Skip to main content

previous disabled Page of 4
and
  1. No Access

    Article

    Automatic Real-Time Platoon Formation Using the Road Graph

    Identifying traffic platoons and managing vehicles on the road effectively is a challenging task that is currently under investigation both in academia and the industry. The challenges include the need for fas...

    Hannah Yair, Shlomi Dolev, Ehud Gudes in SN Computer Science (2023)

  2. No Access

    Chapter and Conference Paper

    A Survey of Security Challenges in Automatic Identification System (AIS) Protocol

    The world of maritime transport is a significant part of the global economy. Traffic control relies, among other means, on the Automatic Identification System (AIS) device, which reports dynamic and fixed data...

    Silvie Levy, Ehud Gudes, Danny Hendler in Cyber Security, Cryptology, and Machine Learning (2023)

  3. No Access

    Book and Conference Proceedings

    Cyber Security, Cryptology, and Machine Learning

    7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings

    Shlomi Dolev, Ehud Gudes in Lecture Notes in Computer Science (2023)

  4. No Access

    Chapter and Conference Paper

    BFLUT Bloom Filter for Private Look Up Tables

    Open addressing hash tables, possibly under double hashing policy, are regarded more memory efficient than linked list hashing; as the memory used for pointers can be used for a longer table, and allow better-...

    Shlomi Dolev, Ehud Gudes, Erez Segev in Cyber Security, Cryptology, and Machine Le… (2022)

  5. No Access

    Chapter and Conference Paper

    Fake News Detection in Social Networks Using Machine Learning and Trust

    Fake news propagation is a major challenge for Online Social Networks (OSN) security, which is not yet resolved. Fake news propagates because of several reasons, one of which is non-trustworthy users. Non-trus...

    Nadav Voloch, Ehud Gudes, Nurit Gal-Oz in Cyber Security, Cryptology, and Machine Le… (2022)

  6. No Access

    Chapter and Conference Paper

    Non-stop** Junctions via Traffic Scheduling

    Emergency situations involve massive movements of (logistic and units) platoons to and from focal locations. Platoons may move in different directions and can be blocking each other in junctions causing even d...

    Shlomi Dolev, Ehud Gudes, Hannah Yair in Cyber Security, Cryptology, and Machine Learning (2022)

  7. No Access

    Chapter and Conference Paper

    Implementing GDPR in Social Networks Using Trust and Context

    The GDPR (General Data Protection Regulation) is a regulation for data protection and privacy for citizens of the EU. It also addresses the export of personal data outside the EU, thus creating a regulation t...

    Nadav Voloch, Ehud Gudes, Nurit Gal-Oz in Cyber Security Cryptography and Machine Learning (2021)

  8. No Access

    Chapter and Conference Paper

    Use of Blockchain for Ensuring Data Integrity in Cloud Databases

    This paper proposes a novel method for using a PoW-based Blockchain to ensure data integrity in cloud database management systems. The use of cloud platforms for storing data or even hosting databases is incre...

    Yakov Vainshtein, Ehud Gudes in Cyber Security Cryptography and Machine Learning (2021)

  9. No Access

    Chapter and Conference Paper

    Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks

    Security and privacy have been major concerns of Online Social Networks (OSN). Individual users as well as organizations utilize OSNs, such as Facebook, Twitter, and LinkedIn, to share information with other u...

    Nadav Voloch, Ehud Gudes, Nurit Gal-Oz in Complex Networks & Their Applications IX (2021)

  10. No Access

    Article

    Wavelet-based dynamic and privacy-preserving similitude data models for edge computing

    The privacy-preserving data release is an increasingly important problem in today’s computing. As the end devices collect more and more data, reducing the amount of published data saves considerable network, C...

    Philip Derbeko, Shlomi Dolev, Ehud Gudes in Wireless Networks (2021)

  11. No Access

    Chapter and Conference Paper

    An ABAC Model with Trust and Gossi** (ABAC–TG) for Online Social Networks

    In this paper, we propose an attribute-based access control model called ABAC–TG for online social networks (OSNs). This model comprehensively considers user and object attributes and two main social attribute...

    Adi Swissa, Ehud Gudes in Data and Applications Security and Privacy XXXV (2021)

  12. No Access

    Chapter and Conference Paper

    Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model

    Online Social Networks (OSN) security issues have been extensively r...

    Nadav Voloch, Ehud Gudes, Nurit Gal-Oz in Network and System Security (2021)

  13. Chapter and Conference Paper

    PUA Detection Based on Bundle Installer Characteristics

    Many applications, such as download managers, antivirus, backup utilities, and Web browsers, are distributed freely via popular download sites in an attempt to increase the application’s user base. When such a...

    Amir Lukach, Ehud Gudes, Asaf Shabtai in Data and Applications Security and Privacy XXXIV (2020)

  14. No Access

    Chapter and Conference Paper

    Comparison of DNS Based Methods for Detecting Malicious Domains

    The Domain Name System (DNS) is an essential component of the internet infrastructure, used to translates domain names into IP addresses. Threat actors often abuse this system by registering and taking over th...

    Eyal Paz, Ehud Gudes in Cyber Security Cryptography and Machine Learning (2020)

  15. Chapter and Conference Paper

    A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks

    Over the last decade Online Social Networks (OSN) privacy has been thoroughly studied in many aspects. Some of these privacy related aspects are trust and credibility involving the OSN user-data conveyed by di...

    Nadav Voloch, Priel Nissim, Mor Elmakies, Ehud Gudes in Trust Management XIII (2019)

  16. No Access

    Chapter and Conference Paper

    MLDStore

    The amount of data grows exponentially with time and the growth shows no signs of stop**. However, the data in itself is not useful until it can be processed, mined for information and queried. Thus, data sh...

    Philip Derbeko, Shlomi Dolev in Cyber Security Cryptography and Machine Learning (2019)

  17. No Access

    Chapter and Conference Paper

    An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility

    During the past decade Online Social Networks (OSN) privacy has been thoroughly studied in many aspects. Some of these privacy related aspects are trust and credibility involving the OSN user-data conveyed by ...

    Nadav Voloch, Priel Levy, Mor Elmakies in Cyber Security Cryptography and Machine Le… (2019)

  18. No Access

    Chapter and Conference Paper

    An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors

    During the last couple of years there have been many researches on Online Social Networks (OSN). The common manner of representing an OSN is by a user-based graph, where the vertices are different OSN users, a...

    Ehud Gudes, Nadav Voloch in Cyber Security Cryptography and Machine Learning (2018)

  19. Chapter and Conference Paper

    Data Integrity Verification in Column-Oriented NoSQL Databases

    Data integrity in cloud databases is a topic that has received a much of attention from the research community. However, existing solutions mainly focus on the cloud providers that store data in relational dat...

    Grisha Weintraub, Ehud Gudes in Data and Applications Security and Privacy XXXII (2018)

  20. No Access

    Chapter and Conference Paper

    Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation

    Despite its attractiveness, Big Data oftentimes is hard, slow and expensive to handle due to its size. Moreover, as the amount of collected data grows, individual privacy raises more and more concerns: “what d...

    Philip Derbeko, Shlomi Dolev in Cyber Security Cryptography and Machine Learning (2018)

previous disabled Page of 4