top of page

Journals

[J1] D. Peleg and A. Wool. The availability of quorum systems. Information and Computation, 123(2):210–223, 1995.

Here is a local copy (pdf).


[J2] D. Peleg and A. Wool. Crumbling walls: A class of practical and efficient quorum systems. Distributed Computing, 10(2):87–98, 1997.

Here is a local copy (pdf).


[J3] D. Peleg and A. Wool. The availability of crumbling wall quorum systems. Discrete Applied Math., 74(1):69–83, April 1997.

Here is a local copy (pdf).


[J4] D. Peleg, G. Schechtman, and A. Wool. Randomized approximation of bounded multicovering problems. Algorithmica, 18(1):44–66, May 1997.

Here is a local copy (pdf).


[J5] T. Grossman and A. Wool. Computational experience with approximation algorithms for the set covering problem. Euro. J. Operational Research, 101(1):81–92, August 1997.

Here is a local copy (pdf).


[J6] O. Gerstel, A. Wool, and S. Zaks. Optimal layouts on a chain ATM network. Discrete Applied Math., 83:157–178, 1998.

Here is a local copy (pdf).


[J7] Y. Amir and A. Wool. Optimal availability quorum systems: Theory and practice. Inf. Proc. Letters, 65:223–228, 1998.

Here is a local copy (pdf).


[J8] M. Naor and A. Wool. The load, capacity and availability of quorum systems. SIAM J. Computing, 27(2):423–447, April 1998.

Here is a local copy (pdf).


[J9] M. Naor and A. Wool. Access control and signatures via quorum secret sharing. IEEE Trans. Parallel and Distributed Sys., 9(9):909–922, September 1998.

Here is a local copy (pdf).


[J10] A. Wool. Quorum systems in replicated databases: Science or fiction? (invited paper). Bull. IEEE Technical Committee on Data Engineering, 21(4):3–11, December 1998.

Available from http://www.research.microsoft.com/research/db/debull/98dec/issue.htm.


[J11] E. Gabber and A. Wool. On location-restricted services. IEEE Networks, 13(6):44–52, November/December 1999.


[J12] D. Malkhi, M. Reiter, and A. Wool. The load and availability of Byzantine quorum systems. SIAM J. Computing, 29(6):1889–1906, 2000.

Here is a local copy (pdf).


[J13] M. Abdalla, Y. Shavitt, and A. Wool. Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. on Networking, 8(4):443–454, 2000.

Here is a local copy (pdf).


[J14] A. Wool. Key management for encrypted broadcast. ACM Trans. on Information and System Security, 3(2):107–134, May 2000.

Here is a local copy (pdf).


[J15] D. Malkhi, M. Reiter, A. Wool, and R. N. Wright. Probabilistic quorum systems. Information and Computation, 170(2):184–206, November 2001.

Here is a local copy (pdf).


[J16] D. Peleg and A. Wool. How to be an efficient snoop, or the probe complexity of quorum systems. SIAM J. Discrete Mathematics, 15(3):416–433, 2002.

Here is a local copy (pdf).


[J17] A. Wool. Combating the perils of port 80 at the firewall. ;login: The Magazine of USENIX & SAGE, 27(4):44–45, August 2002.

Here is a local copy (pdf).


[J18] A. Wool. Why security standards sometimes fail. Communications of the ACM, Inside Risks Column, 45(12):144, December 2002.

Here is a local copy (pdf). Also available from Peter Neumann’s site as Inside Risks #150.


[J19] Y. Song, A. Wool, and B. Yener. Combinatorial design of multi-ring networks with combined routing and flow control. Computer Networks, 41(2):247–267, 2003.

Here is a local copy (pdf).


[J20] Y. Shavitt, X. Sun, A. Wool, and B. Yener. Computing the unmeasured: An algebraic approach to Internet mapping. IEEE Journal on Selected Areas in Communications, 22(1):67–78, 2004.

Here is a local copy (pdf).


[J21] Y. Shavitt, P. Winkler, and A. Wool. On the economics of multicasting. Netnomics, 6(1):1–20, 2004.

Here is a local copy (pdf).


[J22] A. Wool. A quantitative study of firewall configuration errors. IEEE Computer, 37(6):62–67, 2004.

Here is a local copy (pdf).


[J23] A. Wool. The use and usability of direction-based filtering in firewalls. Computers & Security, 23(6):459–468, 2004.

Here is a local copy (pdf).


[J24] A. Wool. A note on the fragility of the “Michael” message integrity code. IEEE Trans. Wireless Communications, 3(5):1459–1462, September 2004.

Here is a local copy (pdf).


[J25] Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. ACM Transactions on Computer Systems, 22(4):381–420, November 2004.

Here is a local copy (pdf).


[J26] A. Wool. Lightweight key management for IEEE 802.11 wireless LANs with key refresh and host revocation. ACM/Springer Wireless Networks, 11(6):677–686, 2005.

Here is a local copy (pdf).


[J27] D. Nebenzahl, M. Sagiv, and A. Wool. Install-time vaccination of Windows executables to defend against stack smashing attacks. IEEE Trans. Dependable and Secure Computing, 3(1):78–90, Jan-Mar 2006.

Here is a local copy (pdf).


[J28] A. Mayer, A. Wool, and E. Ziskind. Offline firewall analysis. International Journal of Information Security, 5(3):125–144, 2006.

Here is a local copy (pdf).


[J29] N. Kogan, Y. Shavitt, and A. Wool. A practical revocation scheme for broadcast encryption using smart cards. ACM Trans. on Information and System Security, 9(3):325–351, 2006.

Here is a local copy (pdf).


[J30] S. Bar, M. Gonen, and A. Wool. A geographic directed preferential Internet topology model. Computer Networks, 51(14):4174–4188, 2007.

Here is a local copy (pdf).


[J31] R. Cohen, M. Gonen, and A. Wool. Bounding the bias of tree-like sampling in IP topologies. Networks and Heterogeneous Media, 3(2):323–332, June 2008.

Here is a local copy (pdf).


[J32] M. Gonen, D. Ron, U. Weinsberg, and A. Wool. Finding a dense-core in Jellyfish graphs. Computer Networks, 52(15):2831–2841, 2008.

Here is a local copy (pdf).


[J33] E. Geron and A. Wool. CRUST: Cryptographic remote untrusted storage without public keys. International Journal of Information Security, 8(5):357–377, 2009.

Here is a local copy (pdf).


[J34] A. Wool. Trends in firewall configuration errors: Measuring the holes in Swiss cheese. IEEE Internet Computing, 14(4):58–65, 2010.

Here is a local copy (pdf). Full version available as arXiv Technical Report cs.CR:0911.1240.


[J35] D. Rovniagin and A. Wool. The geometric efficient matching algorithm for firewalls. IEEE Trans. Dependable and Secure Computing, 8(1):147–159, 2011.

Here is a local copy (pdf).


[J36] E. Doron and A. Wool. WDA: A web farm distributed denial of service attack attenuator. Computer Networks, 55(5):1037–1051, April 2011.

Here is a local copy (pdf).


[J37] N. Goldenberg and A. Wool. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. International Journal of Critical Infrastructure Protection, 6:63–75, 2013.

Here is a local copy (pdf).


[J38] A. Arbit, Y. Oren, and A. Wool. A secure supply-chain RFID system that respects your privacy. IEEE Pervasive Computing, 13(2):52–60, 2014.

Here is a local copy (pdf).


[J39] A. Kleinmann and A. Wool. Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics. Journal of Digital Forensics, Security and Law, 9(2):37–50, 2014.

Here is a local copy (pdf).


[J40] A. Arbit, Y. Livne, Y. Oren, and A. Wool. Implementing public-key cryptography on passive RFID tags is practical. International Journal of Information Security, 14(1):85–99, February 2015.

Here is a local copy (pdf).


[J41] N. Erez and A. Wool. Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA networks. International Journal of Critical Infrastructure Protection, 10:59–70, September 2015.


[J42] A. Tzur, O. Amrani, and A.Wool. Direction finding of rogue Wi-Fi access points using an off-the-shelf MIMO-OFDM receiver. Physical Communication, 17:149–164, December 2015.


[J43] Y. Oren and A. Wool. Side-channel cryptographic attacks using pseudo-boolean optimization. Constraints, 21:616–645, 2016.


[J44] A. Kleinmann and A. Wool. Automatic construction of statechart-based anomaly detection models for multi-threaded industrial control systems. ACM Transactions on Intelligent Systems and Technology, 8(4):55:1–55:21, February 2017.


[J45] M. Markovitz and A. Wool. Field classification, modeling and anomaly detection in unknown CAN bus networks. Vehicular Communications, 9:43–52, 2017.


[J46] E. Itkin and A Wool. A security analysis and revised security extension for the precision time protocol. IEEE Trans. Dependable and Secure Computing, 17(1):22–34, January/February 2020.


[J47] T. Dagan, Y. Montvelisky, M. Marchetti, D. Stabili, M. Colajanni, and A. Wool. Vehicle safe-mode, concept to practice: Limp-mode in the service of cyber security. SAE International Journal of Transportation Cybersecurity and Privacy, 2(2), 2020.


[J48] A. Peled, L. David, O. Amrani, Y. Rosenwaks, and A. Wool. Using the MSET device to counteract power-analysis attacks. IEEE Journal of the Electron Devices Society, 8:1328–1334, 2020.


[J49] L. David and A. Wool. Rank estimation with bounded error via exponential sampling. Journal of Cryptographic Engineering, 12:151–168, 2022. Full technical report available in Cryptology ePrint Archive, Report 2021/313.


[J50] L. David and A. Wool. PESrank: An Explainable online password strength bounded with bounded error via exponential sampling. Journal of Computer Security, 30(6):877901, November 2022.


[J51] N. Ortiz, A. A. Cardenas and A. Wool. A Taxonomy of Industrial Control Protocols and Networks in the Power Grid. IEEE Communications Magazine, 61(6):21–27, 2023.

[J52] R. Komissarov, S. Vaisman, and A. Wool. Spoofing attacks against vehicular FMCW radar. Journal of Cryptographic Engineering, 13:473484, May 2023.

bottom of page