Follow
Yisroel Mirsky
Title
Cited by
Cited by
Year
N-baiot—network-based detection of iot botnet attacks using deep autoencoders
Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ...
IEEE Pervasive Computing 17 (3), 12-22, 2018
13862018
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
Y Mirsky, T Doitshman, Y Elovici, A Shabtai
The Network and Distributed System Security Symposium (NDSS) 2018, 2018
12492018
The creation and detection of deepfakes: A survey
Y Mirsky, W Lee
ACM computing surveys (CSUR) 54 (1), 1-41, 2021
6972021
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Y Mirsky, T Mahler, I Shelef, Y Elovici
USENIX Security Symposium 2019, 2019
2572019
Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations
M Guri, M Monitz, Y Mirski, Y Elovici
2015 IEEE 28th Computer Security Foundations Symposium, 276-289, 2015
2212015
GSMem: Data Exfiltration from Air-Gapped Computers over {GSM} Frequencies
M Guri, A Kachlon, O Hasson, G Kedma, Y Mirsky, Y Elovici
USENIX Security Symposium 2015, 849-864, 2015
2062015
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
B Nassi, D Nassi, R Ben-Netanel, Y Mirsky, O Drokin, Y Elovici
154*2020
Ciota: Collaborative iot anomaly detection via blockchain
T Golomb, Y Mirsky, Y Elovici
NDSS DISS Workshop 2018, 2018
1232018
The threat of offensive ai to organizations
Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei, L Yang, X Zhang, ...
Computers & Security 124, 103006, 2023
842023
The security of ip-based video surveillance systems
N Kalbo, Y Mirsky, A Shabtai, Y Elovici
Sensors 20 (17), 4806, 2020
802020
Sherlock vs moriarty: A smartphone dataset for cybersecurity research
Y Mirsky, A Shabtai, L Rokach, B Shapira, Y Elovici
Proceedings of the 2016 ACM workshop on Artificial intelligence and security …, 2016
762016
Kitsune: An ensemble of autoencoders for online network intrusion detection. arXiv 2018
Y Mirsky, T Doitshman, Y Elovici, A Shabtai
arXiv preprint arXiv:1802.09089, 1802
701802
DICOM images have been hacked! Now what?
B Desjardins, Y Mirsky, MP Ortiz, Z Glozman, L Tarbox, R Horn, SC Horii
American Journal of Roentgenology 214 (4), 727-735, 2020
532020
Lightweight collaborative anomaly detection for the IoT using blockchain
Y Mirsky, T Golomb, Y Elovici
Journal of Parallel and Distributed Computing 145, 75-97, 2020
522020
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
MR Crusoe, S Abeln, A Iosup, P Amstutz, J Chilton, N Tijanić, H Ménager, ...
Communications of the ACM 65 (6), 54-63, 2022
47*2022
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs
Y Mirsky, N Kalbo, Y Elovici, A Shabtai
IEEE Transactions on Information Forensics and Security, 1-16, 2018
402018
Anomaly detection for smartphone data streams
Y Mirsky, A Shabtai, B Shapira, Y Elovici, L Rokach
Pervasive and Mobile Computing 35, 83-107, 2017
372017
9-1-1 DDoS: attacks, analysis and mitigation
M Guri, Y Mirsky, Y Elovici
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 218-232, 2017
34*2017
VulChecker: Graph-based Vulnerability Localization in Source Code
Y Mirsky, G Macon, M Brown, C Yagemann, M Pruett, E Downing, ...
USENIX Security '23, 2023
312023
DANTE: A framework for mining and monitoring darknet traffic
D Cohen, Y Mirsky, M Kamp, T Martin, Y Elovici, R Puzis, A Shabtai
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
302020
The system can't perform the operation now. Try again later.
Articles 1–20