default search action
Aviad Cohen 0002
Person information
- affiliation: Ben-Gurion University of the Negev, Beer Sheva, Israel
Other persons with the same name
- Aviad Cohen 0001 — Intel Corporation, Haifa, Israel
- Aviad Cohen 0003 — Mobileye
- Aviad Cohen 0004 — Samsung Israel R&D Center, Tel Aviv, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Trivikram Muralidharan, Aviad Cohen, Noa Gerson, Nir Nissim:
File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements. ACM Comput. Surv. 55(5): 108:1-108:45 (2023) - [j16]Tal Tsafrir, Aviad Cohen, Etay Nir, Nir Nissim:
Efficient feature extraction methodologies for unknown MP4-Malware detection using Machine learning algorithms. Expert Syst. Appl. 219: 119615 (2023) - 2022
- [j15]Trivikram Muralidharan, Aviad Cohen, Assaf Cohen, Nir Nissim:
The infinite race between steganography and steganalysis in images. Signal Process. 201: 108711 (2022) - 2021
- [c6]Ori Or-Meir, Aviad Cohen, Yuval Elovici, Lior Rokach, Nir Nissim:
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis. IJCNN 2021: 1-8 - 2020
- [j14]Aviad Cohen, Nir Nissim, Yuval Elovici:
MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images. IEEE Access 8: 19997-20011 (2020) - [j13]Matan Kintzlinger, Aviad Cohen, Nir Nissim, Moshe Rav-Acha, Vladimir Khalameizer, Yuval Elovici, Yuval Shahar, Amos Katz:
CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices. IEEE Access 8: 48123-48140 (2020) - [j12]Ofir Landau, Aviad Cohen, Shirley Gordon, Nir Nissim:
Mind your privacy: Privacy leakage through BCI applications using machine learning methods. Knowl. Based Syst. 198: 105932 (2020) - [j11]Daniel Nahmias, Aviad Cohen, Nir Nissim, Yuval Elovici:
Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments. Neural Networks 124: 243-257 (2020) - [j10]Assaf Cohen, Aviad Cohen, Nir Nissim:
ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks. Neural Networks 131: 64-77 (2020)
2010 – 2019
- 2019
- [j9]Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles:
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework. IEEE Access 7: 110050-110073 (2019) - [j8]Nir Nissim, Omri Lahav, Aviad Cohen, Yuval Elovici, Lior Rokach:
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud. Comput. Secur. 87 (2019) - [c5]Daniel Nahmias, Aviad Cohen, Nir Nissim, Yuval Elovici:
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning. IJCNN 2019: 1-8 - 2018
- [j7]Aviad Cohen, Nir Nissim:
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Expert Syst. Appl. 102: 158-178 (2018) - [j6]Aviad Cohen, Nir Nissim, Yuval Elovici:
Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods. Expert Syst. Appl. 110: 143-169 (2018) - [j5]Nir Nissim, Yuval Lapidot, Aviad Cohen, Yuval Elovici:
Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining. Knowl. Based Syst. 153: 147-175 (2018) - 2017
- [j4]Nir Nissim, Aviad Cohen, Yuval Elovici:
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology. IEEE Trans. Inf. Forensics Secur. 12(3): 631-646 (2017) - [c4]Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles:
Scholarly Digital Libraries as a Platform for Malware Distribution. SG-CRC 2017: 107-128 - 2016
- [j3]Aviad Cohen, Nir Nissim, Lior Rokach, Yuval Elovici:
SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods. Expert Syst. Appl. 63: 324-343 (2016) - [j2]Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren Bar-Ad, Yuval Elovici:
Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework. Secur. Informatics 5(1): 1 (2016) - 2015
- [j1]Nir Nissim, Aviad Cohen, Chanan Glezer, Yuval Elovici:
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. Comput. Secur. 48: 246-266 (2015) - [c3]Nir Nissim, Aviad Cohen, Yuval Elovici:
Boosting the Detection of Malicious Documents Using Designated Active Learning Methods. ICMLA 2015: 760-765 - [c2]Yisroel Mirsky, Aviad Cohen, Roni Stern, Ariel Felner, Lior Rokach, Yuval Elovici, Bracha Shapira:
Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains. SOCS 2015: 70-77 - 2014
- [c1]Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Mattan Edry, Oren Bar-Ad, Yuval Elovici:
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files. JISIC 2014: 91-98
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 19:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint