Amit Dvir

ORCID: 0000-0002-3670-0784
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Image and Video Quality Assessment
  • Caching and Content Delivery
  • Wireless Networks and Protocols
  • Energy Efficient Wireless Sensor Networks
  • Advanced Steganography and Watermarking Techniques
  • Video Coding and Compression Technologies
  • Security in Wireless Sensor Networks
  • Spam and Phishing Detection
  • Network Traffic and Congestion Control
  • Vehicular Ad Hoc Networks (VANETs)
  • Cooperative Communication and Network Coding
  • Peer-to-Peer Network Technologies
  • Music and Audio Processing
  • Software-Defined Networks and 5G
  • Speech Recognition and Synthesis
  • Multimedia Communication and Technology
  • Speech and Audio Processing
  • Advanced Authentication Protocols Security
  • Advanced Wireless Network Optimization
  • Traffic Prediction and Management Techniques

Ariel University
2016-2025

University of Central Lancashire
2018

Bar-Ilan University
2016

College of Management Academic Studies
2010-2015

Budapest University of Technology and Economics
2011-2013

Ben-Gurion University of the Negev
2005-2010

Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of thousands constrained nodes unreliable links, presents new challenges. The IPv6 Routing Protocol Low-power Lossy Networks (RPL), have been developed by the IETF ROLL Working Group as preferred to provide functionality in LLNs. RPL provides path diversity building maintaining directed acyclic graphs (DAG) rooted at one (or more) gateway. However, an adversary that impersonates gateway or has compromised...

10.1109/mass.2011.76 article EN 2011-10-01

In this paper we consider an alternative, highly agile approach called backpressure routing for Delay Tolerant Networks (DTN), in which and forwarding decisions are made on a per-packet basis. Using information about queue backlogs, random walk data packet scheduling nodes can make without the notion of end-to-end routes. To best our knowledge, is first ever implementation dynamic DTNs. Simulation results show that proposed has advantages terms DTN networks.

10.1145/1851182.1851233 article EN 2010-08-30

In this paper we consider an alternative, highly agile approach called backpressure routing for Delay Tolerant Networks (DTN), in which and forwarding decisions are made on a per-packet basis. Using information about queue backlogs, random walk data packet scheduling nodes can make without the notion of end-to-end routes. To best our knowledge, is first ever implementation dynamic DTNs. Simulation results show that proposed has advantages terms DTN networks.

10.1145/1851275.1851233 article EN ACM SIGCOMM Computer Communication Review 2010-08-16

Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active passive. In this paper, we consider the passive scenario where adversary does not interact actively with device, but he is able eavesdrop on network traffic device from side. Most Internet encrypted thus attacks challenging. Previous research has shown that information extracted multimedia streams. This includes video title classification non HTTP adaptive streams...

10.1109/tifs.2017.2730819 article EN IEEE Transactions on Information Forensics and Security 2017-07-21

Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active passive. In this paper, we consider the passive scenario where adversary does not interact actively with device, but he is able eavesdrop on network traffic device from side. Most internet encrypted thus attacks challenging. show that an external attacker identify operating system, browser application HTTP (HTTPS). To best our knowledge, first work shows this. We provide...

10.1109/ccnc.2017.8013420 article EN 2017-01-01

The world of malware is shifting towards using encrypted traffic. While encryption improves the privacy users, it brings challenges in fields QoS, QoE, and cybersecurity. Recent state-of-the-art Deep-Learning architectures for traffic classifications demonstrated superb results tasks categorization over In this paper, we leverage feasibility to use such detection classification gain insights into how well these perform domain Specifically, present a model (MalDIST), which outperforms both...

10.1109/ccnc49033.2022.9700625 article EN 2022-01-08

Traffic encryption is vital for internet security but complicates analytical applications like video delivery optimization or quality of experience (QoE) estimation, which often rely on clear text data. While many models address the problem QoE prediction in streaming, conferencing (VC) domain remains underexplored despite rising demand these applications. Existing provide low-resolution predictions, categorizing into broad classes such as "high" "low", rather than providing precise,...

10.3390/s25041009 article EN cc-by Sensors 2025-02-08

Receiver modules in Global Navigation Satellite Systems (GNSS) are capable of providing positioning and velocity estimations that sufficiently accurate for the purpose road navigation. However, even optimal open-sky conditions, GNSS-based carries an average error 2-4 m. This imposes effective limitation on vehicle lane detection, a desired functionality various navigation safety applications. In this paper, we present novel framework lane-level accuracy using GNSS devices 3-D shadow...

10.1109/tits.2013.2294537 article EN IEEE Transactions on Intelligent Transportation Systems 2014-02-11

Abstract This study was designed to improve blood glucose level predictability and future hypoglycemic hyperglycemic event alerts through a novel patient‐specific supervised‐machine‐learning (SML) analysis of based on continuous‐glucose‐monitoring system (CGM) that needs no human intervention, minimises false‐positive alerts. The CGM data over 7 50 non‐consecutive days from 11 type‐1 diabetic patients aged 18 39 with mean HbA1C 7.5% ± 1.2% were analysed using four SML models. algorithm...

10.1002/dmrr.3348 article EN Diabetes/Metabolism Research and Reviews 2020-05-23

Software Defined Networking decouples the control and data planes. The response time quality of service controllers is a key aspect in implementing paradigm. A wireless plane even more challenging. Many radio communication problems arise modeling east west bound southbound interfaces. Wireless networks feature many unique components metrics that often do not exist wired networks: separate transport may intensify on latency within plain with additional interference. Obviously, Wi-Fi based has...

10.1109/ccnc.2018.8319228 article EN 2018-01-01

Malicious domains are increasingly common and pose a severe cybersecurity threat. Specifically, many types of current cyber attacks use URLs for attack communications (e.g., C&C, phishing, spear-phishing). Despite the continuous progress in detecting attacks, there still critical weak spots structure defense mechanisms. Since machine learning has become one most prominent malware detection methods, robust feature selection mechanism is proposed that results malicious domain models...

10.3390/electronics11060969 article EN Electronics 2022-03-21

DASH is new ISO/IEC MPEG and 3GPP standard for HTTP multimedia streaming that begins to be widely accepted in the industry. design flexible support various formats. unify proprietary adaptive solutions suggests differing between them by using different behavioral approaches, each one best suited specific application. Each behavior determined Adaptation Logic (AL), which decides according estimation of network conditions buffer state what suitable segment requested from server. This work...

10.1109/wcnc.2013.6554900 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2013-04-01

The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started encrypt services. As a result, operators often encounter difficulties in shaping encrypted via DPI. This highlights the need for new classification methods enable smart shaping. These will effectively estimate quality...

10.48550/arxiv.1602.00489 preprint EN other-oa arXiv (Cornell University) 2016-01-01

This paper focuses on the centdian problem in a cactus network where is connected undirected graph, and any two simple cycles graph have at most one node common. The has important applications for wireless sensor networks when tree topology might not be applicable extensions to ring architecture. criterion represents convex combination of QoS requirements: transport delay. To best our knowledge, no efficient algorithm yet been developed constructing either sequential or distributed. We first...

10.7155/jgaa.00255 article EN cc-by Journal of Graph Algorithms and Applications 2012-01-01

The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started encrypt services. As a result, operators often encounter difficulties in shaping encrypted via DPI. This highlights the need for new classification methods enable smart shaping. These will effectively estimate quality...

10.1109/dmiaf.2016.7574935 article EN 2016-07-01
Coming Soon ...