no code implementations • 30 Nov 2023 • Yizhak Vaisman, Gilad Katz, Yuval Elovici, Asaf Shabtai
To protect an organizations' endpoints from sophisticated cyberattacks, advanced detection methods are required.
no code implementations • 20 Jan 2022 • Hilla Shinitzky, Yuval Shahar, Dan Avraham, Yizhak Vaisman, Yakir Tsizer, Yaniv Leedon
To evaluate our methodology, we collected 2490 responses for different tasks, which we used for feature engineering and for the training of ML models.