-
Joshi, S., Satya, M., Domb, M. (2024). AI-Based Commercial Decisions: The Cryptocurrency Market Case. In: Arai, K. (eds) Intelligent Computing. SAI 2024. Lecture Notes in Networks and Systems, vol 1018, Pages 214-223 Springer, Cham. https://doi.org/10.1007/978-3-031-62269-4_15, ISBN: 978-3-031-62269-4
-
Domb, M. Zadok A., Face Authentication is achieved by constructing a 3D face image from 2D face images and encoding a unique identification. In Proceedings of the 15th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2024, pp. 65-69. International Institute of Informatics and Cybernetics. https://doi.org/10.54808/IMCIC2024.01.6, SBN:978-1-950492-78-7, ISSN: 2771-5914, Publisher: International Institute of Informatics and Cybernetics
-
Domb M., Face Authentication by Constructing an Adjustable 3D Image from two 2D Images taken by Two Adjacent Cameras, International Journal of Latest Engineering Research and Applications, January 2024, International Journal of Latest Engineering Research and Applications (IJLERA) Vol. 09, Issue 01, January 2024, PP – 119-125, DOI: 10.56581/IJLERA.9.1.119-125, ISSN: 2455-7137
-
Domb M. Strengthening IoT Network Protocols: A Model Resilient Against Cyber Attacks. IgMin Res. Feb 12, 2024; 2(2): 084-096. IgMin ID: igmin149; DOI: 10.61927/igmin149; Available at: www.igminresearch.com/articles/pdf/
-
Singh, Ananya, Sujata Joshi, and Menachem Domb. Embedded Conversational AI, Chatbots, and NLP to Improve Healthcare Administration and Practices, 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS), Pudukkottai, India, 2023 pp. 38-45, DOI: 10.1109/ICACRS58579.2023.10404985. IEEE 2023.
-
M. Domb, S. Joshi, and A. Khn, Anomaly Detection in IoT: Recent Advances, AI and ML Perspectives and Applications, Chapter in a book titled: Anomaly Detection - Recent Advances, AI and ML Perspectives and Applications, IntechOpen, July 2023, DOI: 10.5772/intechopen.111944.
-
M. Domb, Advanced Lightweight Encryption Key Management Algorithms for IoT Networks, Chapter in a book titled: Biometrics and Cryptography - Recent Advances and Research Perspectives, London, United Kingdom: IntechOpen, 12-2023. DOI: 10.5772/intechopen.112280
-
Gupta, A., Joshi, S., Domb, M. (2023). Stress Detection and Monitoring Using Wearable IoT and Big Data Analytics. In: Yang, XS., Sherratt, R.S., Dey, N., Joshi, A. (eds) Proceedings of Eighth International Congress on Information and Communication Technology. ICICT 2023. Lecture Notes in Networks and Systems, vol 693. Springer, Singapore. https://doi.org/10.1007/978-981-99-3243-6_61
-
M. Domb, Cybersecurity Threats and Mitigations Related to Smart Cities Operation, Chapter in a book titled: Smart Cities - Foundations and Perspectives, London, United Kingdom: IntechOpen, 12-2023. https://doi.org/ 10.5772/intechopen.119999
-
Joshi, S. , Domb, M. , Chanda, B. and Bais, A. (2022) Evaluating the Impact of Storytelling Ads on Consumer Purchase Intention. Journal of Service Science and Management, 15, 10-22.
-
Domb Alon, M.M.; Leshem, G. Satellite to Ground Station, Attenuation Prediction for 2.4–72 GHz Using LTSM, an Artificial Recurrent Neural Network Technology. Electronics 2022, 11, 541.
-
Domb Alon, M.M.; Leshem, G. Signal Strength Extrapolation after Crossing an Urban Area. 2021. In Rahul Srivastava & Aditya Kumar Singh Pundir (eds.), New Frontiers in Communication and Intelligent Systems, 697–702. Computing & Intelligent Systems, SCRS, India.
-
Domb, M. (2021). A Distributed Implementation of Signature Matching Algorithms for IoT Intrusion Detection. In: Tuba, M., Akashe, S., Joshi, A. (eds) ICT Systems and Sustainability. Advances in Intelligent Systems and Computing, vol 1270. Springer, Singapore.
-
Secured Key Distribution by Concatenating Optical Communications and Inter-Device Hand-Held Video Transmission. Applied System Innovation 2020, vol 3, issue 1, 11.
-
Distributed Modular Multiplication to Be Processed by a Network of Limited Resources Devices. Fifth International Congress on Information and Communication Technology. ICICT 2020. Advances in Intelligent Systems and Computing, vol. 1183. Springer, Singapore.
-
A Framework of Signature-Matching-Algorithms for IoT Intrusion Detection. Future Technologies Conference (FTC) 2020, Vol. 3. FTC 2020. Advances in Intelligent Systems and Computing, vol. 1290. Springer, Cham.
-
Secured Key Generation and Transmission, using Intel-SGX and Optical Communications, Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), London, UK, 2019, pp. 357-362,
-
Risk Mitigation Model for Data Loss: A Case Study Approach, Journal of Advanced Research in Dynamical and Control Systems 11 pages: 440-447,
-
Face Authentication Using Image Signature Generated from Hyperspectral Inner Images. Fourth International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol. 1041. PP 113-125, Springer, Singapore.
-
Topography analysis using wearable devices and its integration in navigation systems, International Journal of Engineering and Technology (UAE) vol.7 n3 (2018): pages 125-129, 7844732802,
-
Sources and Solutions of Revenue leakage in E-commerce due to Cyber Fraud and System/Support failures. ICEME-The 9th International Conference on E-business, Management, and Economics, ACM NY electronic library, Pages 22-27, 08/2018 Researchgate
-
Probability-Based Keys Sharing for IoT Security. IEEE International Conference on the Science of Electrical Engineering, pp. 1-5,
-
Simulated Machine Learning for Classification and Anomaly Detection. BIT's 4th Annual Congress of Knowledge Economy 2017, 19-20/09/2017, Qingdao, China Qingdao, China, 2017
-
On Designing Energy Efficient Wi-Fi P2P Connections for the Internet of Things, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, NSW, 2017, pp. 1-5, IEEE Xplore
-
Lightweight adaptive Random-Forest for IoT rule generation and execution, Elsevier, Journal of Information Security and Applications, Volume 34, Part 2, 2017, Pages 218-224, ISSN 2214-2126,
-
Anomaly Detection–Rule Generation and Execution, ICC-2017, International conference in IoT and Cloud Computing, March 22, 2016, University of Cambridge, UK. ACM
-
Topography Analysis and its Integration in Navigation Systems. Conference Paper, Real-Time Web Solutions 01-04/08/2016, New York University, NY, USA
-
Sparse sampling for sensing temporal data — building an optimized envelope, IEEE-2016 Technologies and Applications of Artificial Intelligence (TAAI), Hsinchu, 2016, pp. 241-247, IEEE-Xplore 20.3. 2017