Publications
updated: 29.09.2025
The Blavatnik ICRC prides itself on facilitating interdisciplinary and global cyber scientific research.
The cumulative research outputs of the research funded are provided below in annual tabs.
2018
Year | Authors | Title | Publication |
---|---|---|---|
2018 | Adamsky D. | From Moscow with coercion: Russian deterrence theory and strategic culture | Journal of Strategic Studies |
2018 | Aizenbud Y. ; Averbuch A. | Matrix decompositions using sub-Gaussian random matrices | Information and Inference: A Journal of the IMA |
2018 | Alon N. ; Azar Y. ; Berlin M. | The Price of Bounded Preemption | Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures |
2018 | Alpernas K. ; Manevich R. ; Panda A. ; Sagiv M. ; Shenker S. ; Shoham S. ; Velner Y. | Abstract Interpretation of Stateful Networks | |
2018 | Amar H. ; Bao L. ; Busany N. ; Lo D. ; Maoz S. | Using finite-state models for log differencing | Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering |
2018 | Amir E. ; Levi S. ; Livne T. | Do firms underreport information on cyber-attacks? Evidence from capital markets | Review of Accounting Studies |
2018 | Applebaum B. ; Arkis B. | On the power of amortization in secret sharing: d-uniform secret sharing and CDS with constant information rate | Theory of Cryptography (TCC 2018) |
2018 | Applebaum B. ; Holenstein T. ; Mishra M. ; Shayevitz O. | The Communication Complexity of Private Simultaneous Messages, Revisited | Advances in Cryptology–EUROCRYPT 2018 |
2018 | Arad A. ; Penczynski S. | Multi‐Dimensional Reasoning in Competitive Resource Allocation Games: Evidence from Intra-Team Communication | Society for the Advancement of Behavioral Economics (SABE) - International Association for Research in Economic Psychology (IAREP) Conference |
2018 | Atias A. ; Solovey K. ; Salzman O. ; Halperin D. | Effective metrics for multi-robot motion-planning | The International Journal of Robotics Research |
2018 | Azar Y. ; Chiplunkar A. ; Kaplan H. | Prophet secretary: Surpassing the 1-1/e barrier | Proceedings of the 2018 ACM Conference on Economics and Computation |
2018 | Azar Y. ; Cohen IR. ; Panigrahi D. | Randomized algorithms for online vector load balancing | SODA '18: Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms |
2018 | Baram G. ; Cohen D. ; Shapira Z. ; Wechsler O. ; Hight N. ; Ben-Israel I. | Strategic trends in the global cyber conflict | Cyber Security: A Peer-Reviewed Journal |
2018 | Barzilay O. ; Geva H. ; Goldstein A. ; Oestreicher-Singer G. | Equal Opportunity for All? The Long Tail of Crowdfunding: Evidence From Kickstarter | SSRN Electronic Journal |
2018 | Barzilay O. ; Geva H. ; Goldstein A. ; Oestreicher-Singer G. | Open to Everyone? The Long Tail of the Peer Economy: Evidence from Kickstarter | 39th International Conference on Information Systems |
2018 | Birnhack M. | Protecting Privacy in the Digital City הגנה על הפרטיות בעיר הדיגיטלית | Digital City: Planning, Technology, Privacy and Inequality העיר בעידן הדיגיטלי |
2018 | Demchak CC. ; Shavitt Y. | China’s Maxim–Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking | Military Cyber Affairs |
2018 | Deutch D. ; Ginzberg Y. ; Milo T. | Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX | CIKM '18: Proceedings of the 27th ACM International Conference on Information and Knowledge Management |
2018 | Deutsch L. ; Horn D. | The Weight-Shape decomposition of density estimates: A framework for clustering and image analysis algorithms | Pattern Recognition |
2018 | Feldman YM. ; Enea C. ; Morrison A. ; Rinetzky N. ; Shoham S. | Order out of chaos: Proving linearizability using local views | arXiv preprint arXiv:1805.03992 |
2018 | Gandal N. ; Hamrick JT. ; Moore T. ; Oberman T. | Price manipulation in the Bitcoin ecosystem | Journal of Monetary Economics |
2018 | Hadar I. ; Hasson T. ; Ayalon O. ; Toch E. ; Birnhack M. ; Sherman S. ; Balissa A. | Privacy by designers: software developers’ privacy mindset | Empirical Software Engineering |
2018 | Hatuka T. | העיר בעידן הדיגיטלי - תכנון, טכנולוגיה, פרטיות ואי־שוויון | |
2018 | Hatuka T. ; Rosen-Zvi I. ; Birnhack M. ; Toch E. ; Zur H. | The Political Premises of Contemporary Urban Concepts: The Global City, the Sustainable City, the Resilient City, the Creative City, and the Smart City | Planning Theory & Practice |
2018 | Horn D. | Field Formulation of Parzen Data Analysis | arXiv preprint arXiv:1808.08776 |
2018 | Jarovsky A. ; Milo T. ; Novgorodov S. ; Tan WC. | GOLDRUSH: rule sharing system for fraud detection | Proceedings of the Very Large Database Endowment |
2018 | Jarovsky A. ; Milo T. ; Novgorodov S. ; Tan WC. | Rule sharing for fraud detection via adaptation | 2018 IEEE 34th International Conference on Data Engineering (ICDE) |
2018 | Katz O. ; Rinetzky N. ; Yahav E. | Statistical Reconstruction of Class Hierarchies in Binaries | ACM SIGPLAN Notices |
2018 | Katz O. ; Rinetzky N. ; Yahav E. ; ACM SIGPLAN AS. ; ACM SIGLOG | Statistical Reconstruction of Class Hierarchies in Binaries | Proceedings of the 23rd ACM International Conference on Architectural Support for Programming Languages and Operating Systems |
2018 | Khyzha A. ; Attiya H. ; Gotsman A. ; Rinetzky N. ; SIGPLAN S. | Safe privatization in transactional memory | Proceedings of the 23rd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming |
2018 | Kiryati N. ; Barsky T. ; Gellert O. ; Landau Y. | קניין גופני ולמידה עמוקה Bodily Property and Deep Learning | Book in honor of Justice Yoram Danziger |
2018 | Levin A. | Privacy by Design by Regulation: The Case Study of Ontario | Canadian Journal of Comparative and Contemporary Law |
2018 | Pundak C. ; Steinhart Y. ; Goldenberg J. | The Viciousness and Caring of Sharing: Conflicts and Motivations of Online Shamers | Advances in Consumer Research |
2018 | Raban Y. ; Hauptman A. | Foresight of cyber security threat drivers and affecting technologies | Foresight |
2018 | Sternberg N. ; Luria R. ; Sheppes G. | For whom is social-network usage associated with anxiety? The moderating role of neural working-memory filtering of Facebook information | Cognitive, Affective, & Behavioral Neuroscience |
2018 | Tabansky L. | Sticking to their Guns: The Missing RMA for Cybersecurity | Military Cyber Affairs |
2018 | Trabish D. ; Mattavelli A. ; Rinetzky N. ; Cadar C. | Chopped Symbolic Execution | ICSE '18: Proceedings of the 40th International Conference on Software Engineering |
2018 | Zrahia A. | Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views | Journal of Cybersecurity |
2018 | כהן ד. ; ברעם ג. | The use of cyberwarfare in military Influence Operations | שימוש בלוחמת סייבר למבצעי השפעה צבאיים | Maa'rachot - IDF Journal |