Publications
updated: 29.09.2025
The Blavatnik ICRC prides itself on facilitating interdisciplinary and global cyber scientific research.
The cumulative research outputs of the research funded are provided below in annual tabs.
2016
Year | Authors | Title | Publication |
---|---|---|---|
2016 | Afek Y. ; Bremler-Barr A. ; Cohen E. ; Feibish SL. ; Shagam M. | Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection | arXiv preprint arXiv:1612.02636 |
2016 | Aviram N. ; Schinzel S. ; Somorovsky J. ; Heninger N. ; Dankel M. ; Steube J. ; Valenta L. ; Adrian D. ; Halderman JA. ; Dukhovni V. | DROWN: Breaking TLS Using SSLv2 | USENIX Security Symposium |
2016 | Azriel L. ; Ginosar R. ; Gueron S. ; Mendelson A. | Using Scan Side Channel for Detecting IP Theft | Proceedings of the Hardware and Architectural Support for Security and Privacy 2016 |
2016 | Bermanis A. ; Wolf G. ; Averbuch A. | Diffusion-based kernel methods on Euclidean metric measure spaces | Applied and Computational Harmonic Analysis |
2016 | Faisal M. ; Cardenas AA. ; Wool A. | Modeling Modbus TCP for intrusion detection | Communications and Network Security (CNS), 2016 IEEE Conference |
2016 | Gueron S. | Memory Encryption for General-Purpose Processors | IEEE Security and Privacy |
2016 | Housen-Couriel D. | Cybersecurity threats to satellite communications: Towards a typology of state actor responses | Acta Astronautica |
2016 | Milo T. ; Novgorodov S. ; Tan WC. | Rudolf: interactive rule refinement system for fraud detection | Proceedings of the Very Large Database Endowment |
2016 | Tabansky L. | Towards a Theory of Cyber Power: The Israeli Experience with Innovation and Strategy | Cyber Power |
2016 | Tzezana R. | Scenarios for crime and terrorist attacks using the internet of things | European Journal of Futures Research |
2016 | Zilberman N. ; Shavitt Y. | Setting the Foundations for PoP-Based Internet Evolution Models | arXiv preprint arXiv:1612.04096 |