Micha Moffie  Micha Moffie photo         

contact information

Researcher Privacy and Security
Haifa Research Lab, Haifa, Israel



Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0
Xabier Larrucea, Micha Moffie, Sigal Asaf, Izaskun Santamaria
Computer Standards & Interfaces69, 103408, 2020


Multi-value Classification of Ambiguous Personal Data
Sigal Assaf, Ariel Farkash, Micha Moffie
New Trends in Model and Data Engineering - MEDI 2019 International Workshops, DETECT, DSSGA, TRIDENT, Toulouse, France, October 28-31, 2019, Proceedings, pp. 202--208


Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime
Torsten Bandyszak, Micha Moffie, Abigail Goldsteen, Panos Melas, Bassem I. Nasser, Costas Kalogiros, Gabriele Barni, Sandro Hartenstein, Giorgos Giotis, Thorsten Weyer
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings, pp. 96--112


Maintaining Trustworthiness of Socio-Technical Systems at Run-Time
Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem Nasser, Mike Surridge
TrustBus 2014 : 11th International Conference on Trust, Privacy & Security in Digital Business


Towards Trustworthiness Assurance in the Cloud
Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per H\aakon Meland, Micha Moffie, Nazila Gol Mohammadi, Sachar Paulus, Stuart Short
Cyber Security and Privacy, pp. 3--15, Springer, 2013


Workload characterization at the virtualization layer
Fatemeh Azmandian, Micha Moffie, Jennifer G Dy, Javed A Aslam, David R Kaeli
Modeling, Analysis \& Simulation of Computer and Telecommunication Systems (MASCOTS), 2011 IEEE 19th International Symposium on, pp. 63--72

Virtual machine monitor-based lightweight intrusion detection
Fatemeh Azmandian, Micha Moffie, Malak Alshawabkeh, Jennifer Dy, Javed Aslam, David Kaeli
ACM SIGOPS Operating Systems Review 45(2), 38--53, ACM, 2011


Effective virtual machine monitor intrusion detection using feature selection on highly imbalanced data
Malak Alshawabkeh, Micha Moffie, Fatemeh Azmandian, Javed A Aslam, Jennifer Dy, David Kaeli
Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on, pp. 823--827


Exploring novel parallelization technologies for 3-D imaging applications
Diego Rivera, Dana Schaa, Micha Moffie, David Kaeli
Computer Architecture and High Performance Computing, 2007. SBAC-PAD 2007. 19th International Symposium on, pp. 26--33

Towards trustworthy virtualisation environments: Xen library os security service infrastructure
Melvin J Anderson, Micha Moffie, Chris I Dalton, others
HP Tech Reort, 88--111, 2007


Hunting trojan horses
Micha Moffie, Winnie Cheng, David Kaeli, Qin Zhao
Proceedings of the 1st workshop on Architectural and system support for improving software dependability, pp. 12--17, 2006


ASM: application security monitor
Micha Moffie, David Kaeli
ACM SIGARCH Computer Architecture News 33(5), 21--26, ACM, 2005

PARROT: power awareness through selective dynamically optimized traces
Roni Rosner, Yoav Almog, Micha Moffie, Naftali Schwartz, Avi Mendelson
Power-Aware Computer Systems, pp. 196--214, Springer, 2005

Counting polyominoes on twisted cylinders
Gill Barequet, Micha Moffie, Ares Rib\'o, G\"unter Rote
Proceedings of 2005 European Conference on Combinatorics, Graph Theory and Applications (EuroComb’05), Ed. S. Felsner, Discrete Mathematics and Theoretical Computer Science Proceedings AE

Characterizing antivirus workload execution
Derek Uluski, Micha Moffie, David Kaeli
ACM SIGARCH Computer Architecture News 33(1), 90--98, ACM, 2005


The Complexity of Jensen's Algorithm for Counting Polyominoes.
Gill Barequet, Micha Moffie
ALENEX/ANALC, pp. 161--169, 2004

Analysis of thermal monitor features of the Intel Pentium M processor
Efi Rotem, Alon Naveh, Micha Moffie, Avi Mendelson
TACS Workshop at ISCA-31, 2004

Power awareness through selective dynamically optimized traces
Roni Rosner, Yoav Almog, Micha Moffie, Naftali Schwartz, Avi Mendelson
Computer Architecture, 2004. Proceedings. 31st Annual International Symposium on, pp. 162--173


Selecting long atomic traces for high coverage
Roni Rosner, Micha Moffie, Yiannakis Sazeides, Ronny Ronen
Proceedings of the 17th annual international conference on Supercomputing, pp. 2--11, 2003