Ran Yahalom

According to our database1, Ran Yahalom authored at least 7 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Improving the effectiveness of intrusion detection systems for hierarchical data.
Knowl. Based Syst., 2019

2017
USB-based attacks.
Comput. Secur., 2017

2014
Constrained obfuscation of relational databases.
Inf. Sci., 2014

2011
Mining Roles from Web Application Usage Patterns.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Identifying Knots of Trust in Virtual Communities.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

2010
Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

CAMLS: A Constraint-Based Apriori Algorithm for Mining Long Sequences.
Proceedings of the Database Systems for Advanced Applications, 2010


  Loading...