Publications

updated: 29.09.2025

The Blavatnik ICRC prides itself on facilitating interdisciplinary and global cyber scientific research.

The cumulative research outputs of the research funded are provided below in annual tabs.

2018
Year Authors Title Publication
2018 Adamsky D. From Moscow with coercion: Russian deterrence theory and strategic culture Journal of Strategic Studies
2018 Aizenbud Y. ; Averbuch A. Matrix decompositions using sub-Gaussian random matrices Information and Inference: A Journal of the IMA
2018 Alon N. ; Azar Y. ; Berlin M. The Price of Bounded Preemption Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures
2018 Alpernas K. ; Manevich R. ; Panda A. ; Sagiv M. ; Shenker S. ; Shoham S. ; Velner Y. Abstract Interpretation of Stateful Networks  
2018 Amar H. ; Bao L. ; Busany N. ; Lo D. ; Maoz S. Using finite-state models for log differencing Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering
2018 Amir E. ; Levi S. ; Livne T. Do firms underreport information on cyber-attacks? Evidence from capital markets Review of Accounting Studies
2018 Applebaum B. ; Arkis B. On the power of amortization in secret sharing: d-uniform secret sharing and CDS with constant information rate Theory of Cryptography (TCC 2018)
2018 Applebaum B. ; Holenstein T. ; Mishra M. ; Shayevitz O. The Communication Complexity of Private Simultaneous Messages, Revisited Advances in Cryptology–EUROCRYPT 2018
2018 Arad A. ; Penczynski S. Multi‐Dimensional Reasoning in Competitive Resource Allocation Games: Evidence from Intra-Team Communication Society for the Advancement of Behavioral Economics (SABE) - International Association for Research in Economic Psychology (IAREP) Conference
2018 Atias A. ; Solovey K. ; Salzman O. ; Halperin D. Effective metrics for multi-robot motion-planning The International Journal of Robotics Research
2018 Azar Y. ; Chiplunkar A. ; Kaplan H. Prophet secretary: Surpassing the 1-1/e barrier Proceedings of the 2018 ACM Conference on Economics and Computation
2018 Azar Y. ; Cohen IR. ; Panigrahi D. Randomized algorithms for online vector load balancing SODA '18: Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms
2018 Baram G. ; Cohen D. ; Shapira Z. ; Wechsler O. ; Hight N. ; Ben-Israel I. Strategic trends in the global cyber conflict Cyber Security: A Peer-Reviewed Journal
2018 Barzilay O. ; Geva H. ; Goldstein A. ; Oestreicher-Singer G. Equal Opportunity for All? The Long Tail of Crowdfunding: Evidence From Kickstarter SSRN Electronic Journal
2018 Barzilay O. ; Geva H. ; Goldstein A. ; Oestreicher-Singer G. Open to Everyone? The Long Tail of the Peer Economy: Evidence from Kickstarter 39th International Conference on Information Systems
2018 Birnhack M. Protecting Privacy in the Digital City הגנה על הפרטיות בעיר הדיגיטלית Digital City: Planning, Technology, Privacy and Inequality העיר בעידן הדיגיטלי
2018 Demchak CC. ; Shavitt Y. China’s Maxim–Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking Military Cyber Affairs
2018 Deutch D. ; Ginzberg Y. ; Milo T. Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX CIKM '18: Proceedings of the 27th ACM International Conference on Information and Knowledge Management
2018 Deutsch L. ; Horn D. The Weight-Shape decomposition of density estimates: A framework for clustering and image analysis algorithms Pattern Recognition
2018 Feldman YM. ; Enea C. ; Morrison A. ; Rinetzky N. ; Shoham S. Order out of chaos: Proving linearizability using local views arXiv preprint arXiv:1805.03992
2018 Gandal N. ; Hamrick JT. ; Moore T. ; Oberman T. Price manipulation in the Bitcoin ecosystem Journal of Monetary Economics
2018 Hadar I. ; Hasson T. ; Ayalon O. ; Toch E. ; Birnhack M. ; Sherman S. ; Balissa A. Privacy by designers: software developers’ privacy mindset Empirical Software Engineering
2018 Hatuka T. העיר בעידן הדיגיטלי - תכנון, טכנולוגיה, פרטיות ואי־שוויון  
2018 Hatuka T. ; Rosen-Zvi I. ; Birnhack M. ; Toch E. ; Zur H. The Political Premises of Contemporary Urban Concepts: The Global City, the Sustainable City, the Resilient City, the Creative City, and the Smart City Planning Theory & Practice
2018 Horn D. Field Formulation of Parzen Data Analysis arXiv preprint arXiv:1808.08776
2018 Jarovsky A. ; Milo T. ; Novgorodov S. ; Tan WC. GOLDRUSH: rule sharing system for fraud detection Proceedings of the Very Large Database Endowment
2018 Jarovsky A. ; Milo T. ; Novgorodov S. ; Tan WC. Rule sharing for fraud detection via adaptation 2018 IEEE 34th International Conference on Data Engineering (ICDE)
2018 Katz O. ; Rinetzky N. ; Yahav E. Statistical Reconstruction of Class Hierarchies in Binaries ACM SIGPLAN Notices
2018 Katz O. ; Rinetzky N. ; Yahav E. ; ACM SIGPLAN AS. ; ACM SIGLOG Statistical Reconstruction of Class Hierarchies in Binaries Proceedings of the 23rd ACM International Conference on Architectural Support for Programming Languages and Operating Systems
2018 Khyzha A. ; Attiya H. ; Gotsman A. ; Rinetzky N. ; SIGPLAN S. Safe privatization in transactional memory Proceedings of the 23rd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming
2018 Kiryati N. ; Barsky T. ; Gellert O. ; Landau Y. קניין גופני ולמידה עמוקה Bodily Property and Deep Learning Book in honor of Justice Yoram Danziger
2018 Levin A. Privacy by Design by Regulation: The Case Study of Ontario Canadian Journal of Comparative and Contemporary Law
2018 Pundak C. ; Steinhart Y. ; Goldenberg J. The Viciousness and Caring of Sharing: Conflicts and Motivations of Online Shamers Advances in Consumer Research
2018 Raban Y. ; Hauptman A. Foresight of cyber security threat drivers and affecting technologies Foresight
2018 Sternberg N. ; Luria R. ; Sheppes G. For whom is social-network usage associated with anxiety? The moderating role of neural working-memory filtering of Facebook information Cognitive, Affective, & Behavioral Neuroscience
2018 Tabansky L. Sticking to their Guns: The Missing RMA for Cybersecurity Military Cyber Affairs
2018 Trabish D. ; Mattavelli A. ; Rinetzky N. ; Cadar C. Chopped Symbolic Execution ICSE '18: Proceedings of the 40th International Conference on Software Engineering
2018 Zrahia A. Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views Journal of Cybersecurity
2018 כהן ד. ; ברעם ג. The use of cyberwarfare in military Influence Operations | שימוש בלוחמת סייבר למבצעי השפעה צבאיים Maa'rachot - IDF Journal
Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained
here and / or the use of such content is in your opinion infringing Contact the referral system >>