Aviad Elyashar
YOU?
Author Swipe
View article: Analyzing Health Care Professionals’ Resilience and Emotional Responses to COVID-19 via Twitter: Retrospective Cohort and Matched Comparison Group Study
Analyzing Health Care Professionals’ Resilience and Emotional Responses to COVID-19 via Twitter: Retrospective Cohort and Matched Comparison Group Study Open
Background The functioning of health care systems in emergencies relies on health care professionals (HCPs). During the COVID-19 pandemic, HCPs faced significant emotional challenges, which affected their productivity. Revealing HCPs’ emot…
View article: Automated Gluten Detection in Bread Images Using Convolutional Neural Networks
Automated Gluten Detection in Bread Images Using Convolutional Neural Networks Open
Celiac disease and gluten sensitivity affect a significant portion of the population and require adherence to a gluten-free diet. Dining in social settings, such as family events, workplace gatherings, or restaurants, makes it difficult to…
View article: LED there be DoS: Exploiting variable bitrate IP cameras for network DoS
LED there be DoS: Exploiting variable bitrate IP cameras for network DoS Open
Variable-bitrate video streaming is ubiquitous in video surveillance and CCTV, enabling high-quality video streaming while conserving network bandwidth. However, as the name suggests, variable-bitrate IP cameras can generate sharp traffic …
View article: Labeling Network Intrusion Detection System (NIDS) Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models
Labeling Network Intrusion Detection System (NIDS) Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models Open
Analysts in Security Operations Centers (SOCs) are often occupied with time-consuming investigations of alerts from Network Intrusion Detection Systems (NIDSs). Many NIDS rules lack clear explanations and associations with attack technique…
View article: Labeling NIDS Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models
Labeling NIDS Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models Open
Analysts in Security Operations Centers (SOCs) are often occupied with time-consuming investigations of alerts from Network Intrusion Detection Systems (NIDS). Many NIDS rules lack clear explanations and associations with attack techniques…
View article: Automated photo filtering for tourism domain using deep and active learning: the case of Israeli and worldwide cities on instagram
Automated photo filtering for tourism domain using deep and active learning: the case of Israeli and worldwide cities on instagram Open
Social media platforms like Instagram significantly influence tourists’ travel decisions by providing them with valuable insights, recommendations, authentic information, and points of interest. However, photos shared with location-specifi…
View article: Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring Open
In a fully managed serverless environment, the cloud service provider is responsible for securing the cloud infrastructure, thereby reducing the operational and maintenance efforts of application developers. However, this environment limit…
View article: Barriers and Suggested Solutions to NursingParticipation in Research: A Systematic Review with NLP Tools (Preprint)
Barriers and Suggested Solutions to NursingParticipation in Research: A Systematic Review with NLP Tools (Preprint) Open
BACKGROUND Healthcare research is pivotal for developing new treatments, improving care quality, and discovering novel treatment methods. Engaging medical staff in research is key to the success of the studies and the staff’s professional…
View article: Enhancing Energy Sector Resilience: Integrating Security by Design Principles
Enhancing Energy Sector Resilience: Integrating Security by Design Principles Open
Security by design, Sbd is a concept for developing and maintaining systems that are, to the greatest extent possible, free from security vulnerabilities and impervious to security attacks. In addition to technical aspects, such as how to …
View article: Global and Local Trends Affecting the Experience of US and UK Healthcare Professionals during COVID-19: Twitter Text Analysis
Global and Local Trends Affecting the Experience of US and UK Healthcare Professionals during COVID-19: Twitter Text Analysis Open
Background: Healthcare professionals (HCPs) are on the frontline of fighting the COVID-19 pandemic. Recent reports have indicated that, in addition to facing an increased risk of being infected by the virus, HCPs face an increased risk of …
View article: The State of Mind of Health Care Professionals in Light of the COVID-19 Pandemic: Text Analysis Study of Twitter Discourses
The State of Mind of Health Care Professionals in Light of the COVID-19 Pandemic: Text Analysis Study of Twitter Discourses Open
Background The COVID-19 pandemic has affected populations worldwide, with extreme health, economic, social, and political implications. Health care professionals (HCPs) are at the core of pandemic response and are among the most crucial fa…
View article: The State of Mind of Health Care Professionals in Light of the COVID-19 Pandemic: Text Analysis Study of Twitter Discourses (Preprint)
The State of Mind of Health Care Professionals in Light of the COVID-19 Pandemic: Text Analysis Study of Twitter Discourses (Preprint) Open
BACKGROUND The COVID-19 pandemic has affected populations worldwide, with extreme health, economic, social, and political implications. Health care professionals (HCPs) are at the core of pandemic response and are among the most crucial f…
View article: Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback
Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback Open
Retrieving information from an online search engine, is the first and most important step in many data mining tasks. Most of the search engines currently available on the web, including all social media platforms, are black-boxes (a.k.a op…
View article: How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning
How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning Open
Searching for information about a specific person is an online activity frequently performed by many users. In most cases, users are aided by queries containing a name and sending back to the web search engines for finding their will. Typi…
View article: The Chameleon Attack: Manipulating Content Display in Online Social Media
The Chameleon Attack: Manipulating Content Display in Online Social Media Open
Online social networks (OSNs) are ubiquitous attracting millions of users all over the world. Being a popular communication media OSNs are exploited in a variety of cyber attacks. In this article, we discuss the Chameleon attack technique,…
View article: The Chameleon Attack: Manipulating Content Display in Online Social\n Media
The Chameleon Attack: Manipulating Content Display in Online Social\n Media Open
Online social networks (OSNs) are ubiquitous attracting millions of users all\nover the world. Being a popular communication media OSNs are exploited in a\nvariety of cyber attacks. In this article, we discuss the Chameleon attack\ntechniq…
View article: It Runs in the Family: Searching for Synonyms Using Digitized Family\n Trees
It Runs in the Family: Searching for Synonyms Using Digitized Family\n Trees Open
Searching for a person's name is a common online activity. However, Web\nsearch engines provide few accurate results to queries containing names. In\ncontrast to a general word which has only one correct spelling, there are\nseveral legiti…
View article: It Runs in the Family: Searching for Similar Names using Digitized Family Trees.
It Runs in the Family: Searching for Similar Names using Digitized Family Trees. Open
Searching for a person's name is a common online activity. However, Web search engines provide few accurate results to queries containing names. In contrast to a general text which has only one correct spelling, there are several legitimat…
View article: It Runs in the Family: Searching for Synonyms Using Digitized Family Trees
It Runs in the Family: Searching for Synonyms Using Digitized Family Trees Open
Searching for a person's name is a common online activity. However, Web search engines provide few accurate results to queries containing names. In contrast to a general word which has only one correct spelling, there are several legitimat…
View article: Detecting Clickbait in Online Social Media: You Won't Believe How We Did It
Detecting Clickbait in Online Social Media: You Won't Believe How We Did It Open
In this paper, we propose an approach for the detection of clickbait posts in online social media (OSM). Clickbait posts are short catchy phrases that attract a user's attention to click to an article. The approach is based on a machine le…
View article: Has the Online Discussion Been Manipulated? Quantifying Online Discussion Authenticity within Online Social Media
Has the Online Discussion Been Manipulated? Quantifying Online Discussion Authenticity within Online Social Media Open
Online social media (OSM) has a enormous influence in today's world. Some individuals view OSM as fertile ground for abuse and use it to disseminate misinformation and political propaganda, slander competitors, and spread spam. The crowdtu…
View article: The Security of Organizations and Individuals in Online Social Networks
The Security of Organizations and Individuals in Online Social Networks Open
The serious privacy and security problems related to online social networks (OSNs) are what fueled two complementary studies as part of this thesis. In the first study, we developed a general algorithm for the mining of data of targeted or…