Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Chen Hajaj"'
Autor:
Assaf Frajman, Shimon Izhakian, Ori Mekiten, Ori Hadar, Ariel Lichtenstadt, Chen Hajaj, Shon Shchori, Moshe Heching, Dror Rosengarten, Mordechai R. Kramer
Publikováno v:
Respiratory Research, Vol 25, Iss 1, Pp 1-8 (2024)
Abstract Background The global mortality and morbidity rates of bronchiectasis patients due to nontuberculous mycobacteria (NTM) pulmonary infection are on a concerning upward trend. The aims of this study to identify the phenotype of NTM-positive in
Externí odkaz:
https://doaj.org/article/4f1614a25ece460d9893e2e4f7a0fd30
Publikováno v:
IEEE Access, Vol 10, Pp 1317-1333 (2022)
Android OS is one of the most popular operating systems worldwide, making it a desirable target for malware attacks. Some of the latest and most important defensive systems are based on machine learning (ML) and cybercriminals continuously search for
Externí odkaz:
https://doaj.org/article/817a60ef24e3437885a1c46d2a149a48
Autor:
Rotem Bar, Chen Hajaj
Publikováno v:
IEEE Access, Vol 10, Pp 56952-56960 (2022)
Traffic detection has attracted much attention in recent years, playing an essential role in intrusion detection systems (IDS). This paper proposes a new approach for traffic detection at the packet level, inspired by natural language processing (NLP
Externí odkaz:
https://doaj.org/article/2793287f2d084a9b8de0eb8cbc34ecec
Autor:
Ron S. Hirschprung, Chen Hajaj
Publikováno v:
Heliyon, Vol 7, Iss 7, Pp e07416- (2021)
COVID-19 has long become a worldwide pandemic. It is responsible for the death of over two million people and posed an economic recession. This paper studies the spread pattern of COVID-19, aiming to establish a prediction model for this event. We ha
Externí odkaz:
https://doaj.org/article/96ad6218fc6d46f5bc5ef7cef1dd3c0e
Publikováno v:
Expert Systems with Applications. 228:120429
Autor:
Chen Hajaj, Rotem Bar
Publikováno v:
IEEE Access. 10:56952-56960
Publikováno v:
IEEE Access, Vol 10, Pp 1317-1333 (2022)
Android OS is one of the most popular operating systems worldwide, making it a desirable target for malware attacks. Some of the latest and most important defensive systems are based on machine learning (ML) and cybercriminals continuously search for
Publikováno v:
Social Issues in Israel. 31:179-202
Publikováno v:
Electronics
Volume 12
Issue 5
Pages: 1091
Volume 12
Issue 5
Pages: 1091
Covert communication channels are a concept in which a policy-breaking method is used in order to covertly transmit data from inside an organization to an external or accessible point. VoIP and Video systems are exposed to such attacks on different l
Publikováno v:
Network Science. 9:255-290
Decentralized coordination is one of the fundamental challenges for societies and organizations. While extensively explored from a variety of perspectives, one issue that has received limited attention is human coordination in the presence of adversa