Journal: ACM TIST

Volume 8, Issue 4

0 -- 0Mordechai Guri, Matan Monitz, Yuval Elovici. Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack
0 -- 0Alex Maltinsky, Ran Giladi, Yuval Shavitt. On Network Neutrality Measurements
0 -- 0Yaniv Harel, Irad Ben-Gal, Yuval Elovici. Cyber Security and the Role of Intelligent Systems in Addressing its Challenges
0 -- 0Amit Kleinmann, Avishai Wool. Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems
0 -- 0Isaac Ben Israel. The Letter from Prof. Maj. Gen. (Ret.) Isaac Ben-Israel
0 -- 0Bo An, Haipeng Chen, Noseong Park, V. S. Subrahmanian. Data-Driven Frequency-Based Airline Profit Maximization
0 -- 0Rajesh Ganesan, Sushil Jajodia, Hasan Cam. Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk
0 -- 0Athanasios Aris Panagopoulos, Sasan Maleki, Alex Rogers, Matteo Venanzi, Nicholas R. Jennings. Advanced Economic Control of Electricity-Based Space Heating Systems in Domestic Coalitions with Shared Intermittent Energy Resources
0 -- 0Eyal Kolman, Benny Pinkas. Securely Computing a Ground Speed Model
0 -- 0Filippo Bistaffa, Alessandro Farinelli, Jesús Cerquides, Juan A. Rodríguez-Aguilar, Sarvapali D. Ramchurn. Algorithms for Graph-Constrained Coalition Formation in the Real World
0 -- 0Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash, V. S. Subrahmanian, Benjamin Wang. Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks: A Data-Driven Approach
0 -- 0Michal Ben Neria, Nancy-Sarah Yacovzada, Irad Ben-Gal. A Risk-Scoring Feedback Model for Webpages and Web Users Based on Browsing Behavior
0 -- 0Ron Hirschprung, Eran Toch, Hadas Schwartz-Chassidim, Tamir Mendel, Oded Maimon. Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks
0 -- 0Xitong Yang, Jiebo Luo. Tracking Illicit Drug Dealing and Abuse on Instagram Using Multimodal Analysis