Friend or foe? Fake profile identification in online social networks M Fire, D Kagan, A Elyashar, Y Elovici Social Network Analysis and Mining 4, 1-23, 2014 | 147 | 2014 |
Homing socialbots: intrusion on a specific organization's employee using socialbots A Elyashar, M Fire, D Kagan, Y Elovici Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 74 | 2013 |
Creation and management of social network honeypots for detecting targeted cyber attacks A Paradise, A Shabtai, R Puzis, A Elyashar, Y Elovici, M Roshandel, ... IEEE transactions on computational social systems 4 (3), 65-79, 2017 | 65 | 2017 |
Organizational intrusion: Organization mining using socialbots A Elishar, M Fire, D Kagan, Y Elovici 2012 International Conference on Social Informatics, 7-12, 2012 | 40 | 2012 |
Method for protecting user privacy in social networks F Michael, Y Elovici, A Elishar, D Kagan US Patent App. 13/688,276, 2014 | 30 | 2014 |
Social privacy protector-protecting users’ privacy in social networks M Fire, D Kagan, A Elishar, Y Elovici Proceedings of the SOTICS, 2012 | 27 | 2012 |
Guided socialbots: Infiltrating the social networks of specific organizations’ employees A Elyashar, M Fire, D Kagan, Y Elovici AI Communications 29 (1), 87-106, 2016 | 23 | 2016 |
Detecting clickbait in online social media: You won’t believe how we did it A Elyashar, J Bendahan, R Puzis International symposium on cyber security, cryptology, and machine learning …, 2022 | 22 | 2022 |
The state of mind of health care professionals in light of the COVID-19 pandemic: text analysis study of Twitter discourses A Elyashar, I Plochotnikov, IC Cohen, R Puzis, O Cohen Journal of Medical Internet Research 23 (10), e30217, 2021 | 13 | 2021 |
Has the online discussion been manipulated? quantifying online discussion authenticity within online social media A Elyashar, J Bendahan, R Puzis arXiv preprint arXiv:1708.02763, 2017 | 12 | 2017 |
Global and local trends affecting the experience of US and UK healthcare professionals during COVID-19: Twitter text analysis O Slobodin, I Plochotnikov, IC Cohen, A Elyashar, O Cohen, R Puzis International Journal of Environmental Research and Public Health 19 (11), 6895, 2022 | 7 | 2022 |
The chameleon attack: manipulating content display in online social media A Elyashar, S Uziel, A Paradise, R Puzis Proceedings of the Web Conference 2020, 848-859, 2020 | 7 | 2020 |
Measurement of online discussion authenticity within online social media A Elyashar, J Bendahan, R Puzis, MA Sanmateu Proceedings of the 2017 IEEE/ACM International Conference on Advances in …, 2017 | 5 | 2017 |
Iterative query selection for opaque search engines with pseudo relevance feedback M Reuben, A Elyashar, R Puzis Expert Systems with Applications 201, 117027, 2022 | 2 | 2022 |
Learning centrality by learning to route L Bachar, A Elyashar, R Puzis Complex Networks & Their Applications X: Volume 1, Proceedings of the Tenth …, 2022 | 2 | 2022 |
It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees A Elyashar, R Puzis, M Fire IEEE Transactions on Knowledge and Data Engineering 35 (2), 1651-1666, 2021 | 2* | 2021 |
The Security of Organizations and Individuals in Online Social Networks A Elyashar arXiv preprint arXiv:1607.04775, 2016 | 1 | 2016 |
Facebook Applications' Installation and Removal: A Temporal Analysis D Kagan, M Fire, A Elyashar, Y Elovici arXiv preprint arXiv:1309.4067, 2013 | 1 | 2013 |
Enhancing Energy Sector Resilience: Integrating Security by Design Principles D Shirtz, I Koberman, A Elyashar, R Puzis, Y Elovici arXiv preprint arXiv:2402.11543, 2024 | | 2024 |
Method and system for interactive keyword optimization for opaque search engines R Puzis, A Elyashar, M Reuben US Patent 11,809,423, 2023 | | 2023 |