Micha Moffie
contact information
Researcher Privacy and SecurityHaifa Research Lab, Haifa, Israel +972
4
8296446
4
8296446 links
2020
Data Minimization for GDPR Compliance in Machine Learning Models
Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash
2020
Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash
2020
Anonymizing Machine Learning Models
Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash
2020
Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash
2020
Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0
Xabier Larrucea, Micha Moffie, Sigal Asaf, Izaskun Santamaria
Computer Standards & Interfaces69, 103408, 2020
Xabier Larrucea, Micha Moffie, Sigal Asaf, Izaskun Santamaria
Computer Standards & Interfaces69, 103408, 2020
2019
Multi-value Classification of Ambiguous Personal Data
Sigal Assaf, Ariel Farkash, Micha Moffie
New Trends in Model and Data Engineering - MEDI 2019 International Workshops, DETECT, DSSGA, TRIDENT, Toulouse, France, October 28-31, 2019, Proceedings, pp. 202--208
Sigal Assaf, Ariel Farkash, Micha Moffie
New Trends in Model and Data Engineering - MEDI 2019 International Workshops, DETECT, DSSGA, TRIDENT, Toulouse, France, October 28-31, 2019, Proceedings, pp. 202--208
2016
Supporting Coordinated Maintenance of System Trustworthiness and User
Trust at Runtime
Torsten Bandyszak, Micha Moffie, Abigail Goldsteen, Panos Melas, Bassem I. Nasser, Costas Kalogiros, Gabriele Barni, Sandro Hartenstein, Giorgos Giotis, Thorsten Weyer
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings, pp. 96--112
Torsten Bandyszak, Micha Moffie, Abigail Goldsteen, Panos Melas, Bassem I. Nasser, Costas Kalogiros, Gabriele Barni, Sandro Hartenstein, Giorgos Giotis, Thorsten Weyer
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings, pp. 96--112
2015
Trust and Trustworthiness Maintenance: From Architecture to Evaluation
Mohamed Bishr, Christian Heinz, Torsten Bandyszak, Micha Moffie, Abigail Goldsteen, Willis Chen, Thorsten Weyer, Sotiris Ioannidis, Costas Kalogiros
Lecture Notes in Computer Science9229, 310-320, 2015
Mohamed Bishr, Christian Heinz, Torsten Bandyszak, Micha Moffie, Abigail Goldsteen, Willis Chen, Thorsten Weyer, Sotiris Ioannidis, Costas Kalogiros
Lecture Notes in Computer Science9229, 310-320, 2015
Cyber-Physical Systems Design for Runtime Trustworthiness Maintenance Supported by Tools
Torsten Bandyszak, Nazila Mohammadi, Mohamed Bishr, Abigail Goldsteen, Micha Moffie, Bassem Nasser, Sandro Hartenstein, Symeon Meichanetzoglou
2015
Torsten Bandyszak, Nazila Mohammadi, Mohamed Bishr, Abigail Goldsteen, Micha Moffie, Bassem Nasser, Sandro Hartenstein, Symeon Meichanetzoglou
2015
Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems
Nazila Mohammadi, Torsten Bandyszak, Abigail Goldsteen, Costas Kalogiros, Thorsten Weyer, Micha Moffie, Bassem Nasser, Mike Surridge
CEUR Workshop Proceedings1367, 2015
Nazila Mohammadi, Torsten Bandyszak, Abigail Goldsteen, Costas Kalogiros, Thorsten Weyer, Micha Moffie, Bassem Nasser, Mike Surridge
CEUR Workshop Proceedings1367, 2015
A Tool for Monitoring and Maintaining System Trustworthiness at Runtime
Abigail Goldsteen, Micha Moffie, Torsten Bandyszak, Nazila Mohammadi, X. Chen, Symeon Meichanetzoglou, Sotiris Ioannidis, Panos Chatziadam
2015
Abigail Goldsteen, Micha Moffie, Torsten Bandyszak, Nazila Mohammadi, X. Chen, Symeon Meichanetzoglou, Sotiris Ioannidis, Panos Chatziadam
2015
2014
Maintaining Trustworthiness of Socio-Technical Systems at Run-Time
Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem Nasser, Mike Surridge
TrustBus 2014 : 11th International Conference on Trust, Privacy & Security in Digital Business
Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem Nasser, Mike Surridge
TrustBus 2014 : 11th International Conference on Trust, Privacy & Security in Digital Business
2013
Towards Trustworthiness Assurance in the Cloud
Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per H\aakon Meland, Micha Moffie, Nazila Gol Mohammadi, Sachar Paulus, Stuart Short
Cyber Security and Privacy, pp. 3--15, Springer, 2013
Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per H\aakon Meland, Micha Moffie, Nazila Gol Mohammadi, Sachar Paulus, Stuart Short
Cyber Security and Privacy, pp. 3--15, Springer, 2013
2011
Workload characterization at the virtualization layer
Fatemeh Azmandian, Micha Moffie, Jennifer G Dy, Javed A Aslam, David R Kaeli
Modeling, Analysis \& Simulation of Computer and Telecommunication Systems (MASCOTS), 2011 IEEE 19th International Symposium on, pp. 63--72
Fatemeh Azmandian, Micha Moffie, Jennifer G Dy, Javed A Aslam, David R Kaeli
Modeling, Analysis \& Simulation of Computer and Telecommunication Systems (MASCOTS), 2011 IEEE 19th International Symposium on, pp. 63--72
Virtual machine monitor-based lightweight intrusion detection
Fatemeh Azmandian, Micha Moffie, Malak Alshawabkeh, Jennifer Dy, Javed Aslam, David Kaeli
ACM SIGOPS Operating Systems Review 45(2), 38--53, ACM, 2011
Fatemeh Azmandian, Micha Moffie, Malak Alshawabkeh, Jennifer Dy, Javed Aslam, David Kaeli
ACM SIGOPS Operating Systems Review 45(2), 38--53, ACM, 2011
2010
Effective virtual machine monitor intrusion detection using feature selection on highly imbalanced data
Malak Alshawabkeh, Micha Moffie, Fatemeh Azmandian, Javed A Aslam, Jennifer Dy, David Kaeli
Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on, pp. 823--827
Malak Alshawabkeh, Micha Moffie, Fatemeh Azmandian, Javed A Aslam, Jennifer Dy, David Kaeli
Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on, pp. 823--827
2007
Exploring novel parallelization technologies for 3-D imaging applications
Diego Rivera, Dana Schaa, Micha Moffie, David Kaeli
Computer Architecture and High Performance Computing, 2007. SBAC-PAD 2007. 19th International Symposium on, pp. 26--33
Diego Rivera, Dana Schaa, Micha Moffie, David Kaeli
Computer Architecture and High Performance Computing, 2007. SBAC-PAD 2007. 19th International Symposium on, pp. 26--33
Towards trustworthy virtualisation environments: Xen library os security service infrastructure
Melvin J Anderson, Micha Moffie, Chris I Dalton, others
HP Tech Reort, 88--111, 2007
Melvin J Anderson, Micha Moffie, Chris I Dalton, others
HP Tech Reort, 88--111, 2007
2006
Hunting trojan horses
Micha Moffie, Winnie Cheng, David Kaeli, Qin Zhao
Proceedings of the 1st workshop on Architectural and system support for improving software dependability, pp. 12--17, 2006
Micha Moffie, Winnie Cheng, David Kaeli, Qin Zhao
Proceedings of the 1st workshop on Architectural and system support for improving software dependability, pp. 12--17, 2006
2005
ASM: application security monitor
Micha Moffie, David Kaeli
ACM SIGARCH Computer Architecture News 33(5), 21--26, ACM, 2005
Micha Moffie, David Kaeli
ACM SIGARCH Computer Architecture News 33(5), 21--26, ACM, 2005
PARROT: power awareness through selective dynamically optimized traces
Roni Rosner, Yoav Almog, Micha Moffie, Naftali Schwartz, Avi Mendelson
Power-Aware Computer Systems, pp. 196--214, Springer, 2005
Roni Rosner, Yoav Almog, Micha Moffie, Naftali Schwartz, Avi Mendelson
Power-Aware Computer Systems, pp. 196--214, Springer, 2005
Counting polyominoes on twisted cylinders
Gill Barequet, Micha Moffie, Ares Rib\'o, G\"unter Rote
Proceedings of 2005 European Conference on Combinatorics, Graph Theory and Applications (EuroComb’05), Ed. S. Felsner, Discrete Mathematics and Theoretical Computer Science Proceedings AE
Gill Barequet, Micha Moffie, Ares Rib\'o, G\"unter Rote
Proceedings of 2005 European Conference on Combinatorics, Graph Theory and Applications (EuroComb’05), Ed. S. Felsner, Discrete Mathematics and Theoretical Computer Science Proceedings AE
Characterizing antivirus workload execution
Derek Uluski, Micha Moffie, David Kaeli
ACM SIGARCH Computer Architecture News 33(1), 90--98, ACM, 2005
Derek Uluski, Micha Moffie, David Kaeli
ACM SIGARCH Computer Architecture News 33(1), 90--98, ACM, 2005
2004
The Complexity of Jensen's Algorithm for Counting Polyominoes.
Gill Barequet, Micha Moffie
ALENEX/ANALC, pp. 161--169, 2004
Gill Barequet, Micha Moffie
ALENEX/ANALC, pp. 161--169, 2004
Analysis of thermal monitor features of the Intel Pentium M processor
Efi Rotem, Alon Naveh, Micha Moffie, Avi Mendelson
TACS Workshop at ISCA-31, 2004
Efi Rotem, Alon Naveh, Micha Moffie, Avi Mendelson
TACS Workshop at ISCA-31, 2004
Power awareness through selective dynamically optimized traces
Roni Rosner, Yoav Almog, Micha Moffie, Naftali Schwartz, Avi Mendelson
Computer Architecture, 2004. Proceedings. 31st Annual International Symposium on, pp. 162--173
Roni Rosner, Yoav Almog, Micha Moffie, Naftali Schwartz, Avi Mendelson
Computer Architecture, 2004. Proceedings. 31st Annual International Symposium on, pp. 162--173
2003
Selecting long atomic traces for high coverage
Roni Rosner, Micha Moffie, Yiannakis Sazeides, Ronny Ronen
Proceedings of the 17th annual international conference on Supercomputing, pp. 2--11, 2003
Roni Rosner, Micha Moffie, Yiannakis Sazeides, Ronny Ronen
Proceedings of the 17th annual international conference on Supercomputing, pp. 2--11, 2003