Alexandra Shulman-Peleg
Alexandra Shulman-Peleg
EY Cybersecurity
Verified email at
Cited by
Cited by
Proofs of ownership in remote storage systems
S Halevi, D Harnik, B Pinkas, A Shulman-Peleg
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Side channels in cloud services: Deduplication in cloud storage
D Harnik, B Pinkas, A Shulman-Peleg
Security & Privacy, IEEE 8 (6), 40-47, 2010
Recognition of functional sites in protein structures
A Shulman-Peleg, R Nussinov, HJ Wolfson
Journal of molecular biology 339 (3), 607-633, 2004
Predicting molecular interactions in silico: I. A guide to pharmacophore identification and its applications to drug design
O Dror, A Shulman-Peleg, R Nussinov, HJ Wolfson
Current medicinal chemistry 11 (1), 71-90, 2004
Interaction of C60-Fullerene and Carboxyfullerene with Proteins:  Docking and Binding Site Alignment
H Benyamini, A Shulman-Peleg, HJ Wolfson, B Belgorodsky, L Fadeev, ...
Bioconjugate Chemistry 17 (2), 378-386, 2006
SiteEngines: recognition and comparison of binding sites and protein–protein interfaces
A Shulman-Peleg, R Nussinov, HJ Wolfson
Nucleic acids research 33 (suppl_2), W337-W341, 2005
MultiBind and MAPPIS: webservers for multiple alignment of protein 3D-binding sites and their interactions
A Shulman-Peleg, M Shatsky, R Nussinov, HJ Wolfson
Nucleic acids research 36 (suppl_2), W260-W264, 2008
The multiple common point set problem and its application to molecule binding pattern detection
M Shatsky, A Shulman-Peleg, R Nussinov, HJ Wolfson
Journal of Computational Biology 13 (2), 407-428, 2006
Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent 9,411,973, 2016
Spatial chemical conservation of hot spot interactions in protein-protein complexes
A Shulman-Peleg, M Shatsky, R Nussinov, HJ Wolfson
BMC biology 5, 1-11, 2007
A cloud environment for data-intensive storage services
EK Kolodner, S Tal, D Kyriazis, D Naor, M Allalouf, L Bonelli, P Brand, ...
2011 IEEE third international conference on cloud computing technology and …, 2011
Securing the infrastructure and the workloads of linux containers
M Mattetti, A Shulman-Peleg, Y Allouche, A Corradi, S Dolev, L Foschini
2015 IEEE Conference on Communications and Network Security (CNS), 559-567, 2015
Generation and analysis of a protein–protein interface data set with similar chemical and spatial patterns of interactions
S Mintz, A Shulman‐Peleg, HJ Wolfson, R Nussinov
Proteins: Structure, Function, and Bioinformatics 61 (1), 6-20, 2005
No sql, no injection? examining nosql security
A Ron, A Shulman-Peleg, E Bronshtein
arXiv preprint arXiv:1506.04082, 2015
Data on-boarding in federated storage clouds
G Vernik, A Shulman-Peleg, S Dippl, C Formisano, MC Jaeger, ...
2013 IEEE Sixth International Conference on Cloud Computing, 244-251, 2013
Prediction of interacting single-stranded RNA bases by protein-binding patterns
A Shulman-Peleg, M Shatsky, R Nussinov, HJ Wolfson
Journal of molecular biology 379 (2), 299-316, 2008
Secure logical isolation for multi-tenancy in cloud storage
M Factor, D Hadas, A Harnama, N Har'El, EK Kolodner, A Kurmus, ...
2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), 1-5, 2013
Analysis and mitigation of NoSQL injections
A Ron, A Shulman-Peleg, A Puzanov
IEEE Security & Privacy 14 (2), 30-39, 2016
From structure to function: methods and applications
HJ Wolfson, M Shatsky, D Schneidman-Duhovny, O Dror, ...
Current Protein and Peptide Science 6 (2), 171-183, 2005
Protein-protein interfaces: Recognition of similar spatial and chemical organizations
A Shulman-Peleg, S Mintz, R Nussinov, HJ Wolfson
Algorithms in Bioinformatics: 4th International Workshop, WABI 2004, Bergen …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20