Search Results - "Menahem, Eitan"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Improving malware detection by applying multi-inducer ensemble by Menahem, Eitan, Shabtai, Asaf, Rokach, Lior, Elovici, Yuval

    Published in Computational statistics & data analysis (15-02-2009)
    “…Detection of malicious software (malware) using machine learning methods has been explored extensively to enable fast detection of new released malware. The…”
    Get full text
    Journal Article
  2. 2

    XML-AD: Detecting anomalous patterns in XML documents by Menahem, Eitan, Schclar, Alon, Rokach, Lior, Elovici, Yuval

    Published in Information sciences (01-01-2016)
    “…Many information systems use XML documents to store data and to interact with other systems. Abnormal documents, which can be the result of either an on-going…”
    Get full text
    Journal Article
  3. 3

    Troika – An improved stacking schema for classification tasks by Menahem, Eitan, Rokach, Lior, Elovici, Yuval

    Published in Information sciences (15-12-2009)
    “…Stacking is a general ensemble method in which a number of base classifiers are combined using one meta-classifier which learns their outputs. Such an approach…”
    Get full text
    Journal Article
  4. 4

    F-Sign: Automatic, Function-Based Signature Generation for Malware by Shabtai, A, Menahem, E, Elovici, Y

    “…In this research, we present a new method, termed F-Sign, for automatic extraction of unique signatures from malware files. F-Sign is primarily intended for…”
    Get full text
    Journal Article
  5. 5

    Detecting Spammers via Aggregated Historical Data Set by Menahem, Eitan, Puzis, Rami

    Published 07-05-2012
    “…The battle between email service providers and senders of mass unsolicited emails (Spam) continues to gain traction. Vast numbers of Spam emails are sent…”
    Get full text
    Journal Article
  6. 6

    ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks by Menahem, Eitan, Nakibly, Gabi, Elovici, Yuval

    Published 20-06-2013
    “…In this work we investigate a new approach for detecting attacks which aim to degrade the network's Quality of Service (QoS). To this end, a new network-based…”
    Get full text
    Journal Article
  7. 7

    Combining One-Class Classifiers via Meta-Learning by Menahem, Eitan, Rokach, Lior, Elovici, Yuval

    Published 22-12-2011
    “…Selecting the best classifier among the available ones is a difficult task, especially when only instances of one class exist. In this work we examine the…”
    Get full text
    Journal Article
  8. 8

    Securing Your Transactions: Detecting Anomalous Patterns In XML Documents by Menahem, Eitan, Schclar, Alon, Rokach, Lior, Elovici, Yuval

    Published 09-09-2012
    “…XML transactions are used in many information systems to store data and interact with other systems. Abnormal transactions, the result of either an on-going…”
    Get full text
    Journal Article