Obserwuj
Avishai Wool
Avishai Wool
Professor of Computer Engineering, Tel Aviv University
Zweryfikowany adres z eng.tau.ac.il - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Firmato: A novel firewall management toolkit
Y Bartal, A Mayer, K Nissim, A Wool
ACM Transactions on Computer Systems (TOCS) 22 (4), 381-420, 2004
740*2004
A quantitative study of firewall configuration errors
A Wool
Computer 37 (6), 62-67, 2004
6222004
Offline firewall analysis
A Mayer, A Wool, E Ziskind
International Journal of Information Security 5 (3), 125-144, 2006
600*2006
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
N Goldenberg, A Wool
international journal of critical infrastructure protection 6 (2), 63-75, 2013
4272013
Picking virtual pockets using relay attacks on contactless smartcard systems
Z Kfir, A Wool
First International Conference on Security and Privacy for Emerging Areas in …, 2005
3662005
Cracking the bluetooth pin
Y Shaked, A Wool
Proceedings of the 3rd international conference on Mobile systems …, 2005
3212005
Probabilistic quorum systems
D Malkhi, MK Reiter, A Wool, RN Wright
Information and Computation 170 (2), 184-206, 2001
302*2001
Key management for encrypted broadcast
A Wool
ACM Transactions on Information and System Security (TISSEC) 3 (2), 107-134, 2000
273*2000
Computational experience with approximation algorithms for the set covering problem
T Grossman, A Wool
European Journal of Operational Research 101 (1), 81-92, 1997
2671997
Dictionary attacks using keyboard acoustic emanations
Y Berger, A Wool, A Yeredor
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2462006
The load, capacity and availability of quorum systems.
M Naor, A Wool
SIAM J. Computing 27 (2), 423-447, 1998
2411998
Long-lived broadcast encryption
J Garay, J Staddon, A Wool
Advances in Cryptology—CRYPTO 2000, 333-352, 2000
210*2000
The availability of quorum systems
D Peleg, A Wool
Information and Computation 123 (2), 210-223, 1995
2101995
Replication, consistency, and practicality: are these mutually exclusive?
T Anderson, Y Breitbart, HF Korth, A Wool
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
2031998
Architecting the lumeta firewall analyzer
A Wool
Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, 7-7, 2001
1982001
Field classification, modeling and anomaly detection in unknown CAN bus networks
M Markovitz, A Wool
Vehicular Communications 9, 43-52, 2017
1952017
Access control and signatures via quorum secret sharing
M Naor, A Wool
Parallel and Distributed Systems, IEEE Transactions on 9 (9), 909-922, 1998
1631998
Key management for restricted multicast using broadcast encryption
M Abdalla, Y Shavitt, A Wool
Networking, IEEE/ACM Transactions on 8 (4), 443-454, 2000
162*2000
Crumbling walls: A class of practical and efficient quorum systems
D Peleg, A Wool
Distributed Computing 10 (2), 87-97, 1997
156*1997
How to build a low-cost, extended-range RFID skimmer.
I Kirschenbaum, A Wool
15th USENIX Security Symposium, 43-57, 2006
1512006
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20