Gabi Kedma

According to our database1, Gabi Kedma authored at least 12 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Using malware for the greater good: Mitigating data leakage.
J. Netw. Comput. Appl., 2019

2016
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap.
CoRR, 2016

An optical covert-channel to leak data through an air-gap.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Limiting access to unintentionally leaked sensitive documents using malware signatures.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Resilience of Anti-malware Programs to Naïve Modifications of Malicious Binaries.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

2013
Noninvasive detection of anti-forensic malware.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Analyzing users' web surfing patterns to trace terrorists and criminals.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

2012
Proactive screening for depression through metaphorical and automatic text analysis.
Artif. Intell. Medicine, 2012

2010
Using Web-Intelligence for Excavating the Emerging Meaning of Target-Concepts.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010


  Loading...