Nurit Gal-Oz

Orcid: 0000-0003-0565-8656

According to our database1, Nurit Gal-Oz authored at least 27 papers between 1993 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Fake News Detection in Social Networks Using Machine Learning and Trust.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021

A Trust based Privacy Providing Model for Online Social Networks.
Online Soc. Networks Media, 2021

Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model.
Proceedings of the Network and System Security - 15th International Conference, 2021

Implementing GDPR in Social Networks Using Trust and Context.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
Analyzing the Robustness of a Comprehensive Trust-Based Model for Online Social Networks Against Privacy Attacks.
Proceedings of the Complex Networks & Their Applications IX, 2020

2019
Mining meaningful and rare roles from web application usage patterns.
Comput. Secur., 2019

2018
Sharing-habits based privacy control in social networks.
J. Comput. Secur., 2018

2017
Advanced Flow Models for Computing the Reputation of Internet Domains.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

2015
A Topology Based Flow Model for Computing Domain Reputation.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Knots Maintenance for Optimal Management of Trust Relations.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Computing domains reputation using flow.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
Trust and reputation in and across virtual communities.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2011
Security Issues in NoSQL Databases.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Mining Roles from Web Application Usage Patterns.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Tracking end-users in web databases.
Proceedings of the 5th International Conference on Network and System Security, 2011

Identifying Knots of Trust in Virtual Communities.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Privacy issues with sharing reputation across virtual communities.
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011

2010
Sharing Reputation Across Virtual Communities.
J. Theor. Appl. Electron. Commer. Res., 2010

Privacy Issues with Sharing and Computing Reputation across Communities.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Schemes for Privately Computing Trust and Reputation.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Manipulating Recommendation Lists by Global Considerations.
Proceedings of the ICAART 2010 - Proceedings of the International Conference on Agents and Artificial Intelligence, Volume 2, 2010

CAMLS: A Constraint-Based Apriori Algorithm for Mining Long Sequences.
Proceedings of the Database Systems for Advanced Applications, 2010

2009
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Methods for Computing Trust and Reputation While Preserving Privacy.
Proceedings of the Data and Applications Security XXIII, 2009

2008
A Robust and Knot-Aware Trust-Based Reputation Model.
Proceedings of the Trust Management II, 2008

1993
A Model of Methods Access Authorization in Object-oriented Databases.
Proceedings of the 19th International Conference on Very Large Data Bases, 1993


  Loading...