Rami Puzis
Orcid: 0000-0002-7229-3899
According to our database1,
Rami Puzis
authored at least 128 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Assessment and manipulation of latent constructs in pre-trained language models using psychometric scales.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
2023
IEEE Trans. Netw. Serv. Manag., December, 2023
Appl. Intell., September, 2023
It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees.
IEEE Trans. Knowl. Data Eng., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
ReMark: Receptive Field based Spatial WaterMark Embedding Optimization using Deep Network.
CoRR, 2023
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Proceedings of the International Database Engineered Applications Symposium Conference, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023
2022
Contextual security awareness: A context-based approach for assessing the security awareness of users.
Knowl. Based Syst., 2022
Expert Syst. Appl., 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the Complex Networks and Their Applications XI, 2022
2021
Spillover Today? Predicting Traffic Overflows on Private Peering of Major Content Providers.
IEEE Trans. Netw. Serv. Manag., 2021
The interplay between vaccination and social distancing strategies affects COVID19 population-level outcomes.
PLoS Comput. Biol., 2021
How does that name sound? Name representation learning using accent-specific speech generation.
Knowl. Based Syst., 2021
Mind Your Mind: EEG-Based Brain-Computer Interfaces and Their Security in Cyber Space.
ACM Comput. Surv., 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the Complex Networks & Their Applications X - Volume 1, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021
2020
IEEE Trans. Parallel Distributed Syst., 2020
Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback.
CoRR, 2020
How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning.
CoRR, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Target oriented network intelligence collection: effective exploration of social networks.
World Wide Web, 2019
J. Netw. Comput. Appl., 2019
J. Comput. Biol., 2019
CoRR, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
EEGNAS: Neural Architecture Search for Electroencephalography Data Analysis and Decoding.
Proceedings of the Human Brain and Artificial Intelligence - First International Workshop, 2019
Proceedings of the European Intelligence and Security Informatics Conference, 2019
Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis.
IEEE Intell. Syst., 2018
Entertain. Comput., 2018
Proceedings of the Eleventh International Symposium on Combinatorial Search, 2018
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the GCAI-2018, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers.
IEEE Trans. Dependable Secur. Comput., 2017
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Soc. Syst., 2017
Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media.
CoRR, 2017
J. Complex Networks, 2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Information Systems Security and Privacy, 2017
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
2016
Enterp. Inf. Syst., 2016
Proceedings of the 2016 IEEE International Conference on Software Science, 2016
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016
Proceedings of the Complex Networks VII, 2016
2015
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
J. Complex Networks, 2015
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015
Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
IEEE Internet Comput., 2014
Artif. Intell., 2014
Proceedings of the Seventh Annual Symposium on Combinatorial Search, 2014
2013
ACM Trans. Intell. Syst. Technol., 2013
Soc. Networks, 2013
Augmented Betweenness Centrality for Environmentally Aware Traffic Monitoring in Transportation Networks.
J. Intell. Transp. Syst., 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
Proceedings of the Late-Breaking Developments in the Field of Artificial Intelligence, 2013
2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011
Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011
Proceedings of the Hardware and Software: Verification and Testing, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the 21st International Conference on Automated Planning and Scheduling, 2011
2010
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
Proceedings of the Third Annual Symposium on Combinatorial Search, 2010
Proceedings of the Optical Supercomputing - Third International Workshop, 2010
Proceedings of IEEE International Conference on Communications, 2010
2009
Inf. Process. Lett., 2009
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009
2008
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008
2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007