Chanan Glezer
Orcid: 0000-0002-4356-1858
According to our database1,
Chanan Glezer
authored at least 33 papers
between 1999 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
2015
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
Comput. Secur., 2015
2012
J. Intell. Inf. Syst., 2012
The Role of Knowledge Sharing in Raising the Task Innovativeness of Systems Analysts.
Int. J. Knowl. Manag., 2012
2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011
Inf. Manag. Comput. Secur., 2011
2010
Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
J. Comput. Virol., 2010
A contingency model for estimating success of strategic information systems planning.
Inf. Manag., 2010
2009
Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Rec., 2009
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Inf. Secur. Tech. Rep., 2009
Inf. Softw. Technol., 2009
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009
2008
Proceedings of the Internet of Things, First International Conference, 2008
2007
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic.
Proceedings of the KI 2007: Advances in Artificial Intelligence, 2007
M2MGen- An Application Generator for Machine to Machine (M2M) Applications.
Proceedings of the RFID Technology - Concepts, Applications, Challenges, Proceedings of the 1st International Workshop on RFID Technology, 2007
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007
2006
Inf. Manag., 2006
2005
Enhancing customer privacy while searching for products and services on the world wide web.
Internet Res., 2005
Inf. Softw. Technol., 2005
Int. J. Electron. Bus., 2005
Experimental Comparison of Sequence and Collaboration Diagrams in Different Application Domains.
Proceedings of the 10th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2005
2004
A Reconfiguration Algorithm for Distributed Computer Networks.
Proceedings of the ICEIS 2004, 2004
2003
J. Strateg. Inf. Syst., 2003
Data Knowl. Eng., 2003
2001
J. Organ. Comput. Electron. Commer., 2001
2000
1999
J. Organ. Comput. Electron. Commer., 1999