BibTeX records: Elias Bou-Harb

download as .bib file

@article{DBLP:journals/tnsm/KfouryCB24,
  author       = {Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {{P4BS:} Leveraging Passive Measurements From {P4} Switches to Dynamically
                  Modify a Router's Buffer Size},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {1082--1099},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2023.3306335},
  doi          = {10.1109/TNSM.2023.3306335},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/KfouryCB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SarieddineSAATKPB24,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Chadi Assi and
                  Ribal Atallah and
                  Sadegh Torabi and
                  Joseph Khoury and
                  Morteza Safaei Pour and
                  Elias Bou{-}Harb},
  title        = {{EV} Charging Infrastructure Discovery to Contextualize Its Deployment
                  Security},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {1287--1301},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2023.3318406},
  doi          = {10.1109/TNSM.2023.3318406},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/SarieddineSAATKPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-03374,
  author       = {Nafis Tanveer Islam and
                  Joseph Khoury and
                  Andrew Seong and
                  Gonzalo De La Torre Parra and
                  Elias Bou{-}Harb and
                  Peyman Najafirad},
  title        = {LLM-Powered Code Vulnerability Repair with Reinforcement Learning
                  and Semantic Reward},
  journal      = {CoRR},
  volume       = {abs/2401.03374},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.03374},
  doi          = {10.48550/ARXIV.2401.03374},
  eprinttype    = {arXiv},
  eprint       = {2401.03374},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-03374.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/WehbeAPBA23,
  author       = {Nathalie Wehbe and
                  Hyame Assem Alameddine and
                  Makan Pourzandi and
                  Elias Bou{-}Harb and
                  Chadi Assi},
  title        = {A Security Assessment of {HTTP/2} Usage in 5G Service-Based Architecture},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {1},
  pages        = {48--54},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.001.2200183},
  doi          = {10.1109/MCOM.001.2200183},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/WehbeAPBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KfouryCB23,
  author       = {Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {P4Tune: Enabling Programmability in Non-Programmable Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {6},
  pages        = {132--138},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.001.2200287},
  doi          = {10.1109/MCOM.001.2200287},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/KfouryCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PourNFB23,
  author       = {Morteza Safaei Pour and
                  Christelle Nader and
                  Kurt Friday and
                  Elias Bou{-}Harb},
  title        = {A Comprehensive Survey of Recent Internet Measurement Techniques for
                  Cyber Security},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103123},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103123},
  doi          = {10.1016/J.COSE.2023.103123},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PourNFB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ZincirHeywoodBBCEIKLPSSZ23,
  author       = {Nur Zincir{-}Heywood and
                  Robert Birke and
                  Elias Bou{-}Harb and
                  Giuliano Casale and
                  Khalil El{-}Khatib and
                  Takeru Inoue and
                  Neeraj Kumar and
                  Hanan Lutfiyya and
                  Deepak Puthal and
                  Abdallah Shami and
                  Natalia Stakhanova and
                  Farhana H. Zulkernine},
  title        = {Guest Editorial: Special Section on Machine Learning and Artificial
                  Intelligence for Managing Networks, Systems, and Services - Part {II}},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {882--889},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3280230},
  doi          = {10.1109/TNSM.2023.3280230},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/ZincirHeywoodBBCEIKLPSSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/VehabovicZSGPBC23,
  author       = {Aldin Vehabovic and
                  Hadi Zanddizari and
                  Farook Shaikh and
                  Nasir Ghani and
                  Morteza Safaei Pour and
                  Elias Bou{-}Harb and
                  Jorge Crichigno},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {Federated Learning Approach for Distributed Ransomware Analysis},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {621--641},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_33},
  doi          = {10.1007/978-3-031-41181-6\_33},
  timestamp    = {Mon, 16 Oct 2023 19:47:08 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/VehabovicZSGPBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cce2/HusakKKB23,
  author       = {Martin Hus{\'{a}}k and
                  Joseph Khoury and
                  {\DH}orde Klisura and
                  Elias Bou{-}Harb},
  editor       = {Pierre Collet and
                  Latafat A. Gardashova and
                  Samer El Zant and
                  Ulviya Abdulkarimova},
  title        = {On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based
                  Analytics},
  booktitle    = {Complex Computational Ecosystems - First International Conference,
                  {CCE} 2023, Baku, Azerbaijan, April 25-27, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13927},
  pages        = {167--179},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44355-8\_12},
  doi          = {10.1007/978-3-031-44355-8\_12},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cce2/HusakKKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/IslamPMBN23,
  author       = {Nafis Tanveer Islam and
                  Gonzalo De La Torre Parra and
                  Dylan Manuel and
                  Elias Bou{-}Harb and
                  Peyman Najafirad},
  title        = {An Unbiased Transformer Source Code Learning with Semantic Vulnerability
                  Graph},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {144--159},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00018},
  doi          = {10.1109/EUROSP57164.2023.00018},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/IslamPMBN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MolinaBTA23,
  author       = {Ricardo Misael Ayala Molina and
                  Elias Bou{-}Harb and
                  Sadegh Torabi and
                  Chadi Assi},
  title        = {{RPM:} Ransomware Prevention and Mitigation Using Operating Systems'
                  Sensing Tactics},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279119},
  doi          = {10.1109/ICC45041.2023.10279119},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/MolinaBTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AlSabehFCB23,
  author       = {Ali AlSabeh and
                  Kurt Friday and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {Effective {DGA} Family Classification Using a Hybrid Shallow and Deep
                  Packet Inspection Technique on {P4} Programmable Switches},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {3781--3786},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279024},
  doi          = {10.1109/ICC45041.2023.10279024},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/AlSabehFCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KfouryCB23,
  author       = {Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {{P4CCI:} P4-Based Online {TCP} Congestion Control Algorithm Identification
                  for Traffic Separation},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {4007--4012},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279386},
  doi          = {10.1109/ICC45041.2023.10279386},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/KfouryCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NasrTBFA23,
  author       = {Tony Nasr and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Claude Fachkha and
                  Chadi Assi},
  title        = {ChargePrint: {A} Framework for Internet-Scale Discovery and Security
                  Analysis of {EV} Charging Management Systems},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/chargeprint-a-framework-for-internet-scale-discovery-and-security-analysis-of-ev-charging-management-systems/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/NasrTBFA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/VehabovicZGSBPC23,
  author       = {Aldin Vehabovic and
                  Hadi Zanddizari and
                  Nasir Ghani and
                  Farooq Shaikh and
                  Elias Bou{-}Harb and
                  Morteza Safaei Pour and
                  Jorge Crichigno},
  title        = {Data-Centric Machine Learning Approach for Early Ransomware Detection
                  and Attribution},
  booktitle    = {{NOMS} 2023, {IEEE/IFIP} Network Operations and Management Symposium,
                  Miami, FL, USA, May 8-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/NOMS56928.2023.10154378},
  doi          = {10.1109/NOMS56928.2023.10154378},
  timestamp    = {Tue, 10 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/VehabovicZGSBPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/RammouzKKPPFB23,
  author       = {Veronica Rammouz and
                  Joseph Khoury and
                  {\DH}orde Klisura and
                  Morteza Safaei Pour and
                  Mostafa Safaei Pour and
                  Claude Fachkha and
                  Elias Bou{-}Harb},
  title        = {Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations},
  booktitle    = {19th International Conference on Wireless and Mobile Computing, Networking
                  and Communication,, WiMob 2023, Montreal, QC, Canada, June 21-23,
                  2023},
  pages        = {206--211},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WiMob58348.2023.10187762},
  doi          = {10.1109/WIMOB58348.2023.10187762},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wimob/RammouzKKPPFB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-04398,
  author       = {Aldin Vehabovic and
                  Nasir Ghani and
                  Elias Bou{-}Harb and
                  Jorge Crichigno and
                  Ayseg{\"{u}}l Yayimli},
  title        = {Ransomware Detection and Classification Strategies},
  journal      = {CoRR},
  volume       = {abs/2304.04398},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.04398},
  doi          = {10.48550/ARXIV.2304.04398},
  eprinttype    = {arXiv},
  eprint       = {2304.04398},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-04398.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-11072,
  author       = {Nafis Tanveer Islam and
                  Gonzalo De La Torre Parra and
                  Dylan Manuel and
                  Elias Bou{-}Harb and
                  Peyman Najafirad},
  title        = {An Unbiased Transformer Source Code Learning with Semantic Vulnerability
                  Graph},
  journal      = {CoRR},
  volume       = {abs/2304.11072},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.11072},
  doi          = {10.48550/ARXIV.2304.11072},
  eprinttype    = {arXiv},
  eprint       = {2304.11072},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-11072.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-13287,
  author       = {Aldin Vehabovic and
                  Hadi Zanddizari and
                  Nasir Ghani and
                  Farooq Shaikh and
                  Elias Bou{-}Harb and
                  Morteza Safaei Pour and
                  Jorge Crichigno},
  title        = {Data-Centric Machine Learning Approach for Early Ransomware Detection
                  and Attribution},
  journal      = {CoRR},
  volume       = {abs/2305.13287},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.13287},
  doi          = {10.48550/ARXIV.2305.13287},
  eprinttype    = {arXiv},
  eprint       = {2305.13287},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-13287.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-15191,
  author       = {Farooq Shaikh and
                  Elias Bou{-}Harb and
                  Aldin Vehabovic and
                  Jorge Crichigno and
                  Ayseg{\"{u}}l Yayimli and
                  Nasir Ghani},
  title        = {IoT Threat Detection Testbed Using Generative Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/2305.15191},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.15191},
  doi          = {10.48550/ARXIV.2305.15191},
  eprinttype    = {arXiv},
  eprint       = {2305.15191},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-15191.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-14090,
  author       = {Aldin Vehabovic and
                  Hadi Zanddizari and
                  Farooq Shaikh and
                  Nasir Ghani and
                  Morteza Safaei Pour and
                  Elias Bou{-}Harb and
                  Jorge Crichigno},
  title        = {Federated Learning Approach for Distributed Ransomware Analysis},
  journal      = {CoRR},
  volume       = {abs/2306.14090},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.14090},
  doi          = {10.48550/ARXIV.2306.14090},
  eprinttype    = {arXiv},
  eprint       = {2306.14090},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-14090.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-07760,
  author       = {Aldin Vehabovic and
                  Hadi Zanddizari and
                  Nasir Ghani and
                  G. Javidi and
                  A. Selcuk Uluagac and
                  Mohamed Rahouti and
                  Elias Bou{-}Harb and
                  Morteza Safaei Pour},
  title        = {Ransomware Detection Using Federated Learning with Imbalanced Datasets},
  journal      = {CoRR},
  volume       = {abs/2311.07760},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.07760},
  doi          = {10.48550/ARXIV.2311.07760},
  eprinttype    = {arXiv},
  eprint       = {2311.07760},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-07760.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/CrichignoKBG22,
  author       = {Jorge Crichigno and
                  Elie F. Kfoury and
                  Elias Bou{-}Harb and
                  Nasir Ghani},
  title        = {High-Speed Networks - {A} Tutorial},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-88841-1},
  doi          = {10.1007/978-3-030-88841-1},
  isbn         = {978-3-030-88840-4},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/CrichignoKBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/NeshenkoBF22,
  author       = {Nataliia Neshenko and
                  Elias Bou{-}Harb and
                  Borko Furht},
  title        = {Smart Cities: Cyber Situational Awareness to Support Decision Making},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18464-2},
  doi          = {10.1007/978-3-031-18464-2},
  isbn         = {978-3-031-18463-5},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/NeshenkoBF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AlSabehKKCB22,
  author       = {Ali AlSabeh and
                  Joseph Khoury and
                  Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {A survey on security applications of {P4} programmable switches and
                  a STRIDE-based vulnerability assessment},
  journal      = {Comput. Networks},
  volume       = {207},
  pages        = {108800},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.108800},
  doi          = {10.1016/J.COMNET.2022.108800},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AlSabehKKCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NasrTBFA22,
  author       = {Tony Nasr and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Claude Fachkha and
                  Chadi Assi},
  title        = {Power jacking your station: In-depth security analysis of electric
                  vehicle charging station management systems},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102511},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102511},
  doi          = {10.1016/J.COSE.2021.102511},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NasrTBFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ClosserB22,
  author       = {Dayton Closser and
                  Elias Bou{-}Harb},
  title        = {A live digital forensics approach for quantum mechanical computers},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301341},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301341},
  doi          = {10.1016/J.FSIDI.2022.301341},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ClosserB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TorabiBAKBD22,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  ElMouatez Billah Karbab and
                  Amine Boukhtouta and
                  Mourad Debbabi},
  title        = {Inferring and Investigating IoT-Generated Scanning Campaigns Targeting
                  a Large Network Telescope},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {402--418},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2979183},
  doi          = {10.1109/TDSC.2020.2979183},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/TorabiBAKBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/MolinaTSBBA22,
  author       = {Ricardo Misael Ayala Molina and
                  Sadegh Torabi and
                  Khaled Sarieddine and
                  Elias Bou{-}Harb and
                  Nizar Bouguila and
                  Chadi Assi},
  title        = {On Ransomware Family Attribution Using Pre-Attack Paranoia Activities},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {1},
  pages        = {19--36},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2021.3112056},
  doi          = {10.1109/TNSM.2021.3112056},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/MolinaTSBBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ZincirHeywoodBBCEIKLPSSZ22,
  author       = {Nur Zincir{-}Heywood and
                  Robert Birke and
                  Elias Bou{-}Harb and
                  Giuliano Casale and
                  Khalil El{-}Khatib and
                  Takeru Inoue and
                  Neeraj Kumar and
                  Hanan Lutfiyya and
                  Deepak Puthal and
                  Abdallah Shami and
                  Natalia Stakhanova and
                  Farhana H. Zulkernine},
  title        = {Guest Editorial: Special Issue on Machine Learning and Artificial
                  Intelligence for Managing Networks, Systems, and Services - Part {I}},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {3988--3994},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3227775},
  doi          = {10.1109/TNSM.2022.3227775},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/ZincirHeywoodBBCEIKLPSSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KhouryPB22,
  author       = {Joseph Khoury and
                  Morteza Safaei Pour and
                  Elias Bou{-}Harb},
  title        = {A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts
                  at Scale},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {32:1--32:11},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3539009},
  doi          = {10.1145/3538969.3539009},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KhouryPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/DibTBBA22,
  author       = {Mirabelle Dib and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Nizar Bouguila and
                  Chadi Assi},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {EVOLIoT: {A} Self-Supervised Contrastive Learning Framework for Detecting
                  and Characterizing Evolving IoT Malware Variants},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {452--466},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517393},
  doi          = {10.1145/3488932.3517393},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/DibTBBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blackseecom/ShaikhBVCYG22,
  author       = {Farooq Shaikh and
                  Elias Bou{-}Harb and
                  Aldin Vehabovic and
                  Jorge Crichigno and
                  Ayseg{\"{u}}l Yayimli and
                  Nasir Ghani},
  title        = {IoT Threat Detection Testbed Using Generative Adversarial Networks},
  booktitle    = {10th {IEEE} International Black Sea Conference on Communications and
                  Networking, BlackSeaCom 2022, Sofia, Bulgaria, June 6-9, 2022},
  pages        = {77--84},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BlackSeaCom54372.2022.9858239},
  doi          = {10.1109/BLACKSEACOM54372.2022.9858239},
  timestamp    = {Mon, 29 Aug 2022 17:11:31 +0200},
  biburl       = {https://dblp.org/rec/conf/blackseecom/ShaikhBVCYG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blackseecom/VehabovicGBCY22,
  author       = {Aldin Vehabovic and
                  Nasir Ghani and
                  Elias Bou{-}Harb and
                  Jorge Crichigno and
                  Ayseg{\"{u}}l Yayimli},
  title        = {Ransomware Detection and Classification Strategies},
  booktitle    = {10th {IEEE} International Black Sea Conference on Communications and
                  Networking, BlackSeaCom 2022, Sofia, Bulgaria, June 6-9, 2022},
  pages        = {316--324},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BlackSeaCom54372.2022.9858296},
  doi          = {10.1109/BLACKSEACOM54372.2022.9858296},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blackseecom/VehabovicGBCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/NaderB22,
  author       = {Christelle Nader and
                  Elias Bou{-}Harb},
  editor       = {Luca Sterpone and
                  Andrea Bartolini and
                  Anastasiia Butko},
  title        = {An attentive interpretable approach for identifying and quantifying
                  malware-infected internet-scale IoT bots behind a {NAT}},
  booktitle    = {{CF} '22: 19th {ACM} International Conference on Computing Frontiers,
                  Turin, Italy, May 17 - 22, 2022},
  pages        = {279--286},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528416.3530995},
  doi          = {10.1145/3528416.3530995},
  timestamp    = {Thu, 05 May 2022 15:51:05 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/NaderB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FridayKBC22,
  author       = {Kurt Friday and
                  Elie F. Kfoury and
                  Elias Bou{-}Harb and
                  Jorge Crichigno},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {{INC:} In-Network Classification of Botnet Propagation at Line Rate},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {551--569},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_27},
  doi          = {10.1007/978-3-031-17140-6\_27},
  timestamp    = {Tue, 27 Sep 2022 21:06:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FridayKBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ParraSKIBR22,
  author       = {Gonzalo De La Torre Parra and
                  Luis Selvera and
                  Joseph Khoury and
                  Hector Irizarry and
                  Elias Bou{-}Harb and
                  Paul Rad},
  title        = {Interpretable Federated Transformer Log Learning for Cloud Threat
                  Forensics},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-236/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ParraSKIBR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/PourKB22,
  author       = {Morteza Safaei Pour and
                  Joseph Khoury and
                  Elias Bou{-}Harb},
  title        = {HoneyComb: {A} Darknet-Centric Proactive Deception Technique For Curating
                  IoT Malware Forensic Artifacts},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789827},
  doi          = {10.1109/NOMS54207.2022.9789827},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/PourKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/FridayBC22,
  author       = {Kurt Friday and
                  Elias Bou{-}Harb and
                  Jorge Crichigno},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {A Learning Methodology for Line-Rate Ransomware Mitigation with {P4}
                  Switches},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {120--139},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_7},
  doi          = {10.1007/978-3-031-23020-2\_7},
  timestamp    = {Thu, 08 Dec 2022 15:13:16 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/FridayBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KfouryCB21,
  author       = {Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {An Exhaustive Survey on {P4} Programmable Data Plane Switches: Taxonomy,
                  Applications, Challenges, and Future Trends},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {87094--87155},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3086704},
  doi          = {10.1109/ACCESS.2021.3086704},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KfouryCB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AndaDBLS21,
  author       = {Felix Anda and
                  Edward Dixon and
                  Elias Bou{-}Harb and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Vec2UAge: Enhancing underage age estimation performance through facial
                  embeddings},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301119},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301119},
  doi          = {10.1016/J.FSIDI.2021.301119},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AndaDBLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NeshenkoBF21,
  author       = {Nataliia Neshenko and
                  Elias Bou{-}Harb and
                  Borko Furht},
  title        = {A behavioral-based forensic investigation approach for analyzing attacks
                  on water plants using GANs},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301198},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301198},
  doi          = {10.1016/J.FSIDI.2021.301198},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NeshenkoBF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/TorabiDBAD21,
  author       = {Sadegh Torabi and
                  Mirabelle Dib and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {A Strings-Based Similarity Analysis Approach for Characterizing IoT
                  Malware and Inferring Their Underlying Relationships},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {3},
  number       = {3},
  pages        = {161--165},
  year         = {2021},
  url          = {https://doi.org/10.1109/lnet.2021.3076600},
  doi          = {10.1109/LNET.2021.3076600},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/TorabiDBAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/DibTBA21,
  author       = {Mirabelle Dib and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi},
  title        = {A Multi-Dimensional Deep Learning Framework for IoT Malware Classification
                  and Family Attribution},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {1165--1177},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2021.3075315},
  doi          = {10.1109/TNSM.2021.3075315},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/DibTBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/PourWB21,
  author       = {Morteza Safaei Pour and
                  Dylan Watson and
                  Elias Bou{-}Harb},
  title        = {Sanitizing the IoT Cyber Security Posture: An Operational {CTI} Feed
                  Backed up by Internet Measurements},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {497--506},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00059},
  doi          = {10.1109/DSN48987.2021.00059},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/PourWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KfouryCBS21,
  author       = {Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb and
                  Gautam Srivastava},
  title        = {Dynamic Router's Buffer Sizing using Passive Measurements and {P4}
                  Programmable Switches},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2021, Madrid,
                  Spain, December 7-11, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/GLOBECOM46510.2021.9685160},
  doi          = {10.1109/GLOBECOM46510.2021.9685160},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/KfouryCBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/NaderB21,
  author       = {Christelle Nader and
                  Elias Bou{-}Harb},
  title        = {Revisiting IoT Fingerprinting behind a {NAT}},
  booktitle    = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking
                  (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September
                  30 - Oct. 3, 2021},
  pages        = {1745--1752},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00235},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00235},
  timestamp    = {Thu, 06 Jan 2022 09:48:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/NaderB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/ManginoB21,
  author       = {Antonio Mangino and
                  Elias Bou{-}Harb},
  title        = {A Multidimensional Network Forensics Investigation of a State-Sanctioned
                  Internet Outage},
  booktitle    = {17th International Wireless Communications and Mobile Computing, {IWCMC}
                  2021, Harbin City, China, June 28 - July 2, 2021},
  pages        = {813--818},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IWCMC51323.2021.9498743},
  doi          = {10.1109/IWCMC51323.2021.9498743},
  timestamp    = {Fri, 13 Aug 2021 16:13:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/ManginoB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/0001KEB21,
  author       = {Mohamed Nassar and
                  Joseph Khoury and
                  Abdelkarim Erradi and
                  Elias Bou{-}Harb},
  title        = {Game Theoretical Model for Cybersecurity Risk Assessment of Industrial
                  Control Systems},
  booktitle    = {11th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2021, Paris, France, April 19-21, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/NTMS49979.2021.9432668},
  doi          = {10.1109/NTMS49979.2021.9432668},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/0001KEB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-00643,
  author       = {Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {An Exhaustive Survey on {P4} Programmable Data Plane Switches: Taxonomy,
                  Applications, Challenges, and Future Trends},
  journal      = {CoRR},
  volume       = {abs/2102.00643},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.00643},
  eprinttype    = {arXiv},
  eprint       = {2102.00643},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-00643.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Bou-HarbN20,
  author       = {Elias Bou{-}Harb and
                  Nataliia Neshenko},
  title        = {Cyber Threat Intelligence for the Internet of Things},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45858-4},
  doi          = {10.1007/978-3-030-45858-4},
  isbn         = {978-3-030-45857-7},
  timestamp    = {Tue, 02 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Bou-HarbN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KfouryGCB20,
  author       = {Elie F. Kfoury and
                  Jose Gomez and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {An emulation-based evaluation of {TCP} BBRv2 Alpha for wired broadband},
  journal      = {Comput. Commun.},
  volume       = {161},
  pages        = {212--224},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.07.018},
  doi          = {10.1016/J.COMCOM.2020.07.018},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/KfouryGCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PourMFRBISCG20,
  author       = {Morteza Safaei Pour and
                  Antonio Mangino and
                  Kurt Friday and
                  Matthias Rathbun and
                  Elias Bou{-}Harb and
                  Farkhund Iqbal and
                  Sagar Samtani and
                  Jorge Crichigno and
                  Nasir Ghani},
  title        = {On data-driven curation, learning, and analysis for inferring evolving
                  internet-of-Things (IoT) botnets in the wild},
  journal      = {Comput. Secur.},
  volume       = {91},
  pages        = {101707},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101707},
  doi          = {10.1016/J.COSE.2019.101707},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PourMFRBISCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TorabiBAD20,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {A Scalable Platform for Enabling the Forensic Investigation of Exploited
                  IoT Devices and Their Generated Unsolicited Activities},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300922},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300922},
  doi          = {10.1016/J.FSIDI.2020.300922},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TorabiBAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/PourTBAD20,
  author       = {Morteza Safaei Pour and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet
                  Scanning Activities},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {2},
  number       = {3},
  pages        = {159--163},
  year         = {2020},
  url          = {https://doi.org/10.1109/lnet.2020.2998045},
  doi          = {10.1109/LNET.2020.2998045},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/PourTBAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbd/NeshenkoNBF20,
  author       = {Nataliia Neshenko and
                  Christelle Nader and
                  Elias Bou{-}Harb and
                  Borko Furht},
  title        = {A survey of methods supporting cyber situational awareness in the
                  context of smart cities},
  journal      = {J. Big Data},
  volume       = {7},
  number       = {1},
  pages        = {92},
  year         = {2020},
  url          = {https://doi.org/10.1186/s40537-020-00363-0},
  doi          = {10.1186/S40537-020-00363-0},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbd/NeshenkoNBF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MirandaKBGK20,
  author       = {Christian Miranda and
                  Georges Kaddoum and
                  Elias Bou{-}Harb and
                  Sahil Garg and
                  Kuljeet Kaur},
  title        = {A Collaborative Security Framework for Software-Defined Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2602--2615},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2973875},
  doi          = {10.1109/TIFS.2020.2973875},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MirandaKBGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/KaurGKBC20,
  author       = {Kuljeet Kaur and
                  Sahil Garg and
                  Georges Kaddoum and
                  Elias Bou{-}Harb and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Big Data-Enabled Consolidated Framework for Energy Efficient Software
                  Defined Data Centers in IoT Setups},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {4},
  pages        = {2687--2697},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2939573},
  doi          = {10.1109/TII.2019.2939573},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/KaurGKBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/HusakBKBC20,
  author       = {Martin Hus{\'{a}}k and
                  Tom{\'{a}}s Bajtos and
                  Jaroslav Kaspar and
                  Elias Bou{-}Harb and
                  Pavel Celeda},
  title        = {Predictive Cyber Situational Awareness and Personalized Blacklisting:
                  {A} Sequential Rule Mining Approach},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {11},
  number       = {4},
  pages        = {19:1--19:16},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386250},
  doi          = {10.1145/3386250},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/HusakBKBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/ManginoPB20,
  author       = {Antonio Mangino and
                  Morteza Safaei Pour and
                  Elias Bou{-}Harb},
  title        = {Internet-scale Insecurity of Consumer Internet of Things: An Empirical
                  Measurements Perspective},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {11},
  number       = {4},
  pages        = {21:1--21:24},
  year         = {2020},
  url          = {https://doi.org/10.1145/3394504},
  doi          = {10.1145/3394504},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/ManginoPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AlSabehSBC20,
  author       = {Ali AlSabeh and
                  Ha{\"{\i}}dar Safa and
                  Elias Bou{-}Harb and
                  Jorge Crichigno},
  title        = {Exploiting Ransomware Paranoia For Execution Prevention},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149005},
  doi          = {10.1109/ICC40277.2020.9149005},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/AlSabehSBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KfouryCB20,
  author       = {Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {Offloading Media Traffic to Programmable Data Plane Switches},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149159},
  doi          = {10.1109/ICC40277.2020.9149159},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KfouryCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/FridayKBC20,
  author       = {Kurt Friday and
                  Elie F. Kfoury and
                  Elias Bou{-}Harb and
                  Jorge Crichigno},
  editor       = {Filip De Turck and
                  Prosper Chemouil and
                  Tim Wauters and
                  Mohamed Faten Zhani and
                  Walter Cerroni and
                  Rafael Pasquini and
                  Zuqing Zhu},
  title        = {Towards a Unified In-Network DDoS Detection and Mitigation Strategy},
  booktitle    = {6th {IEEE} Conference on Network Softwarization, NetSoft 2020, Ghent,
                  Belgium, June 29 - July 3, 2020},
  pages        = {218--226},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NetSoft48620.2020.9165336},
  doi          = {10.1109/NETSOFT48620.2020.9165336},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/FridayKBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/GomezKCBS20,
  author       = {Jose Gomez and
                  Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb and
                  Gautam Srivastava},
  editor       = {Norbert Herencsar},
  title        = {A Performance Evaluation of {TCP} BBRv2 Alpha},
  booktitle    = {43rd International Conference on Telecommunications and Signal Processing,
                  {TSP} 2020, Milan, Italy, July 7-9, 2020},
  pages        = {309--312},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSP49548.2020.9163512},
  doi          = {10.1109/TSP49548.2020.9163512},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tsp/GomezKCBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/AlSabehKCB20,
  author       = {Ali AlSabeh and
                  Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  editor       = {Norbert Herencsar},
  title        = {Leveraging SONiC Functionalities in Disaggregated Network Switches},
  booktitle    = {43rd International Conference on Telecommunications and Signal Processing,
                  {TSP} 2020, Milan, Italy, July 7-9, 2020},
  pages        = {457--460},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSP49548.2020.9163508},
  doi          = {10.1109/TSP49548.2020.9163508},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tsp/AlSabehKCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/KfouryKAGCB20,
  author       = {Elie F. Kfoury and
                  David J. Khoury and
                  Ali AlSabeh and
                  Jose Gomez and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  editor       = {Norbert Herencsar},
  title        = {A Blockchain-based Method for Decentralizing the {ACME} Protocol to
                  Enhance Trust in {PKI}},
  booktitle    = {43rd International Conference on Telecommunications and Signal Processing,
                  {TSP} 2020, Milan, Italy, July 7-9, 2020},
  pages        = {461--465},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSP49548.2020.9163555},
  doi          = {10.1109/TSP49548.2020.9163555},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tsp/KfouryKAGCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShaikhRGXBH19,
  author       = {Farooq Shaikh and
                  Mohamed Rahouti and
                  Nasir Ghani and
                  Kaiqi Xiong and
                  Elias Bou{-}Harb and
                  Jamal Haque},
  title        = {A Review of Recent Advances and Security Challenges in Emerging E-Enabled
                  Aircraft Systems},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {63164--63180},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2916617},
  doi          = {10.1109/ACCESS.2019.2916617},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShaikhRGXBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KfouryGCBK19,
  author       = {Elie F. Kfoury and
                  Jose Gomez and
                  Jorge Crichigno and
                  Elias Bou{-}Harb and
                  David J. Khoury},
  title        = {Decentralized Distribution of {PCP} Mappings Over Blockchain for End-to-End
                  Secure Direct Communications},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {110159--110173},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2934049},
  doi          = {10.1109/ACCESS.2019.2934049},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KfouryGCBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/OliveiraGHCB19,
  author       = {Diogo Oliveira and
                  Nasir Ghani and
                  Majeed M. Hayat and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {{SDN} Testbed for Evaluation of Large Exo-Atmospheric {EMP} Attacks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {57},
  number       = {1},
  pages        = {88--97},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCOM.2017.1700847},
  doi          = {10.1109/MCOM.2017.1700847},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/OliveiraGHCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PourB19,
  author       = {Morteza Safaei Pour and
                  Elias Bou{-}Harb},
  title        = {Theoretic derivations of scan detection operating on darknet traffic},
  journal      = {Comput. Commun.},
  volume       = {147},
  pages        = {111--121},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comcom.2019.08.014},
  doi          = {10.1016/J.COMCOM.2019.08.014},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/PourB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/HusakKBC19,
  author       = {Martin Hus{\'{a}}k and
                  Jana Kom{\'{a}}rkov{\'{a}} and
                  Elias Bou{-}Harb and
                  Pavel Celeda},
  title        = {Survey of Attack Projection, Prediction, and Forecasting in Cyber
                  Security},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {21},
  number       = {1},
  pages        = {640--660},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMST.2018.2871866},
  doi          = {10.1109/COMST.2018.2871866},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/HusakKBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/CrichignoBG19,
  author       = {Jorge Crichigno and
                  Elias Bou{-}Harb and
                  Nasir Ghani},
  title        = {A Comprehensive Tutorial on Science {DMZ}},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {21},
  number       = {2},
  pages        = {2041--2078},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMST.2018.2876086},
  doi          = {10.1109/COMST.2018.2876086},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/CrichignoBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/NeshenkoBCKG19,
  author       = {Nataliia Neshenko and
                  Elias Bou{-}Harb and
                  Jorge Crichigno and
                  Georges Kaddoum and
                  Nasir Ghani},
  title        = {Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities
                  and a First Empirical Look on Internet-Scale IoT Exploitations},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {21},
  number       = {3},
  pages        = {2702--2733},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMST.2019.2910750},
  doi          = {10.1109/COMST.2019.2910750},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/NeshenkoBCKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AndaLKBBLS19,
  author       = {Felix Anda and
                  David Lillis and
                  Aikaterini Kanta and
                  Brett A. Becker and
                  Elias Bou{-}Harb and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Improving the accuracy of automated facial age estimation to aid {CSEM}
                  investigations},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S142},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.024},
  doi          = {10.1016/J.DIIN.2019.01.024},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AndaLKBBLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PourBVNPC19,
  author       = {Morteza Safaei Pour and
                  Elias Bou{-}Harb and
                  Kavita Varma and
                  Nataliia Neshenko and
                  Dimitris A. Pados and
                  Kim{-}Kwang Raymond Choo},
  title        = {Comprehending the IoT cyber threat landscape: {A} data dimensionality
                  reduction technique to infer and characterize Internet-scale IoT probing
                  campaigns},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S40--S49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.014},
  doi          = {10.1016/J.DIIN.2019.01.014},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PourBVNPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/Bou-HarbHDA19,
  author       = {Elias Bou{-}Harb and
                  Martin Hus{\'{a}}k and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Big Data Sanitization and Cyber Situational Awareness: {A} Network
                  Telescope Perspective},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {5},
  number       = {4},
  pages        = {439--453},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBDATA.2017.2723398},
  doi          = {10.1109/TBDATA.2017.2723398},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbd/Bou-HarbHDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PourMFRBISE19,
  author       = {Morteza Safaei Pour and
                  Antonio Mangino and
                  Kurt Friday and
                  Matthias Rathbun and
                  Elias Bou{-}Harb and
                  Farkhund Iqbal and
                  Khaled B. Shaban and
                  Abdelkarim Erradi},
  title        = {Data-driven Curation, Learning and Analysis for Inferring Evolving
                  IoT Botnets in the Wild},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {6:1--6:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339272},
  doi          = {10.1145/3339252.3339272},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PourMFRBISE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AndaLKBBLS19,
  author       = {Felix Anda and
                  David Lillis and
                  Aikaterini Kanta and
                  Brett A. Becker and
                  Elias Bou{-}Harb and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Improving Borderline Adulthood Facial Age Estimation through Ensemble
                  Learning},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {57:1--57:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341491},
  doi          = {10.1145/3339252.3341491},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AndaLKBBLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/CrichignoKBGPVP19,
  author       = {Jorge Crichigno and
                  Elie F. Kfoury and
                  Elias Bou{-}Harb and
                  Nasir Ghani and
                  Yasmany Prieto and
                  Christian Vega Caicedo and
                  Jorge E. Pezoa and
                  C. Huang and
                  David Torres},
  title        = {A Flow-Based Entropy Characterization of a NATed Network and Its Application
                  on Intrusion Detection},
  booktitle    = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
                  Shanghai, China, May 20-24, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICC.2019.8761747},
  doi          = {10.1109/ICC.2019.8761747},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/CrichignoKBGPVP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/OliveiraPCBRG19,
  author       = {Diogo Oliveira and
                  Mahsa Pourvali and
                  Jorge Crichigno and
                  Elias Bou{-}Harb and
                  Mohamed Rahouti and
                  Nasir Ghani},
  title        = {An Efficient Multi-Objective Resiliency Scheme for Routing of Virtual
                  Functions in Failure Scenarios},
  booktitle    = {6th International Conference on Software Defined Systems, {SDS} 2019,
                  Rome, Italy, June 10-13, 2019},
  pages        = {123--129},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SDS.2019.8768623},
  doi          = {10.1109/SDS.2019.8768623},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sds/OliveiraPCBRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/KfouryCBKS19,
  author       = {Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb and
                  David J. Khoury and
                  Gautam Srivastava},
  editor       = {Norbert Herencsar},
  title        = {Enabling {TCP} Pacing using Programmable Data Plane Switches},
  booktitle    = {42nd International Conference on Telecommunications and Signal Processing,
                  {TSP} 2019, Budapest, Hungary, July 1-3, 2019},
  pages        = {273--277},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSP.2019.8768888},
  doi          = {10.1109/TSP.2019.8768888},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tsp/KfouryCBKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/KhouryKGCB19,
  author       = {David J. Khoury and
                  Elie F. Kfoury and
                  Joseph Ged and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  editor       = {Norbert Herencsar},
  title        = {Method for Securing and Terminating a {CS} Call over a VoIP System
                  with Multi-Device Support},
  booktitle    = {42nd International Conference on Telecommunications and Signal Processing,
                  {TSP} 2019, Budapest, Hungary, July 1-3, 2019},
  pages        = {318--322},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSP.2019.8768893},
  doi          = {10.1109/TSP.2019.8768893},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tsp/KhouryKGCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01427,
  author       = {Felix Anda and
                  David Lillis and
                  Aikaterini Kanta and
                  Brett A. Becker and
                  Elias Bou{-}Harb and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Improving Borderline Adulthood Facial Age Estimation through Ensemble
                  Learning},
  journal      = {CoRR},
  volume       = {abs/1907.01427},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.01427},
  eprinttype    = {arXiv},
  eprint       = {1907.01427},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-01427.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ShaikhBNWG18,
  author       = {Farooq Shaikh and
                  Elias Bou{-}Harb and
                  Nataliia Neshenko and
                  Andrea P. Wright and
                  Nasir Ghani},
  title        = {Internet of Malicious Things: Correlating Active and Passive Measurements
                  for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {9},
  pages        = {170--177},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1700685},
  doi          = {10.1109/MCOM.2018.1700685},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ShaikhBNWG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bou-HarbGES18,
  author       = {Elias Bou{-}Harb and
                  Nasir Ghani and
                  Abdelkarim Erradi and
                  Khaled Bashir Shaban},
  title        = {Passive inference of attacks on {CPS} communication protocols},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {43},
  pages        = {110--122},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.10.002},
  doi          = {10.1016/J.JISA.2018.10.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Bou-HarbGES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bou-HarbAD18,
  author       = {Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {CSC-Detector: {A} System to Infer Large-Scale Probing Campaigns},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {3},
  pages        = {364--377},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2593441},
  doi          = {10.1109/TDSC.2016.2593441},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Bou-HarbAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HusakNPBC18,
  author       = {Martin Hus{\'{a}}k and
                  Nataliia Neshenko and
                  Morteza Safaei Pour and
                  Elias Bou{-}Harb and
                  Pavel Celeda},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Assessing Internet-wide Cyber Situational Awareness of Critical Sectors},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {29:1--29:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3230837},
  doi          = {10.1145/3230833.3230837},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HusakNPBC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/TorabiBAGBD18,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mario Galluscio and
                  Amine Boukhtouta and
                  Mourad Debbabi},
  title        = {Inferring, Characterizing, and Investigating Internet-Scale Malicious
                  IoT Device Activities: {A} Network Telescope Perspective},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28,
                  2018},
  pages        = {562--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSN.2018.00064},
  doi          = {10.1109/DSN.2018.00064},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/TorabiBAGBD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/NeshenkoHBCAF18,
  author       = {Nataliia Neshenko and
                  Martin Hus{\'{a}}k and
                  Elias Bou{-}Harb and
                  Pavel Celeda and
                  Sameera Al{-}Mulla and
                  Claude Fachkha},
  title        = {Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations},
  booktitle    = {{IEEE} Globecom Workshops, {GC} Wkshps 2018, Abu Dhabi, United Arab
                  Emirates, December 9-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOMW.2018.8644468},
  doi          = {10.1109/GLOCOMW.2018.8644468},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/NeshenkoHBCAF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MoreiraKB18,
  author       = {Christian Miranda Moreira and
                  Georges Kaddoum and
                  Elias Bou{-}Harb},
  title        = {Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422404},
  doi          = {10.1109/ICC.2018.8422404},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MoreiraKB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/PourB18,
  author       = {Morteza Safaei Pour and
                  Elias Bou{-}Harb},
  title        = {Implications of Theoretic Derivations on Empirical Passive Measurements
                  for Effective Cyber Threat Intelligence Generation},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422720},
  doi          = {10.1109/ICC.2018.8422720},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/PourB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/WheelusBZ18,
  author       = {Charles Wheelus and
                  Elias Bou{-}Harb and
                  Xingquan Zhu},
  title        = {Tackling Class Imbalance in Cyber Security Datasets},
  booktitle    = {2018 {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2018, Salt Lake City, UT, USA, July 6-9, 2018},
  pages        = {229--232},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IRI.2018.00041},
  doi          = {10.1109/IRI.2018.00041},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/WheelusBZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/OuerfelliBBFZ18,
  author       = {Fatima Ezzahra Ouerfelli and
                  Khaled Barbaria and
                  Elias Bou{-}Harb and
                  Claude Fachkha and
                  Belhassen Zouari},
  title        = {On the Collaborative Inference of DDoS: An Information-theoretic Distributed
                  Approach},
  booktitle    = {14th International Wireless Communications {\&} Mobile Computing
                  Conference, {IWCMC} 2018, Limassol, Cyprus, June 25-29, 2018},
  pages        = {518--523},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IWCMC.2018.8450465},
  doi          = {10.1109/IWCMC.2018.8450465},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/OuerfelliBBFZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/KongKCB18,
  author       = {Long Kong and
                  Georges Kaddoum and
                  Daniel Benevides da Costa and
                  Elias Bou{-}Harb},
  title        = {On Secrecy Bounds of {MIMO} Wiretap Channels with {ZF} detectors},
  booktitle    = {14th International Wireless Communications {\&} Mobile Computing
                  Conference, {IWCMC} 2018, Limassol, Cyprus, June 25-29, 2018},
  pages        = {724--729},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IWCMC.2018.8450477},
  doi          = {10.1109/IWCMC.2018.8450477},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwcmc/KongKCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/ShaikhBCG18,
  author       = {Farooq Shaikh and
                  Elias Bou{-}Harb and
                  Jorge Crichigno and
                  Nasir Ghani},
  title        = {A Machine Learning Model for Classifying Unsolicited IoT Devices by
                  Observing Network Telescopes},
  booktitle    = {14th International Wireless Communications {\&} Mobile Computing
                  Conference, {IWCMC} 2018, Limassol, Cyprus, June 25-29, 2018},
  pages        = {938--943},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IWCMC.2018.8450404},
  doi          = {10.1109/IWCMC.2018.8450404},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwcmc/ShaikhBCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/CrichignoCBG18,
  author       = {Jorge Crichigno and
                  Zoltan Csibi and
                  Elias Bou{-}Harb and
                  Nasir Ghani},
  title        = {Impact of Segment Size and Parallel Streams on {TCP} {BBR}},
  booktitle    = {41st International Conference on Telecommunications and Signal Processing,
                  {TSP} 2018, Athens, Greece, July 4-6, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSP.2018.8441250},
  doi          = {10.1109/TSP.2018.8441250},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tsp/CrichignoCBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/Bou-HarbF18,
  author       = {Elias Bou{-}Harb and
                  Claude Fachkha},
  editor       = {Kevin Daimi},
  title        = {On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns},
  booktitle    = {Computer and Network Security Essentials},
  pages        = {461--474},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-58424-9\_26},
  doi          = {10.1007/978-3-319-58424-9\_26},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/Bou-HarbF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-01719,
  author       = {Christian Miranda and
                  Georges Kaddoum and
                  Elias Bou{-}Harb},
  title        = {Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets},
  journal      = {CoRR},
  volume       = {abs/1802.01719},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.01719},
  eprinttype    = {arXiv},
  eprint       = {1802.01719},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-01719.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Bou-HarbLFWGS17,
  author       = {Elias Bou{-}Harb and
                  Walter Lucia and
                  Nicola Forti and
                  Sean Weerakkody and
                  Nasir Ghani and
                  Bruno Sinopoli},
  title        = {Cyber Meets Control: {A} Novel Federated Approach for Resilient {CPS}
                  Leveraging Real Cyber Threat Intelligence},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {5},
  pages        = {198--204},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600292CM},
  doi          = {10.1109/MCOM.2017.1600292CM},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/Bou-HarbLFWGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Bou-HarbS17,
  author       = {Elias Bou{-}Harb and
                  Mark Scanlon},
  title        = {Behavioral Service Graphs: {A} formal data-driven approach for prompt
                  investigation of enterprise and internet-wide infections},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S47--S55},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.002},
  doi          = {10.1016/J.DIIN.2017.02.002},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Bou-HarbS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/Bou-HarbDA17,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet
                  Takedowns},
  journal      = {{IEEE} Netw.},
  volume       = {31},
  number       = {1},
  pages        = {18--26},
  year         = {2017},
  url          = {https://doi.org/10.1109/MNET.2016.1500116NM},
  doi          = {10.1109/MNET.2016.1500116NM},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/Bou-HarbDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HusakKBC17,
  author       = {Martin Hus{\'{a}}k and
                  Jaroslav Kaspar and
                  Elias Bou{-}Harb and
                  Pavel Celeda},
  title        = {On the Sequential Pattern and Rule Mining in the Analysis of Cyber
                  Security Alerts},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {22:1--22:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3098981},
  doi          = {10.1145/3098954.3098981},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HusakKBC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/AtifiB17,
  author       = {Adil Atifi and
                  Elias Bou{-}Harb},
  title        = {On correlating network traffic for cyber threat intelligence: {A}
                  Bloom filter approach},
  booktitle    = {13th International Wireless Communications and Mobile Computing Conference,
                  {IWCMC} 2017, Valencia, Spain, June 26-30, 2017},
  pages        = {384--389},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IWCMC.2017.7986317},
  doi          = {10.1109/IWCMC.2017.7986317},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/AtifiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mtits/Bou-HarbKA17,
  author       = {Elias Bou{-}Harb and
                  Evangelos I. Kaisar and
                  Mark Austin},
  title        = {On the impact of empirical attack models targeting marine transportation},
  booktitle    = {5th {IEEE} International Conference on Models and Technologies for
                  Intelligent Transportation Systems, {MT-ITS} 2017, Naples, Italy,
                  June 26-28, 2017},
  pages        = {200--205},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MTITS.2017.8005665},
  doi          = {10.1109/MTITS.2017.8005665},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/mtits/Bou-HarbKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/FachkhaBKMA17,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Anastasis Keliris and
                  Nasir D. Memon and
                  Mustaque Ahamad},
  title        = {Internet-scale Probing of {CPS:} Inference, Characterization and Orchestration
                  Analysis},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/internet-scale-probing-cps-inference-characterization-and-orchestration-analysis/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/FachkhaBKMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/GalluscioNBHGCK17,
  author       = {Mario Galluscio and
                  Nataliia Neshenko and
                  Elias Bou{-}Harb and
                  Yongliang Huang and
                  Nasir Ghani and
                  Jorge Crichigno and
                  Georges Kaddoum},
  title        = {A first empirical look on internet-scale exploitations of IoT devices},
  booktitle    = {28th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October
                  8-13, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PIMRC.2017.8292628},
  doi          = {10.1109/PIMRC.2017.8292628},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/GalluscioNBHGCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Bou-HarbDA16,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A novel cyber security capability: Inferring Internet-scale infections
                  by correlating malware and probing activities},
  journal      = {Comput. Networks},
  volume       = {94},
  pages        = {327--343},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2015.11.004},
  doi          = {10.1016/J.COMNET.2015.11.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Bou-HarbDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Bou-Harb16,
  author       = {Elias Bou{-}Harb},
  title        = {Passive inference of attacks on {SCADA} communication protocols},
  booktitle    = {2016 {IEEE} International Conference on Communications, {ICC} 2016,
                  Kuala Lumpur, Malaysia, May 22-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICC.2016.7510609},
  doi          = {10.1109/ICC.2016.7510609},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Bou-Harb16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Bou-Harb16a,
  author       = {Elias Bou{-}Harb},
  title        = {A probabilistic model to preprocess darknet data for cyber threat
                  intelligence generation},
  booktitle    = {2016 {IEEE} International Conference on Communications, {ICC} 2016,
                  Kuala Lumpur, Malaysia, May 22-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICC.2016.7510881},
  doi          = {10.1109/ICC.2016.7510881},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/Bou-Harb16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/Bou-Harb16,
  author       = {Elias Bou{-}Harb},
  editor       = {Mohamad Badra and
                  Giovanni Pau and
                  Vasos Vassiliou},
  title        = {A Brief Survey of Security Approaches for Cyber-Physical Systems},
  booktitle    = {8th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NTMS.2016.7792424},
  doi          = {10.1109/NTMS.2016.7792424},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/Bou-Harb16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/Bou-HarbSF16,
  author       = {Elias Bou{-}Harb and
                  Mark Scanlon and
                  Claude Fachkha},
  editor       = {Mohamad Badra and
                  Giovanni Pau and
                  Vasos Vassiliou},
  title        = {Behavioral Service Graphs: {A} Big Data Approach for Prompt Investigation
                  of Internet-Wide Infections},
  booktitle    = {8th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NTMS.2016.7792437},
  doi          = {10.1109/NTMS.2016.7792437},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/Bou-HarbSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/WheelusBZ16,
  author       = {Charles Wheelus and
                  Elias Bou{-}Harb and
                  Xingquan Zhu},
  editor       = {Mohamad Badra and
                  Giovanni Pau and
                  Vasos Vassiliou},
  title        = {Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence},
  booktitle    = {8th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NTMS.2016.7792484},
  doi          = {10.1109/NTMS.2016.7792484},
  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/WheelusBZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/WolahanLBS16,
  author       = {Hannah Wolahan and
                  Claudio Chico Lorenzo and
                  Elias Bou{-}Harb and
                  Mark Scanlon},
  editor       = {Mohamad Badra and
                  Giovanni Pau and
                  Vasos Vassiliou},
  title        = {Towards the Leveraging of Data Deduplication to Break the Disk Acquisition
                  Speed Limit},
  booktitle    = {8th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NTMS.2016.7792486},
  doi          = {10.1109/NTMS.2016.7792486},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/WolahanLBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WolahanLBS16,
  author       = {Hannah Wolahan and
                  Claudio Chico Lorenzo and
                  Elias Bou{-}Harb and
                  Mark Scanlon},
  title        = {Towards the Leveraging of Data Deduplication to Break the Disk Acquisition
                  Speed Limit},
  journal      = {CoRR},
  volume       = {abs/1610.05462},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.05462},
  eprinttype    = {arXiv},
  eprint       = {1610.05462},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WolahanLBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FachkhaBD15,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  title        = {Inferring distributed reflection denial of service attacks from darknet},
  journal      = {Comput. Commun.},
  volume       = {62},
  pages        = {59--71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.01.016},
  doi          = {10.1016/J.COMCOM.2015.01.016},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/FachkhaBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/FachkhaBD15,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  title        = {On the inference and prediction of DDoS campaigns},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {15},
  number       = {6},
  pages        = {1066--1078},
  year         = {2015},
  url          = {https://doi.org/10.1002/wcm.2510},
  doi          = {10.1002/WCM.2510},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/FachkhaBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA15,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Time Series Approach for Inferring Orchestrated Probing Campaigns
                  by Analyzing Darknet Traffic},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {180--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.9},
  doi          = {10.1109/ARES.2015.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bou-HarbDA14,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {On fingerprinting probing activities},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {35--48},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.005},
  doi          = {10.1016/J.COSE.2014.02.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bou-HarbDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/Bou-HarbDA14,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Cyber Scanning: {A} Comprehensive Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {16},
  number       = {3},
  pages        = {1496--1519},
  year         = {2014},
  url          = {https://doi.org/10.1109/SURV.2013.102913.00020},
  doi          = {10.1109/SURV.2013.102913.00020},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/Bou-HarbDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Bou-HarbLBD14,
  author       = {Elias Bou{-}Harb and
                  Nour{-}Eddine Lakhdari and
                  Hamad Binsalleeh and
                  Mourad Debbabi},
  title        = {Multidimensional investigation of source port 0 probing},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S114--S123},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.012},
  doi          = {10.1016/J.DIIN.2014.05.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Bou-HarbLBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Bou-HarbFDA14,
  author       = {Elias Bou{-}Harb and
                  Claude Fachkha and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Inferring internet-scale infections by correlating malware and probing
                  activities},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {640--646},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883391},
  doi          = {10.1109/ICC.2014.6883391},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Bou-HarbFDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Bou-HarbDA14,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Behavioral analytics for inferring large-scale orchestrated probing
                  events},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {506--511},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849283},
  doi          = {10.1109/INFCOMW.2014.6849283},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Bou-HarbDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/FachkhaBD14,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {Fingerprinting Internet {DNS} Amplification DDoS Activities},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814019},
  doi          = {10.1109/NTMS.2014.6814019},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/FachkhaBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Bou-HarbFPDA13,
  author       = {Elias Bou{-}Harb and
                  Claude Fachkha and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Communication security for smart grid distribution networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {51},
  number       = {1},
  pages        = {42--49},
  year         = {2013},
  url          = {https://doi.org/10.1109/MCOM.2013.6400437},
  doi          = {10.1109/MCOM.2013.6400437},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/Bou-HarbFPDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Bou-HarbDA13,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A systematic approach for detecting and clustering distributed cyber
                  scanning},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {18},
  pages        = {3826--3839},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.09.008},
  doi          = {10.1016/J.COMNET.2013.09.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Bou-HarbDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Bou-HarbPDA13,
  author       = {Elias Bou{-}Harb and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A secure, efficient, and cost-effective distributed architecture for
                  spam mitigation on {LTE} 4G mobile networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1478--1489},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.413},
  doi          = {10.1002/SEC.413},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Bou-HarbPDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA13,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A Statistical Approach for Fingerprinting Probing Activities},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {21--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.9},
  doi          = {10.1109/ARES.2013.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/Bou-HarbDA13,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  editor       = {Roberto Saracco and
                  Khaled Ben Letaief and
                  Mario Gerla and
                  Sergio Palazzo and
                  Luigi Atzori},
  title        = {On detecting and clustering distributed cyber scanning},
  booktitle    = {2013 9th International Wireless Communications and Mobile Computing
                  Conference, {IWCMC} 2013, Sardinia, Italy, July 1-5, 2013},
  pages        = {926--933},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IWCMC.2013.6583681},
  doi          = {10.1109/IWCMC.2013.6583681},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/Bou-HarbDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/FachkhaBD13,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  title        = {Towards a Forecasting Model for Distributed Denial of Service Activities},
  booktitle    = {2013 {IEEE} 12th International Symposium on Network Computing and
                  Applications, Cambridge, MA, USA, August 22-24, 2013},
  pages        = {110--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/NCA.2013.13},
  doi          = {10.1109/NCA.2013.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/FachkhaBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FachkhaBD13,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Mourad Debbabi},
  title        = {Fingerprinting Internet {DNS} Amplification DDoS Activities},
  journal      = {CoRR},
  volume       = {abs/1310.4216},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.4216},
  eprinttype    = {arXiv},
  eprint       = {1310.4216},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FachkhaBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/FachkhaBBDID12,
  author       = {Claude Fachkha and
                  Elias Bou{-}Harb and
                  Amine Boukhtouta and
                  Son Dinh and
                  Farkhund Iqbal and
                  Mourad Debbabi},
  editor       = {Fabio Martinelli and
                  Jean{-}Louis Lanet and
                  William M. Fitzgerald and
                  Simon N. Foley},
  title        = {Investigating the dark cyberspace: Profiling, threat-based analysis
                  and correlation},
  booktitle    = {7th International Conference on Risks and Security of Internet and
                  Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CRISIS.2012.6378947},
  doi          = {10.1109/CRISIS.2012.6378947},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/FachkhaBBDID12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Bou-HarbDA12,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A first look on the effects and mitigation of VoIP {SPIT} flooding
                  in 4G mobile networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {982--987},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364233},
  doi          = {10.1109/ICC.2012.6364233},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Bou-HarbDA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics