no code implementations • 11 Jul 2024 • Beni Ifland, Elad Duani, Rubin Krief, Miro Ohana, Aviram Zilberman, Andres Murillo, Ofir Manor, Ortal Lavi, Hikichi Kenji, Asaf Shabtai, Yuval Elovici, Rami Puzis
Communication network engineering in enterprise environments is traditionally a complex, time-consuming, and error-prone manual process.
no code implementations • 11 May 2023 • Natan Semyonov, Rami Puzis, Asaf Shabtai, Gilad Katz
Watermarking is one of the most important copyright protection tools for digital media.
no code implementations • 29 Dec 2022 • Moti Cohen, Lior Rokach, Rami Puzis
Our approach uses network embedding techniques to leverage CDN information without having to build the metrics manually.
1 code implementation • 10 Nov 2022 • Rami Puzis
Wave propagation through nodes and links of a network forms the basis of spectral graph theory.
no code implementations • 23 Dec 2020 • Aviad Elyashar, Maor Reuben, Rami Puzis
IQS is applied to automatically collect a large-scale fake news dataset of about 70K true and fake news items.
1 code implementation • 3 Oct 2020 • Elad Rapaport, Ingmar Poese, Polina Zilberman, Oliver Holschke, Rami Puzis
Unfortunately, in case of a surge in traffic demand, for example due to a content trending in a certain country, the capacity of the private interconnect may deplete and the content provider/distributor would have to reroute the excess traffic through transit providers.
no code implementations • 24 May 2020 • Aviad Elyashar, Rami Puzis, Michael Fire
Searching for information about a specific person is an online activity frequently performed by many users.
no code implementations • 5 Mar 2020 • Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai
In this paper, we present DANTE: a framework and algorithm for mining darknet traffic.
no code implementations • 23 Feb 2020 • Sigal Shaked, Amos Zamir, Roman Vainshtein, Moshe Unger, Lior Rokach, Rami Puzis, Bracha Shapira
We examined two methods for extracting sequences of activities: a Markov model and a neural language model.
1 code implementation • 16 Jan 2020 • Aviad Elyashar, Sagi Uziel, Abigail Paradise, Rami Puzis
In this article, we discuss the Chameleon attack technique, a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection.
Social and Information Networks
no code implementations • 9 Dec 2019 • Aviad Elyashar, Rami Puzis, Michael Fire
As a result, there is a need for an effective tool for improved synonym suggestion.
1 code implementation • 6 Mar 2019 • Rami Puzis, Hadar Polad, Bracha Shapira
Before executing an attack, adversaries usually explore the victim's network in an attempt to infer the network topology and identify vulnerabilities in the victim's servers and personal computers.
no code implementations • 1 Jan 2017 • Andrey Finkelstein, Ron Biton, Rami Puzis, Asaf Shabtai
Today, smartphone devices are owned by a large portion of the population and have become a very popular platform for accessing the Internet.