Follow
Michael Bohadana
Michael Bohadana
Unknown affiliation
Verified email at post.bgu.ac.il
Title
Cited by
Cited by
Year
N-baiot—network-based detection of iot botnet attacks using deep autoencoders
Y Meidan, M Bohadana, Y Mathov, Y Mirsky, A Shabtai, D Breitenbacher, ...
IEEE Pervasive Computing 17 (3), 12-22, 2018
6782018
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis
Y Meidan, M Bohadana, A Shabtai, JD Guarnizo, M Ochoa, ...
Proceedings of the symposium on applied computing, 506-509, 2017
3252017
Detection of unauthorized IoT devices using machine learning techniques
Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ...
arXiv preprint arXiv:1709.04647, 2017
1992017
Security testbed for Internet-of-Things devices
S Siboni, V Sachidananda, Y Meidan, M Bohadana, Y Mathov, S Bhairav, ...
IEEE transactions on reliability 68 (1), 23-44, 2019
1332019
Reverse engineering IoT devices: Effective techniques and methods
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
IEEE Internet of Things Journal 5 (6), 4965-4976, 2018
272018
Opening Pandora’s box: effective techniques for reverse engineering IoT devices
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
International Conference on Smart Card Research and Advanced Applications, 1-21, 2017
252017
Detection of unauthorized IoT devices using machine learning techniques. arXiv 2017
Y Meidan, M Bohadana, A Shabtai, M Ochoa, NO Tippenhauer, ...
arXiv preprint arXiv:1709.04647, 0
12
METHOD AND APPARATUS FOR DETERMINING AN IDENTITY OF AN UNKNOWN INTERNET-OF-THINGS (IoT) DEVICE IN A COMMUNICATION NETWORK
M Ochoa, NO Tippenhauer, J Guarnizo, Y Elovici, A Shabtai, M Bohadana, ...
US Patent App. 16/489,691, 2020
62020
Detecting Compromised IoT Using Network Traffic Analysis
M Bohadana
Ben-Gurion University of the Negev, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–9