Follow
Avishai Wool
Avishai Wool
Professor of Computer Engineering, Tel Aviv University
Verified email at eng.tau.ac.il - Homepage
Title
Cited by
Cited by
Year
Firmato: A novel firewall management toolkit
Y Bartal, A Mayer, K Nissim, A Wool
ACM Transactions on Computer Systems (TOCS) 22 (4), 381-420, 2004
725*2004
A quantitative study of firewall configuration errors
A Wool
Computer 37 (6), 62-67, 2004
6192004
Offline firewall analysis
A Mayer, A Wool, E Ziskind
International Journal of Information Security 5 (3), 125-144, 2006
593*2006
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
N Goldenberg, A Wool
international journal of critical infrastructure protection 6 (2), 63-75, 2013
4142013
Picking virtual pockets using relay attacks on contactless smartcard systems
Z Kfir, A Wool
First International Conference on Security and Privacy for Emerging Areas in …, 2005
3592005
Cracking the bluetooth pin
Y Shaked, A Wool
Proceedings of the 3rd international conference on Mobile systems …, 2005
3162005
Probabilistic quorum systems
D Malkhi, MK Reiter, A Wool, RN Wright
Information and Computation 170 (2), 184-206, 2001
299*2001
Key management for encrypted broadcast
A Wool
ACM Transactions on Information and System Security (TISSEC) 3 (2), 107-134, 2000
273*2000
Computational experience with approximation algorithms for the set covering problem
T Grossman, A Wool
European Journal of Operational Research 101 (1), 81-92, 1997
2521997
The load, capacity and availability of quorum systems.
M Naor, A Wool
SIAM J. Computing 27 (2), 423-447, 1998
2371998
Dictionary attacks using keyboard acoustic emanations
Y Berger, A Wool, A Yeredor
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2362006
The availability of quorum systems
D Peleg, A Wool
Information and Computation 123 (2), 210-223, 1995
2131995
Long-lived broadcast encryption
J Garay, J Staddon, A Wool
Advances in Cryptology—CRYPTO 2000, 333-352, 2000
208*2000
Replication, consistency, and practicality: are these mutually exclusive?
T Anderson, Y Breitbart, HF Korth, A Wool
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
2011998
Architecting the lumeta firewall analyzer
A Wool
Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, 7-7, 2001
1962001
Field classification, modeling and anomaly detection in unknown CAN bus networks
M Markovitz, A Wool
Vehicular Communications 9, 43-52, 2017
1862017
Key management for restricted multicast using broadcast encryption
M Abdalla, Y Shavitt, A Wool
Networking, IEEE/ACM Transactions on 8 (4), 443-454, 2000
160*2000
Access control and signatures via quorum secret sharing
M Naor, A Wool
Parallel and Distributed Systems, IEEE Transactions on 9 (9), 909-922, 1998
1591998
Crumbling walls: A class of practical and efficient quorum systems
D Peleg, A Wool
Distributed Computing 10 (2), 87-97, 1997
157*1997
How to build a low-cost, extended-range RFID skimmer.
I Kirschenbaum, A Wool
15th USENIX Security Symposium, 43-57, 2006
1492006
The system can't perform the operation now. Try again later.
Articles 1–20