Zobrazeno 1 - 10
of 217
pro vyhledávání: '"Puzis, Rami"'
Autor:
Ifland, Beni, Duani, Elad, Krief, Rubin, Ohana, Miro, Zilberman, Aviram, Murillo, Andres, Manor, Ofir, Lavi, Ortal, Kenji, Hikichi, Shabtai, Asaf, Elovici, Yuval, Puzis, Rami
Communication network engineering in enterprise environments is traditionally a complex, time-consuming, and error-prone manual process. Most research on network engineering automation has concentrated on configuration synthesis, often overlooking ch
Externí odkaz:
http://arxiv.org/abs/2407.08249
Security by design, Sbd is a concept for developing and maintaining systems that are, to the greatest extent possible, free from security vulnerabilities and impervious to security attacks. In addition to technical aspects, such as how to develop a r
Externí odkaz:
http://arxiv.org/abs/2402.11543
Watermarking is one of the most important copyright protection tools for digital media. The most challenging type of watermarking is the imperceptible one, which embeds identifying information in the data while retaining the latter's original quality
Externí odkaz:
http://arxiv.org/abs/2305.06786
Software Defect Prediction aims at predicting which software modules are the most probable to contain defects. The idea behind this approach is to save time during the development process by helping find bugs early. Defect Prediction models are based
Externí odkaz:
http://arxiv.org/abs/2212.14404
Autor:
Puzis, Rami
Wave propagation through nodes and links of a network forms the basis of spectral graph theory. Nevertheless, the sound emitted by nodes within the resonating chamber formed by a network are not well studied. The sound emitted by vibrations of indivi
Externí odkaz:
http://arxiv.org/abs/2211.06325
Organizations employ various adversary models in order to assess the risk and potential impact of attacks on their networks. Attack graphs represent vulnerabilities and actions an attacker can take to identify and compromise an organization's assets.
Externí odkaz:
http://arxiv.org/abs/2208.05750
User feedback is one of the most effective methods to build and maintain trust in electronic commerce platforms. Unfortunately, dishonest sellers often bend over backward to manipulate users' feedback or place phony bids in order to increase their ow
Externí odkaz:
http://arxiv.org/abs/2204.02057
Retrieving information from an online search engine, is the first and most important step in many data mining tasks. Most of the search engines currently available on the web, including all social media platforms, are black-boxes (a.k.a opaque) suppo
Externí odkaz:
http://arxiv.org/abs/2012.12498
Autor:
Farbiash, Dor, Puzis, Rami
Today arbitrary synthetic DNA can be ordered online and delivered within several days. In order to regulate both intentional and unintentional generation of dangerous substances, most synthetic gene providers screen DNA orders. A weakness in the Scre
Externí odkaz:
http://arxiv.org/abs/2011.14224
Large content providers and content distribution network operators usually connect with large Internet service providers (eyeball networks) through dedicated private peering. The capacity of these private network interconnects is provisioned to match
Externí odkaz:
http://arxiv.org/abs/2010.01380