Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Elias Bou-Harb
@article{DBLP:journals/tnsm/KfouryCB24, author = {Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, title = {{P4BS:} Leveraging Passive Measurements From {P4} Switches to Dynamically Modify a Router's Buffer Size}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {1}, pages = {1082--1099}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2023.3306335}, doi = {10.1109/TNSM.2023.3306335}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/KfouryCB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SarieddineSAATKPB24, author = {Khaled Sarieddine and Mohammad Ali Sayed and Chadi Assi and Ribal Atallah and Sadegh Torabi and Joseph Khoury and Morteza Safaei Pour and Elias Bou{-}Harb}, title = {{EV} Charging Infrastructure Discovery to Contextualize Its Deployment Security}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {1}, pages = {1287--1301}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2023.3318406}, doi = {10.1109/TNSM.2023.3318406}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/SarieddineSAATKPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-03374, author = {Nafis Tanveer Islam and Joseph Khoury and Andrew Seong and Gonzalo De La Torre Parra and Elias Bou{-}Harb and Peyman Najafirad}, title = {LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward}, journal = {CoRR}, volume = {abs/2401.03374}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.03374}, doi = {10.48550/ARXIV.2401.03374}, eprinttype = {arXiv}, eprint = {2401.03374}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-03374.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/WehbeAPBA23, author = {Nathalie Wehbe and Hyame Assem Alameddine and Makan Pourzandi and Elias Bou{-}Harb and Chadi Assi}, title = {A Security Assessment of {HTTP/2} Usage in 5G Service-Based Architecture}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {1}, pages = {48--54}, year = {2023}, url = {https://doi.org/10.1109/MCOM.001.2200183}, doi = {10.1109/MCOM.001.2200183}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/WehbeAPBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KfouryCB23, author = {Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, title = {P4Tune: Enabling Programmability in Non-Programmable Networks}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {6}, pages = {132--138}, year = {2023}, url = {https://doi.org/10.1109/MCOM.001.2200287}, doi = {10.1109/MCOM.001.2200287}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/KfouryCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PourNFB23, author = {Morteza Safaei Pour and Christelle Nader and Kurt Friday and Elias Bou{-}Harb}, title = {A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security}, journal = {Comput. Secur.}, volume = {128}, pages = {103123}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103123}, doi = {10.1016/J.COSE.2023.103123}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PourNFB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ZincirHeywoodBBCEIKLPSSZ23, author = {Nur Zincir{-}Heywood and Robert Birke and Elias Bou{-}Harb and Giuliano Casale and Khalil El{-}Khatib and Takeru Inoue and Neeraj Kumar and Hanan Lutfiyya and Deepak Puthal and Abdallah Shami and Natalia Stakhanova and Farhana H. Zulkernine}, title = {Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part {II}}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {2}, pages = {882--889}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3280230}, doi = {10.1109/TNSM.2023.3280230}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/ZincirHeywoodBBCEIKLPSSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/VehabovicZSGPBC23, author = {Aldin Vehabovic and Hadi Zanddizari and Farook Shaikh and Nasir Ghani and Morteza Safaei Pour and Elias Bou{-}Harb and Jorge Crichigno}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {Federated Learning Approach for Distributed Ransomware Analysis}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {621--641}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_33}, doi = {10.1007/978-3-031-41181-6\_33}, timestamp = {Mon, 16 Oct 2023 19:47:08 +0200}, biburl = {https://dblp.org/rec/conf/acns/VehabovicZSGPBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cce2/HusakKKB23, author = {Martin Hus{\'{a}}k and Joseph Khoury and {\DH}orde Klisura and Elias Bou{-}Harb}, editor = {Pierre Collet and Latafat A. Gardashova and Samer El Zant and Ulviya Abdulkarimova}, title = {On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics}, booktitle = {Complex Computational Ecosystems - First International Conference, {CCE} 2023, Baku, Azerbaijan, April 25-27, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13927}, pages = {167--179}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44355-8\_12}, doi = {10.1007/978-3-031-44355-8\_12}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cce2/HusakKKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/IslamPMBN23, author = {Nafis Tanveer Islam and Gonzalo De La Torre Parra and Dylan Manuel and Elias Bou{-}Harb and Peyman Najafirad}, title = {An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {144--159}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00018}, doi = {10.1109/EUROSP57164.2023.00018}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/IslamPMBN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MolinaBTA23, author = {Ricardo Misael Ayala Molina and Elias Bou{-}Harb and Sadegh Torabi and Chadi Assi}, title = {{RPM:} Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279119}, doi = {10.1109/ICC45041.2023.10279119}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/MolinaBTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AlSabehFCB23, author = {Ali AlSabeh and Kurt Friday and Jorge Crichigno and Elias Bou{-}Harb}, title = {Effective {DGA} Family Classification Using a Hybrid Shallow and Deep Packet Inspection Technique on {P4} Programmable Switches}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {3781--3786}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279024}, doi = {10.1109/ICC45041.2023.10279024}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/AlSabehFCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KfouryCB23, author = {Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, title = {{P4CCI:} P4-Based Online {TCP} Congestion Control Algorithm Identification for Traffic Separation}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {4007--4012}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279386}, doi = {10.1109/ICC45041.2023.10279386}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/KfouryCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NasrTBFA23, author = {Tony Nasr and Sadegh Torabi and Elias Bou{-}Harb and Claude Fachkha and Chadi Assi}, title = {ChargePrint: {A} Framework for Internet-Scale Discovery and Security Analysis of {EV} Charging Management Systems}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/chargeprint-a-framework-for-internet-scale-discovery-and-security-analysis-of-ev-charging-management-systems/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/NasrTBFA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/VehabovicZGSBPC23, author = {Aldin Vehabovic and Hadi Zanddizari and Nasir Ghani and Farooq Shaikh and Elias Bou{-}Harb and Morteza Safaei Pour and Jorge Crichigno}, title = {Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution}, booktitle = {{NOMS} 2023, {IEEE/IFIP} Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NOMS56928.2023.10154378}, doi = {10.1109/NOMS56928.2023.10154378}, timestamp = {Tue, 10 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/VehabovicZGSBPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/RammouzKKPPFB23, author = {Veronica Rammouz and Joseph Khoury and {\DH}orde Klisura and Morteza Safaei Pour and Mostafa Safaei Pour and Claude Fachkha and Elias Bou{-}Harb}, title = {Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations}, booktitle = {19th International Conference on Wireless and Mobile Computing, Networking and Communication,, WiMob 2023, Montreal, QC, Canada, June 21-23, 2023}, pages = {206--211}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WiMob58348.2023.10187762}, doi = {10.1109/WIMOB58348.2023.10187762}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wimob/RammouzKKPPFB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-04398, author = {Aldin Vehabovic and Nasir Ghani and Elias Bou{-}Harb and Jorge Crichigno and Ayseg{\"{u}}l Yayimli}, title = {Ransomware Detection and Classification Strategies}, journal = {CoRR}, volume = {abs/2304.04398}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.04398}, doi = {10.48550/ARXIV.2304.04398}, eprinttype = {arXiv}, eprint = {2304.04398}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-04398.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-11072, author = {Nafis Tanveer Islam and Gonzalo De La Torre Parra and Dylan Manuel and Elias Bou{-}Harb and Peyman Najafirad}, title = {An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph}, journal = {CoRR}, volume = {abs/2304.11072}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.11072}, doi = {10.48550/ARXIV.2304.11072}, eprinttype = {arXiv}, eprint = {2304.11072}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-11072.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-13287, author = {Aldin Vehabovic and Hadi Zanddizari and Nasir Ghani and Farooq Shaikh and Elias Bou{-}Harb and Morteza Safaei Pour and Jorge Crichigno}, title = {Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution}, journal = {CoRR}, volume = {abs/2305.13287}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.13287}, doi = {10.48550/ARXIV.2305.13287}, eprinttype = {arXiv}, eprint = {2305.13287}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-13287.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-15191, author = {Farooq Shaikh and Elias Bou{-}Harb and Aldin Vehabovic and Jorge Crichigno and Ayseg{\"{u}}l Yayimli and Nasir Ghani}, title = {IoT Threat Detection Testbed Using Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/2305.15191}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.15191}, doi = {10.48550/ARXIV.2305.15191}, eprinttype = {arXiv}, eprint = {2305.15191}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-15191.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-14090, author = {Aldin Vehabovic and Hadi Zanddizari and Farooq Shaikh and Nasir Ghani and Morteza Safaei Pour and Elias Bou{-}Harb and Jorge Crichigno}, title = {Federated Learning Approach for Distributed Ransomware Analysis}, journal = {CoRR}, volume = {abs/2306.14090}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.14090}, doi = {10.48550/ARXIV.2306.14090}, eprinttype = {arXiv}, eprint = {2306.14090}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-14090.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-07760, author = {Aldin Vehabovic and Hadi Zanddizari and Nasir Ghani and G. Javidi and A. Selcuk Uluagac and Mohamed Rahouti and Elias Bou{-}Harb and Morteza Safaei Pour}, title = {Ransomware Detection Using Federated Learning with Imbalanced Datasets}, journal = {CoRR}, volume = {abs/2311.07760}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.07760}, doi = {10.48550/ARXIV.2311.07760}, eprinttype = {arXiv}, eprint = {2311.07760}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-07760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/CrichignoKBG22, author = {Jorge Crichigno and Elie F. Kfoury and Elias Bou{-}Harb and Nasir Ghani}, title = {High-Speed Networks - {A} Tutorial}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-88841-1}, doi = {10.1007/978-3-030-88841-1}, isbn = {978-3-030-88840-4}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/CrichignoKBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/NeshenkoBF22, author = {Nataliia Neshenko and Elias Bou{-}Harb and Borko Furht}, title = {Smart Cities: Cyber Situational Awareness to Support Decision Making}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18464-2}, doi = {10.1007/978-3-031-18464-2}, isbn = {978-3-031-18463-5}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/NeshenkoBF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AlSabehKKCB22, author = {Ali AlSabeh and Joseph Khoury and Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, title = {A survey on security applications of {P4} programmable switches and a STRIDE-based vulnerability assessment}, journal = {Comput. Networks}, volume = {207}, pages = {108800}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.108800}, doi = {10.1016/J.COMNET.2022.108800}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AlSabehKKCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NasrTBFA22, author = {Tony Nasr and Sadegh Torabi and Elias Bou{-}Harb and Claude Fachkha and Chadi Assi}, title = {Power jacking your station: In-depth security analysis of electric vehicle charging station management systems}, journal = {Comput. Secur.}, volume = {112}, pages = {102511}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102511}, doi = {10.1016/J.COSE.2021.102511}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NasrTBFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ClosserB22, author = {Dayton Closser and Elias Bou{-}Harb}, title = {A live digital forensics approach for quantum mechanical computers}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301341}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301341}, doi = {10.1016/J.FSIDI.2022.301341}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ClosserB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TorabiBAKBD22, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and ElMouatez Billah Karbab and Amine Boukhtouta and Mourad Debbabi}, title = {Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {402--418}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2979183}, doi = {10.1109/TDSC.2020.2979183}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/TorabiBAKBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/MolinaTSBBA22, author = {Ricardo Misael Ayala Molina and Sadegh Torabi and Khaled Sarieddine and Elias Bou{-}Harb and Nizar Bouguila and Chadi Assi}, title = {On Ransomware Family Attribution Using Pre-Attack Paranoia Activities}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {1}, pages = {19--36}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2021.3112056}, doi = {10.1109/TNSM.2021.3112056}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/MolinaTSBBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ZincirHeywoodBBCEIKLPSSZ22, author = {Nur Zincir{-}Heywood and Robert Birke and Elias Bou{-}Harb and Giuliano Casale and Khalil El{-}Khatib and Takeru Inoue and Neeraj Kumar and Hanan Lutfiyya and Deepak Puthal and Abdallah Shami and Natalia Stakhanova and Farhana H. Zulkernine}, title = {Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part {I}}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {4}, pages = {3988--3994}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3227775}, doi = {10.1109/TNSM.2022.3227775}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/ZincirHeywoodBBCEIKLPSSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KhouryPB22, author = {Joseph Khoury and Morteza Safaei Pour and Elias Bou{-}Harb}, title = {A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {32:1--32:11}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3539009}, doi = {10.1145/3538969.3539009}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KhouryPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/DibTBBA22, author = {Mirabelle Dib and Sadegh Torabi and Elias Bou{-}Harb and Nizar Bouguila and Chadi Assi}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {EVOLIoT: {A} Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {452--466}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517393}, doi = {10.1145/3488932.3517393}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/DibTBBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blackseecom/ShaikhBVCYG22, author = {Farooq Shaikh and Elias Bou{-}Harb and Aldin Vehabovic and Jorge Crichigno and Ayseg{\"{u}}l Yayimli and Nasir Ghani}, title = {IoT Threat Detection Testbed Using Generative Adversarial Networks}, booktitle = {10th {IEEE} International Black Sea Conference on Communications and Networking, BlackSeaCom 2022, Sofia, Bulgaria, June 6-9, 2022}, pages = {77--84}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BlackSeaCom54372.2022.9858239}, doi = {10.1109/BLACKSEACOM54372.2022.9858239}, timestamp = {Mon, 29 Aug 2022 17:11:31 +0200}, biburl = {https://dblp.org/rec/conf/blackseecom/ShaikhBVCYG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blackseecom/VehabovicGBCY22, author = {Aldin Vehabovic and Nasir Ghani and Elias Bou{-}Harb and Jorge Crichigno and Ayseg{\"{u}}l Yayimli}, title = {Ransomware Detection and Classification Strategies}, booktitle = {10th {IEEE} International Black Sea Conference on Communications and Networking, BlackSeaCom 2022, Sofia, Bulgaria, June 6-9, 2022}, pages = {316--324}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BlackSeaCom54372.2022.9858296}, doi = {10.1109/BLACKSEACOM54372.2022.9858296}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blackseecom/VehabovicGBCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/NaderB22, author = {Christelle Nader and Elias Bou{-}Harb}, editor = {Luca Sterpone and Andrea Bartolini and Anastasiia Butko}, title = {An attentive interpretable approach for identifying and quantifying malware-infected internet-scale IoT bots behind a {NAT}}, booktitle = {{CF} '22: 19th {ACM} International Conference on Computing Frontiers, Turin, Italy, May 17 - 22, 2022}, pages = {279--286}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3528416.3530995}, doi = {10.1145/3528416.3530995}, timestamp = {Thu, 05 May 2022 15:51:05 +0200}, biburl = {https://dblp.org/rec/conf/cf/NaderB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FridayKBC22, author = {Kurt Friday and Elie F. Kfoury and Elias Bou{-}Harb and Jorge Crichigno}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {{INC:} In-Network Classification of Botnet Propagation at Line Rate}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {551--569}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_27}, doi = {10.1007/978-3-031-17140-6\_27}, timestamp = {Tue, 27 Sep 2022 21:06:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FridayKBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ParraSKIBR22, author = {Gonzalo De La Torre Parra and Luis Selvera and Joseph Khoury and Hector Irizarry and Elias Bou{-}Harb and Paul Rad}, title = {Interpretable Federated Transformer Log Learning for Cloud Threat Forensics}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-236/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ParraSKIBR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/PourKB22, author = {Morteza Safaei Pour and Joseph Khoury and Elias Bou{-}Harb}, title = {HoneyComb: {A} Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789827}, doi = {10.1109/NOMS54207.2022.9789827}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/PourKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/FridayBC22, author = {Kurt Friday and Elias Bou{-}Harb and Jorge Crichigno}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {A Learning Methodology for Line-Rate Ransomware Mitigation with {P4} Switches}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {120--139}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_7}, doi = {10.1007/978-3-031-23020-2\_7}, timestamp = {Thu, 08 Dec 2022 15:13:16 +0100}, biburl = {https://dblp.org/rec/conf/nss/FridayBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KfouryCB21, author = {Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, title = {An Exhaustive Survey on {P4} Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends}, journal = {{IEEE} Access}, volume = {9}, pages = {87094--87155}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3086704}, doi = {10.1109/ACCESS.2021.3086704}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KfouryCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AndaDBLS21, author = {Felix Anda and Edward Dixon and Elias Bou{-}Harb and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Vec2UAge: Enhancing underage age estimation performance through facial embeddings}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301119}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301119}, doi = {10.1016/J.FSIDI.2021.301119}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AndaDBLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NeshenkoBF21, author = {Nataliia Neshenko and Elias Bou{-}Harb and Borko Furht}, title = {A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301198}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301198}, doi = {10.1016/J.FSIDI.2021.301198}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NeshenkoBF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/TorabiDBAD21, author = {Sadegh Torabi and Mirabelle Dib and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships}, journal = {{IEEE} Netw. Lett.}, volume = {3}, number = {3}, pages = {161--165}, year = {2021}, url = {https://doi.org/10.1109/lnet.2021.3076600}, doi = {10.1109/LNET.2021.3076600}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/TorabiDBAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/DibTBA21, author = {Mirabelle Dib and Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi}, title = {A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {2}, pages = {1165--1177}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3075315}, doi = {10.1109/TNSM.2021.3075315}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/DibTBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/PourWB21, author = {Morteza Safaei Pour and Dylan Watson and Elias Bou{-}Harb}, title = {Sanitizing the IoT Cyber Security Posture: An Operational {CTI} Feed Backed up by Internet Measurements}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {497--506}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00059}, doi = {10.1109/DSN48987.2021.00059}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/PourWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KfouryCBS21, author = {Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb and Gautam Srivastava}, title = {Dynamic Router's Buffer Sizing using Passive Measurements and {P4} Programmable Switches}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2021, Madrid, Spain, December 7-11, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/GLOBECOM46510.2021.9685160}, doi = {10.1109/GLOBECOM46510.2021.9685160}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/KfouryCBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/NaderB21, author = {Christelle Nader and Elias Bou{-}Harb}, title = {Revisiting IoT Fingerprinting behind a {NAT}}, booktitle = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021}, pages = {1745--1752}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00235}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00235}, timestamp = {Thu, 06 Jan 2022 09:48:16 +0100}, biburl = {https://dblp.org/rec/conf/ispa/NaderB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/ManginoB21, author = {Antonio Mangino and Elias Bou{-}Harb}, title = {A Multidimensional Network Forensics Investigation of a State-Sanctioned Internet Outage}, booktitle = {17th International Wireless Communications and Mobile Computing, {IWCMC} 2021, Harbin City, China, June 28 - July 2, 2021}, pages = {813--818}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IWCMC51323.2021.9498743}, doi = {10.1109/IWCMC51323.2021.9498743}, timestamp = {Fri, 13 Aug 2021 16:13:45 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/ManginoB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/0001KEB21, author = {Mohamed Nassar and Joseph Khoury and Abdelkarim Erradi and Elias Bou{-}Harb}, title = {Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems}, booktitle = {11th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2021, Paris, France, April 19-21, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NTMS49979.2021.9432668}, doi = {10.1109/NTMS49979.2021.9432668}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/0001KEB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-00643, author = {Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, title = {An Exhaustive Survey on {P4} Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends}, journal = {CoRR}, volume = {abs/2102.00643}, year = {2021}, url = {https://arxiv.org/abs/2102.00643}, eprinttype = {arXiv}, eprint = {2102.00643}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-00643.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Bou-HarbN20, author = {Elias Bou{-}Harb and Nataliia Neshenko}, title = {Cyber Threat Intelligence for the Internet of Things}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45858-4}, doi = {10.1007/978-3-030-45858-4}, isbn = {978-3-030-45857-7}, timestamp = {Tue, 02 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Bou-HarbN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KfouryGCB20, author = {Elie F. Kfoury and Jose Gomez and Jorge Crichigno and Elias Bou{-}Harb}, title = {An emulation-based evaluation of {TCP} BBRv2 Alpha for wired broadband}, journal = {Comput. Commun.}, volume = {161}, pages = {212--224}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.07.018}, doi = {10.1016/J.COMCOM.2020.07.018}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/KfouryGCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PourMFRBISCG20, author = {Morteza Safaei Pour and Antonio Mangino and Kurt Friday and Matthias Rathbun and Elias Bou{-}Harb and Farkhund Iqbal and Sagar Samtani and Jorge Crichigno and Nasir Ghani}, title = {On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild}, journal = {Comput. Secur.}, volume = {91}, pages = {101707}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101707}, doi = {10.1016/J.COSE.2019.101707}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PourMFRBISCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TorabiBAD20, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300922}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300922}, doi = {10.1016/J.FSIDI.2020.300922}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TorabiBAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/PourTBAD20, author = {Morteza Safaei Pour and Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities}, journal = {{IEEE} Netw. Lett.}, volume = {2}, number = {3}, pages = {159--163}, year = {2020}, url = {https://doi.org/10.1109/lnet.2020.2998045}, doi = {10.1109/LNET.2020.2998045}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/PourTBAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbd/NeshenkoNBF20, author = {Nataliia Neshenko and Christelle Nader and Elias Bou{-}Harb and Borko Furht}, title = {A survey of methods supporting cyber situational awareness in the context of smart cities}, journal = {J. Big Data}, volume = {7}, number = {1}, pages = {92}, year = {2020}, url = {https://doi.org/10.1186/s40537-020-00363-0}, doi = {10.1186/S40537-020-00363-0}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbd/NeshenkoNBF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MirandaKBGK20, author = {Christian Miranda and Georges Kaddoum and Elias Bou{-}Harb and Sahil Garg and Kuljeet Kaur}, title = {A Collaborative Security Framework for Software-Defined Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2602--2615}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2973875}, doi = {10.1109/TIFS.2020.2973875}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MirandaKBGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/KaurGKBC20, author = {Kuljeet Kaur and Sahil Garg and Georges Kaddoum and Elias Bou{-}Harb and Kim{-}Kwang Raymond Choo}, title = {A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {4}, pages = {2687--2697}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2939573}, doi = {10.1109/TII.2019.2939573}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/KaurGKBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/HusakBKBC20, author = {Martin Hus{\'{a}}k and Tom{\'{a}}s Bajtos and Jaroslav Kaspar and Elias Bou{-}Harb and Pavel Celeda}, title = {Predictive Cyber Situational Awareness and Personalized Blacklisting: {A} Sequential Rule Mining Approach}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {11}, number = {4}, pages = {19:1--19:16}, year = {2020}, url = {https://doi.org/10.1145/3386250}, doi = {10.1145/3386250}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/HusakBKBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/ManginoPB20, author = {Antonio Mangino and Morteza Safaei Pour and Elias Bou{-}Harb}, title = {Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {11}, number = {4}, pages = {21:1--21:24}, year = {2020}, url = {https://doi.org/10.1145/3394504}, doi = {10.1145/3394504}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/ManginoPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AlSabehSBC20, author = {Ali AlSabeh and Ha{\"{\i}}dar Safa and Elias Bou{-}Harb and Jorge Crichigno}, title = {Exploiting Ransomware Paranoia For Execution Prevention}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149005}, doi = {10.1109/ICC40277.2020.9149005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/AlSabehSBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KfouryCB20, author = {Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, title = {Offloading Media Traffic to Programmable Data Plane Switches}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149159}, doi = {10.1109/ICC40277.2020.9149159}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KfouryCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/FridayKBC20, author = {Kurt Friday and Elie F. Kfoury and Elias Bou{-}Harb and Jorge Crichigno}, editor = {Filip De Turck and Prosper Chemouil and Tim Wauters and Mohamed Faten Zhani and Walter Cerroni and Rafael Pasquini and Zuqing Zhu}, title = {Towards a Unified In-Network DDoS Detection and Mitigation Strategy}, booktitle = {6th {IEEE} Conference on Network Softwarization, NetSoft 2020, Ghent, Belgium, June 29 - July 3, 2020}, pages = {218--226}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NetSoft48620.2020.9165336}, doi = {10.1109/NETSOFT48620.2020.9165336}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/FridayKBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/GomezKCBS20, author = {Jose Gomez and Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb and Gautam Srivastava}, editor = {Norbert Herencsar}, title = {A Performance Evaluation of {TCP} BBRv2 Alpha}, booktitle = {43rd International Conference on Telecommunications and Signal Processing, {TSP} 2020, Milan, Italy, July 7-9, 2020}, pages = {309--312}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TSP49548.2020.9163512}, doi = {10.1109/TSP49548.2020.9163512}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tsp/GomezKCBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/AlSabehKCB20, author = {Ali AlSabeh and Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb}, editor = {Norbert Herencsar}, title = {Leveraging SONiC Functionalities in Disaggregated Network Switches}, booktitle = {43rd International Conference on Telecommunications and Signal Processing, {TSP} 2020, Milan, Italy, July 7-9, 2020}, pages = {457--460}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TSP49548.2020.9163508}, doi = {10.1109/TSP49548.2020.9163508}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tsp/AlSabehKCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/KfouryKAGCB20, author = {Elie F. Kfoury and David J. Khoury and Ali AlSabeh and Jose Gomez and Jorge Crichigno and Elias Bou{-}Harb}, editor = {Norbert Herencsar}, title = {A Blockchain-based Method for Decentralizing the {ACME} Protocol to Enhance Trust in {PKI}}, booktitle = {43rd International Conference on Telecommunications and Signal Processing, {TSP} 2020, Milan, Italy, July 7-9, 2020}, pages = {461--465}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TSP49548.2020.9163555}, doi = {10.1109/TSP49548.2020.9163555}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tsp/KfouryKAGCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShaikhRGXBH19, author = {Farooq Shaikh and Mohamed Rahouti and Nasir Ghani and Kaiqi Xiong and Elias Bou{-}Harb and Jamal Haque}, title = {A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems}, journal = {{IEEE} Access}, volume = {7}, pages = {63164--63180}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2916617}, doi = {10.1109/ACCESS.2019.2916617}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShaikhRGXBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KfouryGCBK19, author = {Elie F. Kfoury and Jose Gomez and Jorge Crichigno and Elias Bou{-}Harb and David J. Khoury}, title = {Decentralized Distribution of {PCP} Mappings Over Blockchain for End-to-End Secure Direct Communications}, journal = {{IEEE} Access}, volume = {7}, pages = {110159--110173}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2934049}, doi = {10.1109/ACCESS.2019.2934049}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KfouryGCBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/OliveiraGHCB19, author = {Diogo Oliveira and Nasir Ghani and Majeed M. Hayat and Jorge Crichigno and Elias Bou{-}Harb}, title = {{SDN} Testbed for Evaluation of Large Exo-Atmospheric {EMP} Attacks}, journal = {{IEEE} Commun. Mag.}, volume = {57}, number = {1}, pages = {88--97}, year = {2019}, url = {https://doi.org/10.1109/MCOM.2017.1700847}, doi = {10.1109/MCOM.2017.1700847}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/OliveiraGHCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PourB19, author = {Morteza Safaei Pour and Elias Bou{-}Harb}, title = {Theoretic derivations of scan detection operating on darknet traffic}, journal = {Comput. Commun.}, volume = {147}, pages = {111--121}, year = {2019}, url = {https://doi.org/10.1016/j.comcom.2019.08.014}, doi = {10.1016/J.COMCOM.2019.08.014}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/PourB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/HusakKBC19, author = {Martin Hus{\'{a}}k and Jana Kom{\'{a}}rkov{\'{a}} and Elias Bou{-}Harb and Pavel Celeda}, title = {Survey of Attack Projection, Prediction, and Forecasting in Cyber Security}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {21}, number = {1}, pages = {640--660}, year = {2019}, url = {https://doi.org/10.1109/COMST.2018.2871866}, doi = {10.1109/COMST.2018.2871866}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/HusakKBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/CrichignoBG19, author = {Jorge Crichigno and Elias Bou{-}Harb and Nasir Ghani}, title = {A Comprehensive Tutorial on Science {DMZ}}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {21}, number = {2}, pages = {2041--2078}, year = {2019}, url = {https://doi.org/10.1109/COMST.2018.2876086}, doi = {10.1109/COMST.2018.2876086}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/CrichignoBG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/NeshenkoBCKG19, author = {Nataliia Neshenko and Elias Bou{-}Harb and Jorge Crichigno and Georges Kaddoum and Nasir Ghani}, title = {Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {21}, number = {3}, pages = {2702--2733}, year = {2019}, url = {https://doi.org/10.1109/COMST.2019.2910750}, doi = {10.1109/COMST.2019.2910750}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/NeshenkoBCKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AndaLKBBLS19, author = {Felix Anda and David Lillis and Aikaterini Kanta and Brett A. Becker and Elias Bou{-}Harb and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Improving the accuracy of automated facial age estimation to aid {CSEM} investigations}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S142}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.024}, doi = {10.1016/J.DIIN.2019.01.024}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AndaLKBBLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PourBVNPC19, author = {Morteza Safaei Pour and Elias Bou{-}Harb and Kavita Varma and Nataliia Neshenko and Dimitris A. Pados and Kim{-}Kwang Raymond Choo}, title = {Comprehending the IoT cyber threat landscape: {A} data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S40--S49}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.014}, doi = {10.1016/J.DIIN.2019.01.014}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PourBVNPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/Bou-HarbHDA19, author = {Elias Bou{-}Harb and Martin Hus{\'{a}}k and Mourad Debbabi and Chadi Assi}, title = {Big Data Sanitization and Cyber Situational Awareness: {A} Network Telescope Perspective}, journal = {{IEEE} Trans. Big Data}, volume = {5}, number = {4}, pages = {439--453}, year = {2019}, url = {https://doi.org/10.1109/TBDATA.2017.2723398}, doi = {10.1109/TBDATA.2017.2723398}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tbd/Bou-HarbHDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PourMFRBISE19, author = {Morteza Safaei Pour and Antonio Mangino and Kurt Friday and Matthias Rathbun and Elias Bou{-}Harb and Farkhund Iqbal and Khaled B. Shaban and Abdelkarim Erradi}, title = {Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {6:1--6:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339272}, doi = {10.1145/3339252.3339272}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PourMFRBISE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AndaLKBBLS19, author = {Felix Anda and David Lillis and Aikaterini Kanta and Brett A. Becker and Elias Bou{-}Harb and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {57:1--57:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341491}, doi = {10.1145/3339252.3341491}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AndaLKBBLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CrichignoKBGPVP19, author = {Jorge Crichigno and Elie F. Kfoury and Elias Bou{-}Harb and Nasir Ghani and Yasmany Prieto and Christian Vega Caicedo and Jorge E. Pezoa and C. Huang and David Torres}, title = {A Flow-Based Entropy Characterization of a NATed Network and Its Application on Intrusion Detection}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8761747}, doi = {10.1109/ICC.2019.8761747}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/CrichignoKBGPVP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sds/OliveiraPCBRG19, author = {Diogo Oliveira and Mahsa Pourvali and Jorge Crichigno and Elias Bou{-}Harb and Mohamed Rahouti and Nasir Ghani}, title = {An Efficient Multi-Objective Resiliency Scheme for Routing of Virtual Functions in Failure Scenarios}, booktitle = {6th International Conference on Software Defined Systems, {SDS} 2019, Rome, Italy, June 10-13, 2019}, pages = {123--129}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SDS.2019.8768623}, doi = {10.1109/SDS.2019.8768623}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sds/OliveiraPCBRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/KfouryCBKS19, author = {Elie F. Kfoury and Jorge Crichigno and Elias Bou{-}Harb and David J. Khoury and Gautam Srivastava}, editor = {Norbert Herencsar}, title = {Enabling {TCP} Pacing using Programmable Data Plane Switches}, booktitle = {42nd International Conference on Telecommunications and Signal Processing, {TSP} 2019, Budapest, Hungary, July 1-3, 2019}, pages = {273--277}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TSP.2019.8768888}, doi = {10.1109/TSP.2019.8768888}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tsp/KfouryCBKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/KhouryKGCB19, author = {David J. Khoury and Elie F. Kfoury and Joseph Ged and Jorge Crichigno and Elias Bou{-}Harb}, editor = {Norbert Herencsar}, title = {Method for Securing and Terminating a {CS} Call over a VoIP System with Multi-Device Support}, booktitle = {42nd International Conference on Telecommunications and Signal Processing, {TSP} 2019, Budapest, Hungary, July 1-3, 2019}, pages = {318--322}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TSP.2019.8768893}, doi = {10.1109/TSP.2019.8768893}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tsp/KhouryKGCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01427, author = {Felix Anda and David Lillis and Aikaterini Kanta and Brett A. Becker and Elias Bou{-}Harb and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning}, journal = {CoRR}, volume = {abs/1907.01427}, year = {2019}, url = {http://arxiv.org/abs/1907.01427}, eprinttype = {arXiv}, eprint = {1907.01427}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01427.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ShaikhBNWG18, author = {Farooq Shaikh and Elias Bou{-}Harb and Nataliia Neshenko and Andrea P. Wright and Nasir Ghani}, title = {Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {9}, pages = {170--177}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.1700685}, doi = {10.1109/MCOM.2018.1700685}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ShaikhBNWG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bou-HarbGES18, author = {Elias Bou{-}Harb and Nasir Ghani and Abdelkarim Erradi and Khaled Bashir Shaban}, title = {Passive inference of attacks on {CPS} communication protocols}, journal = {J. Inf. Secur. Appl.}, volume = {43}, pages = {110--122}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.10.002}, doi = {10.1016/J.JISA.2018.10.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Bou-HarbGES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bou-HarbAD18, author = {Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {CSC-Detector: {A} System to Infer Large-Scale Probing Campaigns}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {364--377}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2593441}, doi = {10.1109/TDSC.2016.2593441}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bou-HarbAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HusakNPBC18, author = {Martin Hus{\'{a}}k and Nataliia Neshenko and Morteza Safaei Pour and Elias Bou{-}Harb and Pavel Celeda}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Assessing Internet-wide Cyber Situational Awareness of Critical Sectors}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {29:1--29:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3230837}, doi = {10.1145/3230833.3230837}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HusakNPBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/TorabiBAGBD18, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mario Galluscio and Amine Boukhtouta and Mourad Debbabi}, title = {Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: {A} Network Telescope Perspective}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28, 2018}, pages = {562--573}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSN.2018.00064}, doi = {10.1109/DSN.2018.00064}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/TorabiBAGBD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/NeshenkoHBCAF18, author = {Nataliia Neshenko and Martin Hus{\'{a}}k and Elias Bou{-}Harb and Pavel Celeda and Sameera Al{-}Mulla and Claude Fachkha}, title = {Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations}, booktitle = {{IEEE} Globecom Workshops, {GC} Wkshps 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOMW.2018.8644468}, doi = {10.1109/GLOCOMW.2018.8644468}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/NeshenkoHBCAF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MoreiraKB18, author = {Christian Miranda Moreira and Georges Kaddoum and Elias Bou{-}Harb}, title = {Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422404}, doi = {10.1109/ICC.2018.8422404}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/MoreiraKB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/PourB18, author = {Morteza Safaei Pour and Elias Bou{-}Harb}, title = {Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422720}, doi = {10.1109/ICC.2018.8422720}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/PourB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/WheelusBZ18, author = {Charles Wheelus and Elias Bou{-}Harb and Xingquan Zhu}, title = {Tackling Class Imbalance in Cyber Security Datasets}, booktitle = {2018 {IEEE} International Conference on Information Reuse and Integration, {IRI} 2018, Salt Lake City, UT, USA, July 6-9, 2018}, pages = {229--232}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IRI.2018.00041}, doi = {10.1109/IRI.2018.00041}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/WheelusBZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/OuerfelliBBFZ18, author = {Fatima Ezzahra Ouerfelli and Khaled Barbaria and Elias Bou{-}Harb and Claude Fachkha and Belhassen Zouari}, title = {On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach}, booktitle = {14th International Wireless Communications {\&} Mobile Computing Conference, {IWCMC} 2018, Limassol, Cyprus, June 25-29, 2018}, pages = {518--523}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IWCMC.2018.8450465}, doi = {10.1109/IWCMC.2018.8450465}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/OuerfelliBBFZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/KongKCB18, author = {Long Kong and Georges Kaddoum and Daniel Benevides da Costa and Elias Bou{-}Harb}, title = {On Secrecy Bounds of {MIMO} Wiretap Channels with {ZF} detectors}, booktitle = {14th International Wireless Communications {\&} Mobile Computing Conference, {IWCMC} 2018, Limassol, Cyprus, June 25-29, 2018}, pages = {724--729}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IWCMC.2018.8450477}, doi = {10.1109/IWCMC.2018.8450477}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwcmc/KongKCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/ShaikhBCG18, author = {Farooq Shaikh and Elias Bou{-}Harb and Jorge Crichigno and Nasir Ghani}, title = {A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes}, booktitle = {14th International Wireless Communications {\&} Mobile Computing Conference, {IWCMC} 2018, Limassol, Cyprus, June 25-29, 2018}, pages = {938--943}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IWCMC.2018.8450404}, doi = {10.1109/IWCMC.2018.8450404}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwcmc/ShaikhBCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/CrichignoCBG18, author = {Jorge Crichigno and Zoltan Csibi and Elias Bou{-}Harb and Nasir Ghani}, title = {Impact of Segment Size and Parallel Streams on {TCP} {BBR}}, booktitle = {41st International Conference on Telecommunications and Signal Processing, {TSP} 2018, Athens, Greece, July 4-6, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TSP.2018.8441250}, doi = {10.1109/TSP.2018.8441250}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tsp/CrichignoCBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/Bou-HarbF18, author = {Elias Bou{-}Harb and Claude Fachkha}, editor = {Kevin Daimi}, title = {On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns}, booktitle = {Computer and Network Security Essentials}, pages = {461--474}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-58424-9\_26}, doi = {10.1007/978-3-319-58424-9\_26}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/Bou-HarbF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-01719, author = {Christian Miranda and Georges Kaddoum and Elias Bou{-}Harb}, title = {Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets}, journal = {CoRR}, volume = {abs/1802.01719}, year = {2018}, url = {http://arxiv.org/abs/1802.01719}, eprinttype = {arXiv}, eprint = {1802.01719}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-01719.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Bou-HarbLFWGS17, author = {Elias Bou{-}Harb and Walter Lucia and Nicola Forti and Sean Weerakkody and Nasir Ghani and Bruno Sinopoli}, title = {Cyber Meets Control: {A} Novel Federated Approach for Resilient {CPS} Leveraging Real Cyber Threat Intelligence}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {5}, pages = {198--204}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600292CM}, doi = {10.1109/MCOM.2017.1600292CM}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/Bou-HarbLFWGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Bou-HarbS17, author = {Elias Bou{-}Harb and Mark Scanlon}, title = {Behavioral Service Graphs: {A} formal data-driven approach for prompt investigation of enterprise and internet-wide infections}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S47--S55}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.002}, doi = {10.1016/J.DIIN.2017.02.002}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Bou-HarbS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/Bou-HarbDA17, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns}, journal = {{IEEE} Netw.}, volume = {31}, number = {1}, pages = {18--26}, year = {2017}, url = {https://doi.org/10.1109/MNET.2016.1500116NM}, doi = {10.1109/MNET.2016.1500116NM}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/Bou-HarbDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HusakKBC17, author = {Martin Hus{\'{a}}k and Jaroslav Kaspar and Elias Bou{-}Harb and Pavel Celeda}, title = {On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {22:1--22:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098981}, doi = {10.1145/3098954.3098981}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/HusakKBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/AtifiB17, author = {Adil Atifi and Elias Bou{-}Harb}, title = {On correlating network traffic for cyber threat intelligence: {A} Bloom filter approach}, booktitle = {13th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2017, Valencia, Spain, June 26-30, 2017}, pages = {384--389}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IWCMC.2017.7986317}, doi = {10.1109/IWCMC.2017.7986317}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/AtifiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mtits/Bou-HarbKA17, author = {Elias Bou{-}Harb and Evangelos I. Kaisar and Mark Austin}, title = {On the impact of empirical attack models targeting marine transportation}, booktitle = {5th {IEEE} International Conference on Models and Technologies for Intelligent Transportation Systems, {MT-ITS} 2017, Naples, Italy, June 26-28, 2017}, pages = {200--205}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MTITS.2017.8005665}, doi = {10.1109/MTITS.2017.8005665}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/mtits/Bou-HarbKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/FachkhaBKMA17, author = {Claude Fachkha and Elias Bou{-}Harb and Anastasis Keliris and Nasir D. Memon and Mustaque Ahamad}, title = {Internet-scale Probing of {CPS:} Inference, Characterization and Orchestration Analysis}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/internet-scale-probing-cps-inference-characterization-and-orchestration-analysis/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/FachkhaBKMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/GalluscioNBHGCK17, author = {Mario Galluscio and Nataliia Neshenko and Elias Bou{-}Harb and Yongliang Huang and Nasir Ghani and Jorge Crichigno and Georges Kaddoum}, title = {A first empirical look on internet-scale exploitations of IoT devices}, booktitle = {28th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October 8-13, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PIMRC.2017.8292628}, doi = {10.1109/PIMRC.2017.8292628}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/GalluscioNBHGCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bou-HarbDA16, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities}, journal = {Comput. Networks}, volume = {94}, pages = {327--343}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2015.11.004}, doi = {10.1016/J.COMNET.2015.11.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Bou-HarbDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Bou-Harb16, author = {Elias Bou{-}Harb}, title = {Passive inference of attacks on {SCADA} communication protocols}, booktitle = {2016 {IEEE} International Conference on Communications, {ICC} 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICC.2016.7510609}, doi = {10.1109/ICC.2016.7510609}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/Bou-Harb16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Bou-Harb16a, author = {Elias Bou{-}Harb}, title = {A probabilistic model to preprocess darknet data for cyber threat intelligence generation}, booktitle = {2016 {IEEE} International Conference on Communications, {ICC} 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICC.2016.7510881}, doi = {10.1109/ICC.2016.7510881}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/Bou-Harb16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/Bou-Harb16, author = {Elias Bou{-}Harb}, editor = {Mohamad Badra and Giovanni Pau and Vasos Vassiliou}, title = {A Brief Survey of Security Approaches for Cyber-Physical Systems}, booktitle = {8th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NTMS.2016.7792424}, doi = {10.1109/NTMS.2016.7792424}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/Bou-Harb16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/Bou-HarbSF16, author = {Elias Bou{-}Harb and Mark Scanlon and Claude Fachkha}, editor = {Mohamad Badra and Giovanni Pau and Vasos Vassiliou}, title = {Behavioral Service Graphs: {A} Big Data Approach for Prompt Investigation of Internet-Wide Infections}, booktitle = {8th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NTMS.2016.7792437}, doi = {10.1109/NTMS.2016.7792437}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/Bou-HarbSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/WheelusBZ16, author = {Charles Wheelus and Elias Bou{-}Harb and Xingquan Zhu}, editor = {Mohamad Badra and Giovanni Pau and Vasos Vassiliou}, title = {Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence}, booktitle = {8th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NTMS.2016.7792484}, doi = {10.1109/NTMS.2016.7792484}, timestamp = {Tue, 18 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/WheelusBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/WolahanLBS16, author = {Hannah Wolahan and Claudio Chico Lorenzo and Elias Bou{-}Harb and Mark Scanlon}, editor = {Mohamad Badra and Giovanni Pau and Vasos Vassiliou}, title = {Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit}, booktitle = {8th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NTMS.2016.7792486}, doi = {10.1109/NTMS.2016.7792486}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/WolahanLBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WolahanLBS16, author = {Hannah Wolahan and Claudio Chico Lorenzo and Elias Bou{-}Harb and Mark Scanlon}, title = {Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit}, journal = {CoRR}, volume = {abs/1610.05462}, year = {2016}, url = {http://arxiv.org/abs/1610.05462}, eprinttype = {arXiv}, eprint = {1610.05462}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WolahanLBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FachkhaBD15, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, title = {Inferring distributed reflection denial of service attacks from darknet}, journal = {Comput. Commun.}, volume = {62}, pages = {59--71}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.01.016}, doi = {10.1016/J.COMCOM.2015.01.016}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/FachkhaBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/FachkhaBD15, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, title = {On the inference and prediction of DDoS campaigns}, journal = {Wirel. Commun. Mob. Comput.}, volume = {15}, number = {6}, pages = {1066--1078}, year = {2015}, url = {https://doi.org/10.1002/wcm.2510}, doi = {10.1002/WCM.2510}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/FachkhaBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA15, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {180--185}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.9}, doi = {10.1109/ARES.2015.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bou-HarbDA14, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {On fingerprinting probing activities}, journal = {Comput. Secur.}, volume = {43}, pages = {35--48}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.005}, doi = {10.1016/J.COSE.2014.02.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bou-HarbDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/Bou-HarbDA14, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {Cyber Scanning: {A} Comprehensive Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {3}, pages = {1496--1519}, year = {2014}, url = {https://doi.org/10.1109/SURV.2013.102913.00020}, doi = {10.1109/SURV.2013.102913.00020}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/Bou-HarbDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Bou-HarbLBD14, author = {Elias Bou{-}Harb and Nour{-}Eddine Lakhdari and Hamad Binsalleeh and Mourad Debbabi}, title = {Multidimensional investigation of source port 0 probing}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S114--S123}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.012}, doi = {10.1016/J.DIIN.2014.05.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Bou-HarbLBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Bou-HarbFDA14, author = {Elias Bou{-}Harb and Claude Fachkha and Mourad Debbabi and Chadi Assi}, title = {Inferring internet-scale infections by correlating malware and probing activities}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {640--646}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883391}, doi = {10.1109/ICC.2014.6883391}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/Bou-HarbFDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Bou-HarbDA14, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {Behavioral analytics for inferring large-scale orchestrated probing events}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {506--511}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849283}, doi = {10.1109/INFCOMW.2014.6849283}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Bou-HarbDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/FachkhaBD14, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, editor = {Mohamad Badra and Omar Alfandi}, title = {Fingerprinting Internet {DNS} Amplification DDoS Activities}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814019}, doi = {10.1109/NTMS.2014.6814019}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/FachkhaBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Bou-HarbFPDA13, author = {Elias Bou{-}Harb and Claude Fachkha and Makan Pourzandi and Mourad Debbabi and Chadi Assi}, title = {Communication security for smart grid distribution networks}, journal = {{IEEE} Commun. Mag.}, volume = {51}, number = {1}, pages = {42--49}, year = {2013}, url = {https://doi.org/10.1109/MCOM.2013.6400437}, doi = {10.1109/MCOM.2013.6400437}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/Bou-HarbFPDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bou-HarbDA13, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A systematic approach for detecting and clustering distributed cyber scanning}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3826--3839}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.008}, doi = {10.1016/J.COMNET.2013.09.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Bou-HarbDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Bou-HarbPDA13, author = {Elias Bou{-}Harb and Makan Pourzandi and Mourad Debbabi and Chadi Assi}, title = {A secure, efficient, and cost-effective distributed architecture for spam mitigation on {LTE} 4G mobile networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1478--1489}, year = {2013}, url = {https://doi.org/10.1002/sec.413}, doi = {10.1002/SEC.413}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Bou-HarbPDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Bou-HarbDA13, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A Statistical Approach for Fingerprinting Probing Activities}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {21--30}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.9}, doi = {10.1109/ARES.2013.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Bou-HarbDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/Bou-HarbDA13, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, editor = {Roberto Saracco and Khaled Ben Letaief and Mario Gerla and Sergio Palazzo and Luigi Atzori}, title = {On detecting and clustering distributed cyber scanning}, booktitle = {2013 9th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2013, Sardinia, Italy, July 1-5, 2013}, pages = {926--933}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IWCMC.2013.6583681}, doi = {10.1109/IWCMC.2013.6583681}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/Bou-HarbDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/FachkhaBD13, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, title = {Towards a Forecasting Model for Distributed Denial of Service Activities}, booktitle = {2013 {IEEE} 12th International Symposium on Network Computing and Applications, Cambridge, MA, USA, August 22-24, 2013}, pages = {110--117}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/NCA.2013.13}, doi = {10.1109/NCA.2013.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/FachkhaBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FachkhaBD13, author = {Claude Fachkha and Elias Bou{-}Harb and Mourad Debbabi}, title = {Fingerprinting Internet {DNS} Amplification DDoS Activities}, journal = {CoRR}, volume = {abs/1310.4216}, year = {2013}, url = {http://arxiv.org/abs/1310.4216}, eprinttype = {arXiv}, eprint = {1310.4216}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FachkhaBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/FachkhaBBDID12, author = {Claude Fachkha and Elias Bou{-}Harb and Amine Boukhtouta and Son Dinh and Farkhund Iqbal and Mourad Debbabi}, editor = {Fabio Martinelli and Jean{-}Louis Lanet and William M. Fitzgerald and Simon N. Foley}, title = {Investigating the dark cyberspace: Profiling, threat-based analysis and correlation}, booktitle = {7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CRISIS.2012.6378947}, doi = {10.1109/CRISIS.2012.6378947}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/FachkhaBBDID12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Bou-HarbDA12, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A first look on the effects and mitigation of VoIP {SPIT} flooding in 4G mobile networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {982--987}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364233}, doi = {10.1109/ICC.2012.6364233}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/Bou-HarbDA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.