Asaf Shabtai

8.2k total citations · 2 hit papers
169 papers, 4.4k citations indexed

About

Asaf Shabtai is a scholar working on Computer Networks and Communications, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Asaf Shabtai has authored 169 papers receiving a total of 4.4k indexed citations (citations by other indexed papers that have themselves been cited), including 93 papers in Computer Networks and Communications, 87 papers in Artificial Intelligence and 75 papers in Signal Processing. Recurrent topics in Asaf Shabtai's work include Network Security and Intrusion Detection (73 papers), Advanced Malware Detection Techniques (67 papers) and Anomaly Detection Techniques and Applications (30 papers). Asaf Shabtai is often cited by papers focused on Network Security and Intrusion Detection (73 papers), Advanced Malware Detection Techniques (67 papers) and Anomaly Detection Techniques and Applications (30 papers). Asaf Shabtai collaborates with scholars based in Israel, Japan and Singapore. Asaf Shabtai's co-authors include Yuval Elovici, Lior Rokach, Chanan Glezer, Moshe Kravchik, Yuval Fledel, Robert Moskovitch, Ron Bitton, Shlomi Dolev, Yair Meidan and Nils Ole Tippenhauer and has published in prestigious journals such as IEEE Communications Surveys & Tutorials, Expert Systems with Applications and IEEE Access.

In The Last Decade

Asaf Shabtai

157 papers receiving 4.1k citations

Hit Papers

“Andromaly”: a behavioral... 2011 2026 2016 2021 2011 2017 100 200 300 400 500

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Asaf Shabtai Israel 30 2.8k 2.5k 1.8k 1.6k 493 169 4.4k
Mourad Debbabi Canada 37 2.7k 1.0× 1.8k 0.7× 2.1k 1.1× 2.0k 1.3× 505 1.0× 304 5.2k
Seyit Camtepe Australia 31 1.9k 0.7× 1.1k 0.4× 1.6k 0.9× 967 0.6× 333 0.7× 119 3.7k
Heejo Lee South Korea 27 2.8k 1.0× 1.2k 0.5× 1.6k 0.9× 1.0k 0.7× 273 0.6× 123 3.9k
Aziz Mohaisen United States 34 2.2k 0.8× 1.5k 0.6× 1.6k 0.8× 1.8k 1.2× 177 0.4× 230 3.9k
Fabio Martinelli Italy 30 2.1k 0.7× 1.9k 0.8× 1.5k 0.8× 1.6k 1.0× 573 1.2× 337 4.1k
Karl Levitt United States 30 3.2k 1.1× 1.5k 0.6× 1.9k 1.0× 1.1k 0.7× 579 1.2× 123 4.7k
Arash Habibi Lashkari Canada 25 5.8k 2.1× 3.3k 1.3× 4.8k 2.6× 1.3k 0.8× 134 0.3× 111 6.9k
Dan Pei China 42 5.0k 1.8× 1.0k 0.4× 3.4k 1.9× 996 0.6× 343 0.7× 212 6.1k
Suman Nath United States 40 3.5k 1.2× 1.1k 0.4× 1.2k 0.7× 1.6k 1.0× 406 0.8× 151 5.4k

Countries citing papers authored by Asaf Shabtai

Since Specialization
Citations

This map shows the geographic impact of Asaf Shabtai's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Asaf Shabtai with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Asaf Shabtai more than expected).

Fields of papers citing papers by Asaf Shabtai

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Asaf Shabtai. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Asaf Shabtai. The network helps show where Asaf Shabtai may publish in the future.

Co-authorship network of co-authors of Asaf Shabtai

This figure shows the co-authorship network connecting the top 25 collaborators of Asaf Shabtai. A scholar is included among the top collaborators of Asaf Shabtai based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Asaf Shabtai. Asaf Shabtai is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Schwartz, Yuval, et al.. (2025). LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI. 1922–1941. 5 indexed citations
2.
Momiyama, S., et al.. (2024). CyberShapley: Explanation, prioritization, and triage of cybersecurity alerts using informative graph representation. Computers & Security. 150. 104270–104270. 1 indexed citations
3.
Elovici, Yuval, et al.. (2024). Detection of compromised functions in a serverless cloud environment. Computers & Security. 150. 104261–104261. 2 indexed citations
4.
Shabtai, Asaf, et al.. (2023). Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. Sensors. 23(8). 4018–4018. 3 indexed citations
5.
Shabtai, Asaf, et al.. (2023). Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey. abs 1506 3365. 1–10. 1 indexed citations
6.
Groza, Bogdan, et al.. (2022). Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings. IEEE Access. 10. 122399–122413. 3 indexed citations
7.
Elovici, Yuval, et al.. (2022). RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. Sensors. 22(11). 4259–4259. 6 indexed citations
8.
Shabtai, Asaf, et al.. (2022). Not all datasets are born equal: On heterogeneous tabular data and adversarial examples. Knowledge-Based Systems. 242. 108377–108377. 10 indexed citations
9.
Bitton, Ron, et al.. (2022). Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. ACM Computing Surveys. 55(9). 1–36. 13 indexed citations
10.
Fischer, Sebastian, et al.. (2022). BENN: Bias Estimation Using a Deep Neural Network. IEEE Transactions on Neural Networks and Learning Systems. 35(1). 117–131. 3 indexed citations
11.
Groza, Bogdan, et al.. (2021). Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics. IEEE Transactions on Mobile Computing. 22(4). 2417–2434. 6 indexed citations
12.
Rosenberg, Ishai, Asaf Shabtai, Yuval Elovici, & Lior Rokach. (2020). Adversarial Learning in the Cyber Security Domain. arXiv (Cornell University). 6 indexed citations
13.
Levy, Moshe, et al.. (2020). GLOD: Gaussian Likelihood Out of Distribution Detector.. arXiv (Cornell University). 1 indexed citations
14.
Shabtai, Asaf, et al.. (2020). A Self-Healing Mechanism for Internet of Things Devices. IEEE Security & Privacy. 19(1). 44–53. 4 indexed citations
15.
Elovici, Yuval, et al.. (2019). Intrusion Detection System for the MIL-STD-1553 Communication Bus. IEEE Transactions on Aerospace and Electronic Systems. 56(4). 3010–3027. 27 indexed citations
16.
Rosenberg, Ishai, Asaf Shabtai, Yuval Elovici, & Lior Rokach. (2018). Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.. arXiv (Cornell University). 4 indexed citations
17.
Bitton, Ron, et al.. (2018). Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. arXiv (Cornell University). 243–260. 1 indexed citations
18.
Rosenberg, Ishai, Asaf Shabtai, Lior Rokach, & Yuval Elovici. (2017). Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.. arXiv (Cornell University). 13 indexed citations
19.
Shabtai, Asaf, et al.. (2016). Advanced Security Testbed Framework for Wearable IoT Devices. ACM Transactions on Internet Technology. 16(4). 1–25. 49 indexed citations
20.
Shabtai, Asaf, et al.. (2013). Detecting malware through temporal function-based features.. 1379–1382. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026