Contradiction based gray-hole attack minimization for ad-hoc networks N Schweitzer, A Stulman, RD Margalit, A Shabtai IEEE Transactions on Mobile Computing 16 (8), 2174-2183, 2016 | 101 | 2016 |
Mitigating denial of service attacks in OLSR protocol using fictitious nodes N Schweitzer, A Stulman, A Shabtai, RD Margalit IEEE Transactions on Mobile Computing 15 (1), 163-172, 2015 | 66 | 2015 |
Network bottlenecks in OLSR based ad-hoc networks N Schweitzer, A Stulman, T Hirst, RD Margalit, A Shabtai Ad Hoc Networks 88, 36-54, 2019 | 22 | 2019 |
Automatically identifying citations in Hebrew-Aramaic documents Y HaCohen-Kerner, N Schweitzer, D Mughaz Cybernetics and Systems: An International Journal 42 (3), 180-197, 2011 | 13 | 2011 |
Automatic identification of biblical quotations in Hebrew-Aramaic documents Y HaCohen-Kerner, N Schweitzer, Y Shoham International Conference on Knowledge Discovery and Information Retrieval 2 …, 2010 | 6 | 2010 |
Detecting bottlenecks on-the-fly in OLSR based MANETs N Schweitzer, A Stulman, T Hirst, RD Margalit, M Armon, A Shabtai 2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel …, 2014 | 5 | 2014 |
Measuring direct and indirect authorial influence in historical corpora M Koppel, N Schweitzer Journal of the Association for Information Science and Technology 65 (10 …, 2014 | 5 | 2014 |
Persuasive: A node isolation attack variant for OLSR-based MANETs and its mitigation N Schweitzer, L Cohen, A Dvir, A Stulman Ad Hoc Networks 148, 103192, 2023 | 4 | 2023 |
Network wormhole attacks without a traditional wormhole N Schweitzer, A Dvir, A Stulman Ad Hoc Networks 151, 103286, 2023 | 2 | 2023 |
Effectiveness of DCFM on different mobility models N Schweitzer, A Stulman 2020 8th International Conference on Wireless Networks and Mobile …, 2020 | 2 | 2020 |
Neighbor contamination to achieve complete bottleneck control N Schweitzer, A Stulman, A Shabtai Proceedings of the 19th ACM International Conference on Modeling, Analysis …, 2016 | 2 | 2016 |
Achieving manet protection without the use of superfluous fictitious nodes N Schweitzer, L Cohen, T Hirst, A Dvir, A Stulman Computer Communications 229, 107978, 2025 | | 2025 |
Tracking Author's Influence in Historical Textual Corpora N Schweitzer Bar Ilan University. Department of Mathematics and Computer Science., 2012 | | 2012 |
Are Fictitious Nodes Needed at All? N Schweitzer, L Cohen, T Hirst, A Dvir, A Stulman Available at SSRN 4356714, 0 | | |