


Остановите войну!
for scientists:


default search action
Mourad Debbabi
Person information

- affiliation: Concordia University, Montreal, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j127]Saghar Vahidi, Mohsen Ghafouri
, Minh Au
, Marthe Kassouf
, Arash Mohammadi
, Mourad Debbabi:
Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities. IEEE Commun. Surv. Tutorials 25(2): 1294-1335 (2023) - [j126]Saed Alrabaee
, Mourad Debbabi, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. ACM Comput. Surv. 55(2): 19:1-19:41 (2023) - [j125]Anthony Andreoli, Anis Lounis, Mourad Debbabi, Aiman Hanna:
On the prevalence of software supply chain attacks: Empirical study and investigative framework. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301508 (2023) - [j124]ElMouatez Billah Karbab, Mourad Debbabi
, Abdelouahid Derhab
:
SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features. Expert Syst. Appl. 225: 120017 (2023) - [j123]Mark Karanfil
, Dhiaa Elhak Rebbah, Mourad Debbabi, Marthe Kassouf
, Mohsen Ghafouri
, El-Nasser S. Youssef
, Aiman Hanna
:
Detection of Microgrid Cyberattacks Using Network and System Management. IEEE Trans. Smart Grid 14(3): 2390-2405 (2023) - [c194]Momen Oqaily
, Suryadipta Majumdar
, Lingyu Wang
, Mohammad Ekramul Kabir
, Yosr Jarraya
, A. S. M. Asadujjaman
, Makan Pourzandi
, Mourad Debbabi
:
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds. CODASPY 2023: 79-90 - [c193]Juanwei Chen, Jun Yan, Hang Du, Mourad Debbabi, Marthe Kassouf:
Vulnerability Analysis of Virtual Power Plant Voltage Support under Denial-of-Service Attacks. ISGT 2023: 1-5 - [c192]Abolfazl Rahiminejad, Onur Duman, Mohsen Ghafouri, Ribal Atallah, Arash Mohammadi, Mourad Debbabi:
A Resilience Quantitative Framework for Wide Area Damping Control Against Cyberattacks. ISGT 2023: 1-5 - [i20]Khaled Sarieddine, Mohammad Ali Sayed, Danial Jafarigiv, Ribal Atallah, Mourad Debbabi, Chadi Assi:
A Real-Time Co-simulation Testbed for EV Charging and Smart Grid Security. CoRR abs/2302.12781 (2023) - 2022
- [j122]Aniss Chohra
, Paria Shirani, ElMouatez Billah Karbab, Mourad Debbabi:
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection. Comput. Secur. 117: 102684 (2022) - [j121]Abdullah Qasem, Paria Shirani
, Mourad Debbabi, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. ACM Comput. Surv. 54(2): 25:1-25:42 (2022) - [j120]Sadegh Torabi
, Elias Bou-Harb
, Chadi Assi
, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi
:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. IEEE Trans. Dependable Secur. Comput. 19(1): 402-418 (2022) - [j119]Onur Duman
, Mengyuan Zhang, Lingyu Wang
, Mourad Debbabi
, Ribal F. Atallah, Bernard Lebel
:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. IEEE Trans. Dependable Secur. Comput. 19(2): 1018-1035 (2022) - [j118]Suryadipta Majumdar
, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
ProSAS: Proactive Security Auditing System for Clouds. IEEE Trans. Dependable Secur. Comput. 19(4): 2517-2534 (2022) - [j117]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf
, Mourad Debbabi
, Amr M. Youssef
, Mohsen Ghafouri, Rachid Hadjidj:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management. IEEE Trans. Ind. Informatics 18(3): 1641-1653 (2022) - [c191]Onur Duman, Lingyu Wang, Minh Au, Marthe Kassouf, Mourad Debbabi:
Hardening Substations against Supply Chain Attacks Under Operational Constraints. ISGT 2022: 1-5 - [c190]Mark Karanfil, Dhiaa Elhak Rebbah, Mohsen Ghafouri, Marthe Kassouf, Mourad Debbabi, Aiman Hanna:
Security Monitoring of the Microgrid Using IEC 62351-7 Network and System Management. ISGT 2022: 1-5 - [c189]Abolfazl Rahiminejad, Mohsen Ghafouri, Ribal Atallah, Arash Mohammadi, Mourad Debbabi:
A Cyber-Physical Resilience-Based Survivability Metric against Topological Cyberattacks. ISGT 2022: 1-5 - [c188]Dhiaa Elhak Rebbah, Afshin Ebtia, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Mourad Debbabi, Arash Mohammadi:
Real-Time Co-simulation Platform for Security Analysis of Distribution Automation Systems. ISGT 2022: 1-5 - [c187]Hang Du, Jun Yan, Mohsen Ghafouri, Rawad Zgheib, Mourad Debbabi:
Online Attack-aware Risk Management for PMSG-based Wind Farm Depending on System Strength Evaluation. SmartGridComm 2022: 218-223 - [i19]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - [i18]Mohammad Ali Sayed, Mohsen Ghafouri, Mourad Debbabi, Chadi Assi:
Dynamic Load Altering EV Attacks Against Power Grid Frequency Control. CoRR abs/2207.10129 (2022) - 2021
- [b5]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198 - [j116]Sadegh Torabi
, Mirabelle Dib
, Elias Bou-Harb
, Chadi Assi
, Mourad Debbabi:
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships. IEEE Netw. Lett. 3(3): 161-165 (2021) - [j115]Gagandeep Singh Chawla, Mengyuan Zhang
, Suryadipta Majumdar
, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. IEEE Trans. Dependable Secur. Comput. 18(4): 1553-1567 (2021) - [j114]Momen Oqaily
, Yosr Jarraya, Meisam Mohammady
, Suryadipta Majumdar
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi:
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing. IEEE Trans. Dependable Secur. Comput. 18(5): 2486-2505 (2021) - [j113]Olivier Cabana
, Amr M. Youssef
, Mourad Debbabi, Bernard Lebel
, Marthe Kassouf
, Ribal Atallah, Basile L. Agba:
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 16: 3355-3370 (2021) - [j112]Meisam Mohammady
, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - [c186]A. S. M. Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains. CNS 2021: 245-253 - [c185]ElMouatez Billah Karbab, Mourad Debbabi:
PetaDroid: Adaptive Android Malware Detection Using Deep Learning. DIMVA 2021: 319-340 - [c184]Hang Du, Jun Yan, Mohsen Ghafouri, Rawad Zgheib, Marthe Kassouf, Mourad Debbabi:
Modeling of Cyber Attacks Against Converter-Driven Stability of PMSG-Based Wind Farms with Intentional Subsynchronous Resonance. SmartGridComm 2021: 391-397 - [i17]ElMouatez Billah Karbab, Mourad Debbabi:
Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques. CoRR abs/2105.13491 (2021) - [i16]Mohammad Ali Sayed, Ribal Atallah, Chadi Assi, Mourad Debbabi:
Electric Vehicle Attack Impact on Power Grid Operation. CoRR abs/2111.11317 (2021) - 2020
- [b4]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j111]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. Comput. Secur. 96: 101932 (2020) - [j110]ElMouatez Billah Karbab
, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97: 101965 (2020) - [j109]Sadegh Torabi
, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. Digit. Investig. 32 Supplement: 300922 (2020) - [j108]Andrei Soeanu, Sujoy Ray, Jean Berger
, Abdeslem Boukhtouta, Mourad Debbabi:
Multi-depot vehicle routing problem with risk mitigation: Model and solution algorithm. Expert Syst. Appl. 145: 113099 (2020) - [j107]Morteza Safaei Pour
, Sadegh Torabi, Elias Bou-Harb
, Chadi Assi
, Mourad Debbabi:
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities. IEEE Netw. Lett. 2(3): 159-163 (2020) - [j106]Saed Alrabaee
, Mourad Debbabi, Lingyu Wang
:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. IEEE Trans. Inf. Forensics Secur. 15: 3051-3066 (2020) - [j105]Bassam Moussa
, Marthe Kassouf
, Rachid Hadjidj, Mourad Debbabi, Chadi Assi
:
An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks. IEEE Trans. Ind. Informatics 16(1): 18-27 (2020) - [j104]Bassam Moussa
, Abdullah Albarakati, Marthe Kassouf
, Mourad Debbabi, Chadi Assi
:
Exploiting the Vulnerability of Relative Data Alignment in Phasor Data Concentrators to Time Synchronization Attacks. IEEE Trans. Smart Grid 11(3): 2541-2551 (2020) - [j103]Parisa Akaber, Bassam Moussa
, Mohsen Ghafouri
, Ribal Atallah, Basile L. Agba, Chadi Assi
, Mourad Debbabi:
CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid. IEEE Trans. Smart Grid 11(3): 2676-2687 (2020) - [j102]Mohsen Ghafouri
, Minh Au
, Marthe Kassouf
, Mourad Debbabi
, Chadi Assi
, Jun Yan
:
Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids. IEEE Trans. Smart Grid 11(6): 5227-5238 (2020) - [c183]Meisam Mohammady, Shangyu Xie, Yuan Hong
, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c182]Alaa Oqaily, Sudershan L. T, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack. CloudCom 2020: 33-40 - [c181]Azadeh Tabiban
, Yosr Jarraya, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [i15]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Clustering using Community Detection on Android Packages Similarity Network. CoRR abs/2005.06075 (2020) - [i14]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [b3]Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - [j101]Farkhund Iqbal
, Benjamin C. M. Fung
, Mourad Debbabi, Rabia Batool, Andrew Marrington:
Wordnet-Based Criminal Networks Mining for Cybercrime Investigation. IEEE Access 7: 22740-22755 (2019) - [j100]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
On the feasibility of binary authorship characterization. Digit. Investig. 28 Supplement: S3-S11 (2019) - [j99]ElMouatez Billah Karbab, Mourad Debbabi:
MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports. Digit. Investig. 28 Supplement: S77-S87 (2019) - [j98]Badr Afify, Sujoy Ray, Andrei Soeanu, Anjali Awasthi, Mourad Debbabi, Mohamad Allouche:
Evolutionary learning algorithm for reliable facility location under disruption. Expert Syst. Appl. 115: 223-244 (2019) - [j97]Bassam Moussa
, Chantale Robillard
, Alf Zugenmaier, Marthe Kassouf, Mourad Debbabi, Chadi Assi
:
Securing the Precision Time Protocol (PTP) Against Fake Timestamps. IEEE Commun. Lett. 23(2): 278-281 (2019) - [j96]Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Learning probabilistic dependencies among events for proactive security auditing in clouds. J. Comput. Secur. 27(2): 165-202 (2019) - [j95]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. J. Comput. Secur. 27(6): 613-648 (2019) - [j94]Parisa Akaber
, Bassam Moussa
, Mourad Debbabi, Chadi Assi
:
Automated Post-Failure Service Restoration in Smart Grid Through Network Reconfiguration in the Presence of Energy Storage Systems. IEEE Syst. J. 13(3): 3358-3367 (2019) - [j93]Elias Bou-Harb
, Martin Husák
, Mourad Debbabi, Chadi Assi
:
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Trans. Big Data 5(4): 439-453 (2019) - [j92]Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. ACM Trans. Priv. Secur. 22(1): 1:1-1:35 (2019) - [j91]Reem Kateb
, Parisa Akaber
, Mosaddek Hossain Kamal Tushar
, Abdullah Albarakati, Mourad Debbabi, Chadi Assi
:
Enhancing WAMS Communication Network Against Delay Attacks. IEEE Trans. Smart Grid 10(3): 2738-2751 (2019) - [c180]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang
, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c179]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c178]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. DIMVA 2019: 89-108 - [c177]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - [c176]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - [c175]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - [c174]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Amr M. Youssef:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1. SmartGridComm 2019: 1-7 - [c173]Onur Duman
, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, Mourad Debbabi:
Modeling Supply Chain Attacks in IEC 61850 Substations. SmartGridComm 2019: 1-6 - [e2]A. Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquín García-Alfaro
:
Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11358, Springer 2019, ISBN 978-3-030-18418-6 [contents] - 2018
- [j90]Sadegh Torabi
, Amine Boukhtouta, Chadi Assi
, Mourad Debbabi:
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems. IEEE Commun. Surv. Tutorials 20(4): 3389-3415 (2018) - [j89]Andrei Soeanu, Sujoy Ray, Jean Berger, Mourad Debbabi:
Efficient sensor network management for asset localization. Comput. Oper. Res. 99: 148-165 (2018) - [j88]Houssem Eddine Bordjiba, ElMouatez Billah Karbab, Mourad Debbabi:
Data-driven approach for automatic telephony threat analysis and campaign detection. Digit. Investig. 24 Supplement: S131-S141 (2018) - [j87]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 24 Supplement: S48-S59 (2018) - [j86]Elias Bou-Harb
, Chadi Assi
, Mourad Debbabi:
CSC-Detector: A System to Infer Large-Scale Probing Campaigns. IEEE Trans. Dependable Secur. Comput. 15(3): 364-377 (2018) - [j85]Suryadipta Majumdar
, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. IEEE Trans. Inf. Forensics Secur. 13(5): 1185-1199 (2018) - [j84]Bassam Moussa, Parisa Akaber, Mourad Debbabi, Chadi Assi
:
Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks. IEEE Trans. Ind. Informatics 14(2): 472-483 (2018) - [j83]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Trans. Priv. Secur. 21(2): 8:1-8:34 (2018) - [j82]Reem Kateb, Mosaddek Hossain Kamal Tushar, Chadi Assi
, Mourad Debbabi:
Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems. IEEE Trans. Smart Grid 9(1): 25-34 (2018) - [j81]Bassam Moussa, Mourad Debbabi, Chadi Assi
:
A Detection and Mitigation Model for PTP Delay Attack in an IEC 61850 Substation. IEEE Trans. Smart Grid 9(5): 3954-3965 (2018) - [c172]ElMouatez Billah Karbab, Mourad Debbabi:
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. ARES 2018: 20:1-20:10 - [c171]Meisam Mohammady, Lingyu Wang, Yuan Hong
, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c170]Taous Madi, Mengyuan Zhang
, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - [c169]Azadeh Tabiban
, Suryadipta Majumdar, Lingyu Wang, Mourad Debbabi:
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. CNS 2018: 1-7 - [c168]Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna:
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. DIMVA 2018: 114-138 - [c167]Sadegh Torabi
, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi:
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. DSN 2018: 562-573 - [c166]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. ESORICS (1) 2018: 26-47 - [c165]Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. ESORICS (2) 2018: 463-484 - [c164]Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing: Major Approaches and Existing Challenges. FPS 2018: 61-77 - [c163]Aniss Chohra, Mourad Debbabi, Paria Shirani:
Daedalus: Network Anomaly Detection on IDS Stream Logs. FPS 2018: 95-111 - [c162]Abdullah Albarakati, Bassam Moussa, Mourad Debbabi, Amr M. Youssef, Basile L. Agba, Marthe Kassouf:
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security. SmartGridComm 2018: 1-6 - [i13]ElMouatez Billah Karbab, Mourad Debbabi:
Automatic Investigation Framework for Android Malware Cyber-Infrastructures. CoRR abs/1806.08893 (2018) - [i12]Serguei A. Mokhov, Miao Song, Jashanjot Singh, Joey Paquet, Mourad Debbabi, Sudhir P. Mudur:
Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and ISS. CoRR abs/1808.00118 (2018) - [i11]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - [i10]ElMouatez Billah Karbab, Mourad Debbabi:
Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analysis Reports. CoRR abs/1812.10327 (2018) - 2017
- [j80]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103]. Digit. Investig. 21: 89 (2017) - [j79]Elias Bou-Harb
, Mourad Debbabi, Chadi Assi:
Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns. IEEE Netw. 31(1): 18-26 (2017) - [j78]Feras Aljumah, Makan Pourzandi, Mourad Debbabi:
Privacy-Preserving Querying on Privately Encrypted Data in the Cloud. Trans. Large Scale Data Knowl. Centered Syst. 35: 50-73 (2017) - [c161]Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal
:
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. ARES 2017: 23:1-23:11 - [c160]He Huang, Amr M. Youssef, Mourad Debbabi:
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. AsiaCCS 2017: 155-166 - [c159]Paria Shirani, Lingyu Wang, Mourad Debbabi:
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. DIMVA 2017: 301-324 - [c158]Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. ESORICS (2) 2017: 265-285 - [c157]Reem Kateb, Parisa Akaber, Mosaddek Hossain Kamal Tushar, Mourad Debbabi, Chadi Assi:
Delay aware measurements gathering in WAMS communication network. GlobalSIP 2017: 1090-1094 - [c156]Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. NDSS 2017 - [c155]Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna:
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables. SEC 2017: 341-355 - [c154]Onur Duman, Mengyuan Zhang
, Lingyu Wang, Mourad Debbabi:
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks. SmartGridComm 2017: 108-114 - [i9]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. CoRR abs/1701.02711 (2017) - [i8]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware. CoRR abs/1702.05699 (2017) - [i7]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Deep Learning on API Method Sequences. CoRR abs/1712.08996 (2017) - 2016
- [j77]Elias Bou-Harb
, Mourad Debbabi, Chadi Assi:
A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities. Comput. Networks 94: 327-343 (2016) - [j76]Claude Fachkha
, Mourad Debbabi:
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization. IEEE Commun. Surv. Tutorials 18(2): 1197-1227 (2016) - [j75]Bassam Moussa, Mourad Debbabi, Chadi Assi:
Security Assessment of Time Synchronization Mechanisms for the Smart Grid. IEEE Commun. Surv. Tutorials 18(3): 1952-1973 (2016) - [j74]