default search action
Chanan Glezer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c10]Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:
Security Ranking of IoT Devices Using an AHP Model. CSCML 2020: 29-44
2010 – 2019
- 2019
- [c9]Shachar Siboni, Chanan Glezer, Asaf Shabtai, Yuval Elovici:
A Weighted Risk Score Model for IoT Devices. SpaCCS Workshops 2019: 20-34 - 2015
- [j23]Nir Nissim, Aviad Cohen, Chanan Glezer, Yuval Elovici:
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. Comput. Secur. 48: 246-266 (2015) - 2012
- [j22]Iris Reychav, Eric W. Stein, Jacob Weisberg, Chanan Glezer:
The Role of Knowledge Sharing in Raising the Task Innovativeness of Systems Analysts. Int. J. Knowl. Manag. 8(2): 1-22 (2012) - [j21]Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss:
"Andromaly": a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1): 161-190 (2012) - 2011
- [j20]Lior Lazar, Omer Tikolsky, Chanan Glezer, Moshe Zviran:
Personalized Cognitive Passwords: An Exploratory Assessment. Inf. Manag. Comput. Secur. 19(1): 25-41 (2011) - [j19]Neomi Kaplan-Mor, Chanan Glezer, Moshe Zviran:
A comparative analysis of end-user training methods. J. Syst. Inf. Technol. 13(1): 25-42 (2011) - [j18]Rami Puzis, Meytal Tubi, Yuval Elovici, Chanan Glezer, Shlomi Dolev:
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks. ACM Trans. Model. Comput. Simul. 22(1): 5:1-5:26 (2011) - 2010
- [j17]Tamir Bechor, Seev Neumann, Moshe Zviran, Chanan Glezer:
A contingency model for estimating success of strategic information systems planning. Inf. Manag. 47(1): 17-29 (2010) - [j16]Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev, Chanan Glezer:
Google Android: A Comprehensive Security Assessment. IEEE Secur. Priv. 8(2): 35-44 (2010) - [j15]Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Rokach:
Auto-Sign: an automatic signature generator for high-speed malware filtering devices. J. Comput. Virol. 6(2): 91-103 (2010)
2000 – 2009
- 2009
- [j14]Stanislav Berlin, Tzvi Raz, Chanan Glezer, Moshe Zviran:
Comparison of estimation methods of cost and duration in IT projects. Inf. Softw. Technol. 51(4): 738-748 (2009) - [j13]Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer:
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Inf. Secur. Tech. Rep. 14(1): 16-29 (2009) - [j12]Erez Shmueli, Ronen Vaisenberg, Yuval Elovici, Chanan Glezer:
Database encryption: an overview of contemporary challenges and design considerations. SIGMOD Rec. 38(3): 29-34 (2009) - [c8]Erez Shmueli, Alexander Kruglov, Rami Puzis, Yuval Elovici, Roman Englert, Chanan Glezer:
An Attentive Digital Signage System. MuC (Workshopband) 2009: 10-15 - 2008
- [c7]Sudha Krishnamurthy, Omer Anson, Lior Sapir, Chanan Glezer, Mauro Rois, Ilana Shub, Kilian Schloeder:
Automation of Facility Management Processes Using Machine-to-Machine Technologies. IOT 2008: 68-86 - 2007
- [c6]Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. CIDM 2007: 202-209 - [c5]Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Chanan Glezer, Yuval Shahar, Yuval Elovici:
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. CISDA 2007: 169-177 - [c4]Chanan Glezer, Sudha Krishnamurthy, Kilian Schloeder, Omer Anson, Gil Tahan:
M2MGen- An Application Generator for Machine to Machine (M2M) Applications. IWRT 2007: 133-140 - [c3]Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, Chanan Glezer:
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. KI 2007: 44-50 - 2006
- [j11]Moshe Zviran, Chanan Glezer, Itay Avni:
User satisfaction from commercial web sites: The effect of design and use. Inf. Manag. 43(2): 157-178 (2006) - 2005
- [j10]Moshe Zviran, Chanan Glezer:
Website and organisational characteristics of Israeli firms. Int. J. Electron. Bus. 3(5): 411-426 (2005) - [j9]Chanan Glezer, Mark Last, Efrat Nachmany, Peretz Shoval:
Quality and comprehension of UML interaction diagrams-an experimental comparison. Inf. Softw. Technol. 47(10): 675-692 (2005) - [j8]Yuval Elovici, Chanan Glezer, Bracha Shapira:
Enhancing customer privacy while searching for products and services on the world wide web. Internet Res. 15(4): 378-399 (2005) - [c2]Chanan Glezer, Mark Last, Efrat Nahmani, Peretz Shoval:
Experimental Comparison of Sequence and Collaboration Diagrams in Different Application Domains. EMMSAD 2005: 77-90 - 2004
- [c1]Chanan Glezer, Moshe Zviran:
A Reconfiguration Algorithm for Distributed Computer Networks. ICEIS (1) 2004: 491-494 - 2003
- [j7]Moshe Zviran, Niv Ahituv, Chanan Glezer:
A conceptual model for increasing utilization of dependable computer networks. Data Knowl. Eng. 46(3): 247-269 (2003) - [j6]Chanan Glezer:
A conceptual model of an interorganizational intelligent meeting-scheduler (IIMS). J. Strateg. Inf. Syst. 12(1): 47-70 (2003) - 2001
- [j5]Chanan Glezer, Surya B. Yadav:
A Conceptual Model of an Intelligent Catalog Search System. J. Organ. Comput. Electron. Commer. 11(1): 31-46 (2001) - 2000
- [j4]Moshe Zviran, Chanan Glezer:
Towards Generating a Data Integrity Standard. Data Knowl. Eng. 32(3): 291-313 (2000) - [j3]Ran Giladi, Chanan Glezer, Nir Melamoud, Phillip Ein-Dor, Opher Etzion:
The metaknowledge-based intelligent routing system (MIRS). Data Knowl. Eng. 34(2): 189-217 (2000)
1990 – 1999
- 1999
- [j2]Niv Ahituv, Moshe Zviran, Chanan Glezer:
Top Management Toolbox for Managing Corporate IT. Commun. ACM 42(4): 93-99 (1999) - [j1]Chanan Glezer, Surya B. Yadav:
A Conceptual Model of an Intelligent Meeting-Scheduler. J. Organ. Comput. Electron. Commer. 9(4): 233-251 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint