Mobile malware detection through analysis of deviations in application network behavior A Shabtai, L Tenenboim-Chekina, D Mimran, L Rokach, B Shapira, ... Computers & Security 43, 1-18, 2014 | 241 | 2014 |
System for detection of mobile applications network behavior-netwise L Chekina, B Shapira, D Mimran, Y Elovici, C Peylo US Patent 9,369,476, 2016 | 127 | 2016 |
Method and system for task modeling of mobile phone applications A Dayan, T Meytal, D Mimran, B Shapira, P Shoval, L Meira, K Henke, ... US Patent 8,776,009, 2014 | 44 | 2014 |
Detecting application update attack on mobile devices through network featur L Tenenboim-Chekina, O Barad, A Shabtai, D Mimran, L Rokach, ... 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013 | 40 | 2013 |
Detection of deviations in mobile applications network behavior L Chekina, D Mimran, L Rokach, Y Elovici, B Shapira arXiv preprint arXiv:1208.0564, 2012 | 39 | 2012 |
Security of open radio access networks D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt, H Lehmann, Y Elovici, ... Computers & Security 122, 102890, 2022 | 28 | 2022 |
Evaluating the security of open radio access networks D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt, H Lehmann, Y Elovici, ... arXiv preprint arXiv:2201.06080, 2022 | 23 | 2022 |
Platform for protecting small and medium enterprises from cyber security threats A Shabtai, Y Elovici, C Peylo, B Chizi, B Zacharish, D Mimran, T Glemser US Patent 10,091,220, 2018 | 20 | 2018 |
Adversarial machine learning threat analysis and remediation in open radio access network (o-ran) E Habler, R Bitton, D Avraham, E Klevansky, D Mimran, O Brodt, ... Journal of Network and Computer Applications 236, 104090, 2025 | 15 | 2025 |
Method and system for monitoring exposure to physical advertisments B Chizi, Y Elovici, DD Mimran US Patent App. 14/548,342, 2015 | 13 | 2015 |
Method for increasing the awareness of headphone users, using selective audio B Chizi, DD MIMRAN, B Shapira, G Rosen US Patent 9,788,101, 2017 | 12 | 2017 |
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. R Bitton, D Avraham, E Klevansky, D Mimran, O Brodt, H Lehmann, ... | 11 | 2022 |
Synthetic data generation method BAR Ariel, B Chizi, D Mimran, L Rokach, B Shapira, A Grothe, ... US Patent 10,489,524, 2019 | 10 | 2019 |
Evaluation of security solutions for Android systems A Shabtai, D Mimran, Y Elovici arXiv preprint arXiv:1502.04870, 2015 | 9 | 2015 |
Nesto-Network selection and traffic offloading system for android mobile devices A Bar, D Mimran, L Chekina, Y Elovici, B Shapira 2013 9th International Wireless Communications and Mobile Computing …, 2013 | 8 | 2013 |
System for characterizing geographical locations based on multi sensors anonymous data sources Y Elovici, D Mimran, B Chizi, A Binun, M Bixenspaner, P Ackerman US Patent 9,609,483, 2017 | 4 | 2017 |
System for analyzing mobile telephone users locations and classifications, while maintaining users privacy constraints Y Elovici, D Mimran, B Chizi, P Ackerman, M Bixenspaner US Patent App. 14/337,278, 2015 | 3 | 2015 |
All the news that's fit to e-ink O Inbar, N Ben-Asher, T Porat, D Mimran, B Shapira, P Shoval, J Meyer, ... CHI'08 Extended Abstracts on Human Factors in Computing Systems, 3621-3626, 2008 | 3 | 2008 |
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI Y Schwartz, L Benshimol, D Mimran, Y Elovici, A Shabtai arXiv preprint arXiv:2407.05194, 2024 | 2 | 2024 |
Method and system for obtaining distanced audio by a portable device B Chizi, B Shapira, DD MIMRAN US Patent 9,883,346, 2018 | 2 | 2018 |