Amit Dvir

Orcid: 0000-0002-3670-0784

According to our database1, Amit Dvir authored at least 82 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SPRINKLER: A Multi-RPL Man-in-the-Middle Identification Scheme in IoT Networks.
IEEE Trans. Mob. Comput., October, 2024

Identifying a Malicious Node in a UAV Network.
IEEE Trans. Netw. Serv. Manag., February, 2024

OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification.
Comput. Commun., January, 2024

The art of time-bending: Data augmentation and early prediction for efficient traffic classification.
Expert Syst. Appl., 2024

Cloudy with a Chance of Anomalies: Dynamic Graph Neural Network for Early Detection of Cloud Services' User Anomalies.
CoRR, 2024

Enhancing Encrypted Internet Traffic Classification Through Advanced Data Augmentation Techniques.
CoRR, 2024

Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning.
CoRR, 2024

Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework.
CoRR, 2024

CBR - Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution.
CoRR, 2024

Extending limited datasets with GAN-like self-supervision for SMS spam detection.
Comput. Secur., 2024

Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Network wormhole attacks without a traditional wormhole.
Ad Hoc Networks, December, 2023

Breaking the structure of MaMaDroid.
Expert Syst. Appl., October, 2023

Speech and multilingual natural language framework for speaker change detection and diarization.
Expert Syst. Appl., 2023

Open Image Content Disarm And Reconstruction.
CoRR, 2023

When a RF beats a CNN and GRU, together - A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification.
Comput. Secur., 2023

Persuasive: A node isolation attack variant for OLSR-based MANETs and its mitigation.
Ad Hoc Networks, 2023

2022
Robust Machine Learning for Encrypted Traffic Classification.
Dataset, May, 2022

Word embedding dimensionality reduction using dynamic variance thresholding (DyVaT).
Expert Syst. Appl., 2022

Open-Source Framework for Encrypted Internet and Malicious Traffic Classification.
CoRR, 2022

Problem-Space Evasion Attacks in the Android OS: a Survey.
CoRR, 2022

Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks.
CoRR, 2022

MaMaDroid2.0 - The Holes of Control Flow Graphs.
CoRR, 2022

Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier.
IEEE Access, 2022

MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Hybrid Speech and Text Analysis Methods for Speaker Change Detection.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

A wrinkle in time: a case study in DNS poisoning.
Int. J. Inf. Sec., 2021

Heterogeneous SDN controller placement problem - The Wi-Fi and 4G LTE-U case.
Comput. Networks, 2021

SDN Wireless Controller Placement Problem-The 4G LTE-U Case.
IEEE Access, 2021

A Thousand Words are Worth More Than One Recording: <i>Word-Embedding</i> Based Speaker Change Detection.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021

2020
A secure road traffic congestion detection and notification concept based on V2I communications.
Veh. Commun., 2020

Less is More: Robust and Novel Features for Malicious Domain Detection.
CoRR, 2020

A Thousand Words are Worth More Than One Recording: NLP Based Speaker Change Point Detection.
CoRR, 2020

When the Guard failed the Droid: A case study of Android malware.
CoRR, 2020

Encrypted video traffic clustering demystified.
Comput. Secur., 2020

Robust Malicious Domain Detection.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Evasion Is Not Enough: A Case Study of Android Malware.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

2019
The controller placement problem for wireless SDN.
Wirel. Networks, 2019

MiSAL - A minimal quality representation switch logic for adaptive streaming.
Multim. Tools Appl., 2019

A fair server adaptation algorithm for HTTP adaptive streaming using video complexity.
Multim. Tools Appl., 2019

Clustering the Unknown - The Youtube Case.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Adaptation logic for HTTP dynamic adaptive streaming using geo-predictive crowdsourcing for mobile users.
Multim. Syst., 2018

Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming.
KSII Trans. Internet Inf. Syst., 2018

STWSN: A novel secure distributed transport protocol for wireless sensor networks.
Int. J. Commun. Syst., 2018

Securing Road Traffic Congestion Detection by Incorporating V2I Communications.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

Video QoE Prediction Based on User Profile.
Proceedings of the 2018 International Conference on Computing, 2018

Wireless controller placement problem.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification.
IEEE Trans. Inf. Forensics Secur., 2017

CASPaR: Congestion avoidance shortest path routing for delay tolerant networks.
Int. J. Distributed Sens. Networks, 2017

Passive assessment of QoS in a WLAN for Sudden Onset Disasters (SODs).
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Analyzing HTTPS Encrypted Traffic to Identify User Operating System, Browser and Application.
CoRR, 2016

Real Time Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming - the Case of Safari.
CoRR, 2016

Adaptation Logic for HTTP Dynamic Adaptive Streaming using Geo-Predictive Crowdsourcing.
CoRR, 2016

Video quality representation classification of Safari encrypted DASH streams.
Proceedings of the Digital Media Industry & Academic Forum, 2016

Wireless infrastructure deployment model for sudden-onset disasters through real-time monitoring.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

2015
Multicast adaptive logic for Dynamic Adaptive Streaming over HTTP network.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Video complexity hybrid traffic shaping for HTTP Adaptive Streaming.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

Novel ad insertion technique for MPEG-DASH.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

Hybrid Clustered Peer-Assisted DASH-SVC System.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
GNSS Accuracy Improvement Using Rapid Shadow Transitions.
IEEE Trans. Intell. Transp. Syst., 2014

Formal Security Verification of Transport Protocols for Wireless Sensor Networks.
Proceedings of the Advanced Computational Methods for Knowledge Engineering, 2014

2013
On formal and automatic security verification of WSN transport protocols.
IACR Cryptol. ePrint Arch., 2013

Accurate lane detection using commercial GNSS devices.
Proceedings of the 10th Workshop on Positioning, Navigation and Communication, 2013

The effect of client buffer and MBR consideration on DASH Adaptation Logic.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Performance monitoring framework for Wi-Fi MANET.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains.
Proceedings of IEEE International Conference on Communications, 2013

2012
Centdian Computation in Cactus Graphs.
J. Graph Algorithms Appl., 2012

Modeling adaptive rate video transmission in Wi-Fi MANET.
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 2012

2011
VeRA - Version Number and Rank Authentication in RPL.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Analysis and optimization of live streaming for over the top video.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Development and optimization of cache element for access layer.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

A joint framework of passive monitoring system for complex wireless networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Placing and maintaining a core node in wireless<i>ad hoc</i> networks.
Wirel. Commun. Mob. Comput., 2010

Centdian Computation for Sensor Networks.
Proceedings of the Theory and Applications of Models of Computation, 7th Annual Conference, 2010

Backpressure-based routing protocol for DTNs.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

2009
Power-aware recovery for geographic routing.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

2008
The (k, l) Coredian Tree for Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2008

2007
Automated antenna positioning algorithms for wireless fixed-access networks.
J. Heuristics, 2007

Placing and Maintaining a Core Node in Wireless Ad Hoc Sensor Networks.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

2006
Automated antenna positioning for wireless networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2004
SPLAST: a novel approach for multicasting in mobile wireless ad hoc networks.
Proceedings of the IEEE 15th International Symposium on Personal, 2004


  Loading...