Match!
Amit Dvir
Ariel University
The InternetDistributed computingComputer networkComputer scienceWireless ad hoc network
55Publications
8H-index
396Citations
What is this?
Publications 55
Newest
#1Uzi Ben-Shalom (Ariel University)H-Index: 3
#2Rinat Moshe (BIU: Bar-Ilan University)
Last. Amit Dvir (Ariel University)H-Index: 8
view all 4 authors...
This study explores the “black box” of face-to-face violence during terror attacks. It is based upon visual analysis of a representative sample of terror attacks that occurred in Israel during 2015–2016, a period which is labeled “The Intifada of Individuals.” We offer a new method for this purpose by using available materials that military sociologists can retrieve and employ when they use the “macro”-level framework in their study of “micro”-level actions. The abundance of audiovisual devices ...
Source
#1Harel Berger (Ariel University)
#2Chen Hajaj (Ariel University)H-Index: 3
Last. Amit Dvir (Ariel University)H-Index: 8
view all 3 authors...
Android malware is a persistent threat to billions of users around the world. As a countermeasure, Android malware detection systems are occasionally implemented. However, these systems are often vulnerable to \emph{evasion attacks}, in which an adversary manipulates malicious instances so that they are misidentified as benign. In this paper, we launch various innovative evasion attacks against several Android malware detection systems. The vulnerability inherent to all of these systems is that ...
#1Amit Dvir (Ariel University)H-Index: 8
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 8
Last. Aviram Zilberman (Ariel University)H-Index: 1
view all 3 authors...
The software defined networking paradigm decouples the network’s control logic (the control plane) from the underlying routers and switches (the data plane), promoting centralization of network control. The controller placement problem is threefold in nature: the number of controllers to be placed in a network, the locations of these controllers and the assignment function of controllers to switches, with all of them important for the design of an efficient control plane. Most of the existing li...
Source
#1Uzi Ben-Shalom (Ariel University)H-Index: 3
#2Amit Dvir (Ariel University)H-Index: 8
Last. Eithan Orkibi (Ariel University)H-Index: 2
view all 6 authors...
AbstractThis article investigates the feasibility of monitoring data obtained from comments posted by basketball fans on their Facebook pages to predict players’ aggression in Israeli basketball ma...
Source
The Domain Name System (DNS) provides a translation between readable domain names and IP addresses. The DNS is a key infrastructure component of the Internet and a prime target for a variety of attacks. One of the most significant threat to the DNS's wellbeing is a DNS poisoning attack, in which the DNS responses are maliciously replaced, or poisoned, by an attacker. To identify this kind of attack, we start by an analysis of different kinds of response times. We present an analysis of typical a...
#1Amit Dvir (Ariel University)H-Index: 8
#2Nissim Harel (HIT: Holon Institute of Technology)H-Index: 2
Last. Ofer Hadar (BGU: Ben-Gurion University of the Negev)H-Index: 16
view all 6 authors...
Quality of Experience is affected by many parameters. For this reason, client-side adaptation logic algorithms often adopt the strategy of optimizing a subset of parameters in the hope of improving the overall QoE. However, as shown here, this approach ends up degrading parameters that are crucial to good Quality of Experience. To resolve this conundrum, we present a new approach for improved Quality of Experience dubbed: Minimal Switch AL (MiSAL). This algorithm substantially reduces the number...
Source
#1Ran Dubin (BGU: Ben-Gurion University of the Negev)H-Index: 5
#2Raffael Shalala (BGU: Ben-Gurion University of the Negev)H-Index: 1
Last. Ofer Hadar (BGU: Ben-Gurion University of the Negev)H-Index: 16
view all 5 authors...
The increasing popularity of online video content and adaptive video streaming services, especially those based on HTTP Adaptive Streaming (HAS) highlights the need for streaming optimization solutions. From a server perspective, the main drawback of HAS is that the user selects the quality of the next video segment without taking the server constraints into account. These constraints include the number of users simultaneously being served and the server’s congestion. Here, we present the Fair S...
1 CitationsSource
#1Uzi Ben Shalom (Ariel University)H-Index: 1
#2Amit Dvir (Ariel University)H-Index: 8
Last. Ofir Pele (Ariel University)H-Index: 8
view all 7 authors...
This study explored the relevancy of internet discourse among football fans and real-life stadium violence. Our hypothesis implies that there are positive correlations between violent utterances in...
2 CitationsSource
#1Amit Dvir (Ariel University)H-Index: 8
#2Angelos K. Marnerides (Lancaster University)H-Index: 8
Last. Nehor Golan (Ariel University)
view all 4 authors...
Recent stringent end-user security and privacy requirements caused the dramatic rise of encrypted video streams in which YouTube encrypted traffic is one of the most prevalent. Regardless of their encrypted nature, metadata derived from such traffic flows can be utilized to identify the title of a video, thus enabling the classification of video streams into a single video title using a given video title set. Nonetheless, scenarios where no video title set is present and a supervised approach is...
Source
#1Amit Dvir (Ariel University)H-Index: 8
#2Vinh-Thong Ta (UCLan: University of Central Lancashire)H-Index: 12
Last. Levente Buttyán (BME: Budapest University of Technology and Economics)H-Index: 43
view all 4 authors...
Several transport protocols for wireless sensor networks (WSNs) have been designed to fulfill efficiency requirements such as energy and reliability. Unfortunately, most of these transport protocols do not include sufficient security mechanisms and hence are vulnerable to numerous reliability and energy attacks. To address these vulnerabilities, this paper proposes a novel secure transport protocol, named as secure transport protocol for wireless sensor networks (STWSN). On the basis of distribu...
Source
123456