enter search term and/or author name
The Letter from Prof. Maj. Gen. (Ret.) Isaac Ben-Israel
Article No.: 49e
Cyber Security and the Role of Intelligent Systems in Addressing its Challenges
Yaniv Harel, Irad Ben Gal, Yuval Elovici
Article No.: 49
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack
Mordechai Guri, Matan Monitz, Yuval Elovici
Article No.: 50
Information is the most critical asset of modern organizations, and accordingly it is one of the resources most coveted by adversaries. When highly sensitive data is involved, an organization may resort to air gap isolation in which there is no...
Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks: A Data-Driven Approach
Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash, V. S. Subrahmanian, Benjamin Wang
Article No.: 51
Despite growing speculation about the role of human behavior in cyber-security of machines, concrete data-driven analysis and evidence have been lacking. Using Symantec’s WINE platform, we conduct a detailed study of 1.6 million machines...
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk
Rajesh Ganesan, Sushil Jajodia, Hasan Cam
Article No.: 52
Cybersecurity threats are on the rise with evermore digitization of the information that many day-to-day systems depend upon. The demand for cybersecurity analysts outpaces supply, which calls for optimal management of the analyst resource....
A Risk-Scoring Feedback Model for Webpages and Web Users Based on Browsing Behavior
Michal Ben Neria, Nancy-Sarah Yacovzada, Irad Ben-Gal
Article No.: 53
It has been claimed that many security breaches are often caused by vulnerable (naïve) employees within the organization [Ponemon Institute LLC 2015a]. Thus, the weakest link in security is often not the technology itself but rather...
Consider a server offering risk assessment services and potential clients of these services. The risk assessment model that is run by the server is based on current and historical data of the clients. However, the clients might prefer not sharing...
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems
Amit Kleinmann, Avishai Wool
Article No.: 55
Traffic of Industrial Control System (ICS) between the Human Machine Interface (HMI) and the Programmable Logic Controller (PLC) is known to be highly periodic. However, it is sometimes multiplexed, due to asynchronous scheduling. Modeling the...
Network level surveillance, censorship, and various man-in-the-middle attacks target only specific types of network traffic (e.g., HTTP, HTTPS, VoIP, or Email). Therefore, packets of these types will likely receive “special” treatment...
Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks
Ron Hirschprung, Eran Toch, Hadas Schwartz-Chassidim, Tamir Mendel, Oded Maimon
Article No.: 57
The way users manage access to their information and computers has a tremendous effect on the overall security and privacy of individuals and organizations. Usually, access management is conducted using a choice architecture, a behavioral...
Section: Special Issue: Cyber Security
Tracking Illicit Drug Dealing and Abuse on Instagram Using Multimodal Analysis
Xitong Yang, Jiebo Luo
Article No.: 58
Illicit drug trade via social media sites, especially photo-oriented Instagram, has become a severe problem in recent years. As a result, tracking drug dealing and abuse on Instagram is of interest to law enforcement agencies and public health...
Advanced Economic Control of Electricity-Based Space Heating Systems in Domestic Coalitions with Shared Intermittent Energy Resources
Athanasios Aris Panagopoulos, Sasan Maleki, Alex Rogers, Matteo Venanzi, Nicholas R. Jennings
Article No.: 59
Over the past few years, Domestic Heating Automation Systems (DHASs) that optimize the domestic space heating control process with minimum user input, utilizing appropriate occupancy prediction technology, have emerged as commercial products...
Algorithms for Graph-Constrained Coalition Formation in the Real World
Filippo Bistaffa, Alessandro Farinelli, Jesús Cerquides, Juan Rodríguez-Aguilar, Sarvapali D. Ramchurn
Article No.: 60
Coalition formation typically involves the coming together of multiple, heterogeneous, agents to achieve both their individual and collective goals. In this article, we focus on a special case of coalition formation known as Graph-Constrained...
Data-Driven Frequency-Based Airline Profit Maximization
Bo An, Haipeng Chen, Noseong Park, V. S. Subrahmanian
Article No.: 61
Although numerous traditional models predict market share and demand along airline routes, the prediction of existing models is not precise enough, and to the best of our knowledge, there is no use of data mining--based forecasting techniques for...