N-baiot—network-based detection of iot botnet attacks using deep autoencoders Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ... IEEE Pervasive Computing 17 (3), 12-22, 2018 | 1297 | 2018 |
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection Y Mirsky, T Doitshman, Y Elovici, A Shabtai The Network and Distributed System Security Symposium (NDSS) 2018, 2018 | 1159 | 2018 |
The creation and detection of deepfakes: A survey Y Mirsky, W Lee ACM computing surveys (CSUR) 54 (1), 1-41, 2021 | 612 | 2021 |
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning Y Mirsky, T Mahler, I Shelef, Y Elovici USENIX Security Symposium 2019, 2019 | 244 | 2019 |
Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations M Guri, M Monitz, Y Mirski, Y Elovici 2015 IEEE 28th Computer Security Foundations Symposium, 276-289, 2015 | 214 | 2015 |
GSMem: Data Exfiltration from Air-Gapped Computers over {GSM} Frequencies M Guri, A Kachlon, O Hasson, G Kedma, Y Mirsky, Y Elovici USENIX Security Symposium 2015, 849-864, 2015 | 201 | 2015 |
Ciota: Collaborative iot anomaly detection via blockchain T Golomb, Y Mirsky, Y Elovici NDSS DISS Workshop 2018, 2018 | 116 | 2018 |
Phantom of the adas: Securing advanced driver-assistance systems from split-second phantom attacks B Nassi, Y Mirsky, D Nassi, R Ben-Netanel, O Drokin, Y Elovici Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 86 | 2020 |
Sherlock vs moriarty: A smartphone dataset for cybersecurity research Y Mirsky, A Shabtai, L Rokach, B Shapira, Y Elovici Proceedings of the 2016 ACM workshop on Artificial intelligence and security …, 2016 | 78 | 2016 |
The threat of offensive ai to organizations Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei, L Yang, X Zhang, ... Computers & Security 124, 103006, 2023 | 73 | 2023 |
The security of ip-based video surveillance systems N Kalbo, Y Mirsky, A Shabtai, Y Elovici Sensors 20 (17), 4806, 2020 | 72 | 2020 |
Kitsune: An ensemble of autoencoders for online network intrusion detection. arXiv 2018 Y Mirsky, T Doitshman, Y Elovici, A Shabtai arXiv preprint arXiv:1802.09089, 1802 | 68 | 1802 |
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems B Nassi, D Nassi, R Ben-Netanel, Y Mirsky, O Drokin, Y Elovici | 65 | 2020 |
DICOM images have been hacked! Now what? B Desjardins, Y Mirsky, MP Ortiz, Z Glozman, L Tarbox, R Horn, SC Horii American Journal of Roentgenology 214 (4), 727-735, 2020 | 49 | 2020 |
Lightweight collaborative anomaly detection for the IoT using blockchain Y Mirsky, T Golomb, Y Elovici Journal of Parallel and Distributed Computing 145, 75-97, 2020 | 47 | 2020 |
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs Y Mirsky, N Kalbo, Y Elovici, A Shabtai IEEE Transactions on Information Forensics and Security, 1-16, 2018 | 39 | 2018 |
Anomaly detection for smartphone data streams Y Mirsky, A Shabtai, B Shapira, Y Elovici, L Rokach Pervasive and Mobile Computing 35, 83-107, 2017 | 38 | 2017 |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. G Lewandowski, DJ Bouvier, TY Chen, R McCartney, K Sanders, B Simon, ... Communications of the ACM 53 (7), 60-70, 2010 | 35* | 2010 |
9-1-1 DDoS: attacks, analysis and mitigation M Guri, Y Mirsky, Y Elovici 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 218-232, 2017 | 34* | 2017 |
DANTE: A framework for mining and monitoring darknet traffic D Cohen, Y Mirsky, M Kamp, T Martin, Y Elovici, R Puzis, A Shabtai Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 25 | 2020 |