Nadav Voloch
Orcid: 0000-0001-5296-4985Affiliations:
- Ben-Gurion University of the Negev, Beersheba, Israel
According to our database1,
Nadav Voloch
authored at least 14 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
1
1
1
2
2
2
1
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Using Combined Knapsack and Shortest Path Problems for Planning Optimal Navigation Paths for Robotic Deliveries.
Proceedings of the 10th International Conference on Automation, Robotics and Applications, 2024
A Cryptographic Encryption Scheme based on a Pythagorean Triplets Manufacturing Formula.
Proceedings of the 14th International Conference on Advanced Computer Information Technologies, 2024
2022
Proceedings of the Information Integration and Web Intelligence, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
2021
Online Soc. Networks Media, 2021
Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks.
Proceedings of the Complex Networks & Their Applications IX, 2020
2019
Appl. Netw. Sci., 2019
A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
2018
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018