Friend or foe? Fake profile identification in online social networks M Fire, D Kagan, A Elyashar, Y Elovici Social Network Analysis and Mining 4, 1-23, 2014 | 157 | 2014 |
Homing socialbots: intrusion on a specific organization's employee using socialbots A Elyashar, M Fire, D Kagan, Y Elovici Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 80 | 2013 |
Creation and management of social network honeypots for detecting targeted cyber attacks A Paradise, A Shabtai, R Puzis, A Elyashar, Y Elovici, M Roshandel, ... IEEE transactions on computational social systems 4 (3), 65-79, 2017 | 69 | 2017 |
Organizational intrusion: Organization mining using socialbots A Elishar, M Fire, D Kagan, Y Elovici 2012 International Conference on Social Informatics, 7-12, 2012 | 42 | 2012 |
Method for protecting user privacy in social networks F Michael, Y Elovici, A Elishar, D Kagan US Patent App. 13/688,276, 2014 | 31 | 2014 |
Guided socialbots: Infiltrating the social networks of specific organizations’ employees A Elyashar, M Fire, D Kagan, Y Elovici Ai Communications 29 (1), 87-106, 2014 | 26 | 2014 |
Social privacy protector-protecting users’ privacy in social networks M Fire, D Kagan, A Elishar, Y Elovici Proceedings of the SOTICS, 2012 | 26 | 2012 |
Detecting clickbait in online social media: You won’t believe how we did it A Elyashar, J Bendahan, R Puzis International symposium on cyber security, cryptology, and machine learning …, 2022 | 22 | 2022 |
The state of mind of health care professionals in light of the COVID-19 pandemic: text analysis study of Twitter discourses A Elyashar, I Plochotnikov, IC Cohen, R Puzis, O Cohen Journal of Medical Internet Research 23 (10), e30217, 2021 | 20 | 2021 |
Has the online discussion been manipulated? quantifying online discussion authenticity within online social media A Elyashar, J Bendahan, R Puzis arXiv preprint arXiv:1708.02763, 2017 | 12 | 2017 |
Global and local trends affecting the experience of US and UK healthcare professionals during COVID-19: Twitter text analysis O Slobodin, I Plochotnikov, IC Cohen, A Elyashar, O Cohen, R Puzis International Journal of Environmental Research and Public Health 19 (11), 6895, 2022 | 8 | 2022 |
The chameleon attack: manipulating content display in online social media A Elyashar, S Uziel, A Paradise, R Puzis Proceedings of the Web Conference 2020, 848-859, 2020 | 8 | 2020 |
Measurement of online discussion authenticity within online social media A Elyashar, J Bendahan, R Puzis, MA Sanmateu Proceedings of the 2017 IEEE/ACM International Conference on Advances in …, 2017 | 5 | 2017 |
Iterative query selection for opaque search engines with pseudo relevance feedback M Reuben, A Elyashar, R Puzis Expert Systems with Applications 201, 117027, 2022 | 3 | 2022 |
Learning centrality by learning to route L Bachar, A Elyashar, R Puzis Complex Networks & Their Applications X: Volume 1, Proceedings of the Tenth …, 2022 | 2 | 2022 |
It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees A Elyashar, R Puzis, M Fire IEEE Transactions on Knowledge and Data Engineering 35 (2), 1651-1666, 2021 | 2* | 2021 |
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring L Ben-Shimol, E Grolman, A Elyashar, I Maimon, D Mimran, O Brodt, ... arXiv preprint arXiv:2405.07172, 2024 | 1 | 2024 |
Enhancing Energy Sector Resilience: Integrating Security by Design Principles D Shirtz, I Koberman, A Elyashar, R Puzis, Y Elovici arXiv preprint arXiv:2402.11543, 2024 | 1 | 2024 |
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT N Daniel, FK Kaiser, A Dzega, A Elyashar, R Puzis European Symposium on Research in Computer Security, 76-91, 2023 | 1 | 2023 |
The Security of Organizations and Individuals in Online Social Networks A Elyashar arXiv preprint arXiv:1607.04775, 2016 | 1 | 2016 |