כותרת
> C;
1/1

Dr. Moti Zwilling

Dr. Moti Zwilling

Department: Economics and Business Administration

Position: Researcher at the Center for Cyber Technology, Ariel University of Samaria

Moti Zwilling is a staff member of the Economics and Business Administration at Ariel University. He completed his doctoral studies in bio-infotermatics in 2008 at Hebrew University under the guidance of Prof. Shai Arkin of the Biological Chemistry Department, and Prof. Nati Linial of the Computer Sciences Department. In addition, he completed his doctorate in Marketing (which dealt with application of learning algorithms to solve problems in the advertising field) in 2007, under the guidance of Prof. Gila Fruchter of Bar Ilan University, School of Economics and Business Administration. In 2010 he served as a post-doctoral student for one year in the Systems Information Engineering Department at Ben-Gurion University, under the guidance of Prof. Lior Rokach. In the post-doctoral framework, he worked in the research laboratories of Deutsche Telekom in the field of information security, in the project: “Identifying keyboard characteristics and behavior characteristics of Internet surfers” through application of learning algorithms.

Moti’s main research areas are:

Machine learning and data mining, recommendation systems, information retrieval, information security and behavior across the Internet, development of methodologies and technologies for analysis of Big Data, and business intelligence (BI) tools.

Moti manages a number of projects that use theoretical and practical knowledge to solve problems in the area of protection in cyberspace, especially in all pertaining to identifying users by keyboard characteristics, behavior characteristics, text analysis and more. Moti also deals with analysis of behavior characteristics of attackers across the opaque Internet (Darknet).

Moti Zwilling is also an attorney specializing in Intellectual Property and Internet and network laws. He is a partner in the consulting company Smart Mind Solutions with attorney Shmulik Hachim, former head of the Teleprocessing Division of Israel’s Defense Ministry, which provides consultancy to organizations in the context of security and checking the technological defense envelope in organizations. Moti Zwilling has work experience in civil and military industry, in which he worked in a variety of senior development and technology delivery positions. Among others, he worked in software development in the security company CheckPoint. Moti Zwilling is a veteran of a classified unit in the IDF intelligence corp, in which he performed a variety of challenging tasks to enhance national security.

Projects:

In the first project, I research the hostile behavior characteristics across the Internet in everything pertaining to social media, through use of a large number of characteristics, including analysis of text, ontologies and the connection of many information components (pictures, text, video) for the profile characteristics of the surfer. This project is conducted in partnership with the governmental authority for information security – the Office of the Prime Minister.

In the second project, we research the subject of bullying on a network on the part of surfers, and the ability to translate this into a hostility profile. This project is executed in partnership with the Economics and Business Administration Department through analysis of the behavioral, social and psychological characteristics related to interpretation; and processing of natural language of a text gathered from the social networks.

In the third project, we research the subject of recommendation systems for service providers in the network, through understanding and analyzing the characteristics that can influence consumers to change behavior or decisions towards service providers, in connection with the opinions of individuals or groups of consumers who purchased the service or are listed [documented? Destined? Heb: מתעדים] to purchase it.

In the fourth project, I research the attack characteristics and the behavior of attackers from the Darknet networks, through analysis of log files and available network data, which is located for research concerning the Internet network.

Design and Programmed By - YALOO STUDIO