What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rami Puzis
Google Scholar
ORCID:
0000-0002-7229-3899
10
publications in security and cryptology related venues
Year
Venue
Title
2023
journals/tifs
MABAT: A Multi-Armed Bandit Approach for Threat-Hunting.
Liad Dekel
Ilia Leybovich
Polina Zilberman
Rami Puzis
2023
conf/ccsw-ws
CDGeB: Cloud Data Geolocation Benchmark.
Adi Offer
Aviram Zilberman
Asaf Shabtai
Yuval Elovici
Rami Puzis
2023
conf/esorics
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT.
Nir Daniel
Florian Klaus Kaiser
Anton Dzega
Aviad Elyashar
Rami Puzis
2023
conf/esorics
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment.
Ofir Cohen
Ron Bitton
Asaf Shabtai
Rami Puzis
2021
journals/compsec
Android malware detection via an app similarity graph.
Tatiana Frenklach
Dvir Cohen
Asaf Shabtai
Rami Puzis
2020
conf/esorics
DANTE: A Framework for Mining and Monitoring Darknet Traffic.
Dvir Cohen
Yisroel Mirsky
Manuel Kamp
Tobias Martin
Yuval Elovici
Rami Puzis
Asaf Shabtai
2019
conf/wisec
Deployment optimization of IoT devices through attack graph analysis.
Noga Agmon
Asaf Shabtai
Rami Puzis
2018
journals/compsec
Taxonomy of mobile users' security awareness.
Ron Bitton
Andrey Finkelshtein
Lior Sidi
Rami Puzis
Lior Rokach
Asaf Shabtai
2018
conf/sec
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Mayank Agarwal
Rami Puzis
Jawad Haj-Yahya
Polina Zilberman
Yuval Elovici
2017
conf/eurosp
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Tomer Gluck
Rami Puzis
Yossi Oren
Asaf Shabtai
Coauthors
Adi Offer
(1)
Andrey Finkelshtein
(1)
Anton Dzega
(1)
Asaf Shabtai
(7)
Aviad Elyashar
(1)
Aviram Zilberman
(1)
Dvir Cohen
(2)
Florian Klaus Kaiser
(1)
Ilia Leybovich
(1)
Jawad Haj-Yahya
(1)
Liad Dekel
(1)
Lior Rokach
(1)
Lior Sidi
(1)
Manuel Kamp
(1)
Mayank Agarwal
(1)
Nir Daniel
(1)
Noga Agmon
(1)
Ofir Cohen
(1)
Polina Zilberman
(2)
Rami Puzis
(10)
Ron Bitton
(2)
Tatiana Frenklach
(1)
Tobias Martin
(1)
Tomer Gluck
(1)
Yisroel Mirsky
(1)
Yossi Oren
(1)
Yuval Elovici
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to