: A framework for mining and monitoring darknet traffic
Figure 3 for DANTE: A framework for mining and monitoring darknet traffic
Figure 4 for DANTE: A framework for mining and monitoring darknet traffic
Viaarxiv icon

IoT Device Identification Using Deep Learning

Add code
Bookmark button
Alert button
Feb 25, 2020
Jaidip Kotak, Yuval Elovici

Figure 1 for IoT Device Identification Using Deep Learning
Figure 2 for IoT Device Identification Using Deep Learning
Figure 3 for IoT Device Identification Using Deep Learning
Figure 4 for IoT Device Identification Using Deep Learning
Viaarxiv icon

Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization

Add code
Bookmark button
Alert button
Feb 06, 2020
Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici

Figure 1 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 2 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 3 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Figure 4 for Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization
Viaarxiv icon

Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks

Add code
Bookmark button
Alert button
Jan 07, 2020
Yi Xiang Marcus Tan, Yuval Elovici, Alexander Binder

Figure 1 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 2 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 3 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Figure 4 for Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
Viaarxiv icon