Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

15 results
Image document

Comparative Evaluation of Node-Link and Sankey Diagrams for the Cyber Security Domain

Rotem Blinder , Ofer Biller , Adir Even , Oded Sofer , Noam Tractinsky , et al.
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.497-518, ⟨10.1007/978-3-030-29381-9_31⟩
Conference papers hal-02544537v1
Image document

Evaluating Multivariate Visualizations as Multi-objective Decision Aids

Meirav Taieb-Maimon , Lior Limonad , David Amid , David Boaz , Ateret Anaby-Tavor
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.419-436, ⟨10.1007/978-3-642-40483-2_29⟩
Conference papers hal-01497451v1
Image document

Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases

Yossif Shalabi , Ehud Gudes
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.3-19, ⟨10.1007/978-3-319-61176-1_1⟩
Conference papers hal-01684347v1
Image document

Transfer Learning for Content-Based Recommender Systems Using Tree Matching

Naseem Biadsy , Lior Rokach , Armin Shmilovici
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.387-399
Conference papers hal-01506793v1
Image document

Data Integrity Verification in Column-Oriented NoSQL Databases

Grisha Weintraub , Ehud Gudes
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.165-181, ⟨10.1007/978-3-319-95729-6_11⟩
Conference papers hal-01954409v1
Image document

Efficient and Enhanced Solutions for Content Sharing in DRM Systems

Michal Davidson , Ehud Gudes , Tamir Tassa
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers hal-01284873v1
Image document

Publishing Differentially Private Medical Events Data

Sigal Shaked , Lior Rokach
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.219-235, ⟨10.1007/978-3-319-45507-5_15⟩
Conference papers hal-01635024v1
Image document

Private and Secure Secret Shared MapReduce (Extended Abstract)

Shlomi Dolev , Yin Li , Shantanu Sharma
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.151-160, ⟨10.1007/978-3-319-41483-6_11⟩
Conference papers hal-01633670v1
Image document

PUA Detection Based on Bundle Installer Characteristics

Amir Lukach , Ehud Gudes , Asaf Shabtai
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.261-273, ⟨10.1007/978-3-030-49669-2_15⟩
Conference papers hal-03243639v1
Image document

Code Type Revealing Using Experiments Framework

Rami Sharon , Ehud Gudes
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.193-206, ⟨10.1007/978-3-642-31540-4_15⟩
Conference papers hal-01534762v1
Image document

An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks

Adi Swissa , Ehud Gudes
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers hal-03677023v1
Image document

Attacking and Defending Dynamic Analysis System-Calls Based IDS

Ishai Rosenberg , Ehud Gudes
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.103-119, ⟨10.1007/978-3-319-45931-8_7⟩
Conference papers hal-01639619v1
Image document

Load-Balancing Adaptive Clustering Refinement Algorithm for Wireless Sensor Network Clusters

Gal Oren , Leonid Barenboim , Harel Levin
15th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2017, St. Petersburg, Russia. pp.157-173, ⟨10.1007/978-3-319-61382-6_13⟩
Conference papers hal-01675417v1
Image document

Let Us Talk to People, Not to Computers": Obstacles for Establishing Relationships and Trust in Social Workers’ Online Communities of Practice

Azi Lev-On , Odelia Adler
5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.80-94, ⟨10.1007/978-3-642-40346-0_8⟩
Conference papers hal-01491233v1
Image document

A Topology Based Flow Model for Computing Domain Reputation

Igor Mishsky , Nurit Gal-Oz , Ehud Gudes
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.277-292, ⟨10.1007/978-3-319-20810-7_20⟩
Conference papers hal-01745814v1