
Mourad Debbabi
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [b4]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j105]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. Comput. Secur. 96: 101932 (2020) - [j104]ElMouatez Billah Karbab
, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97: 101965 (2020) - [j103]Andrei Soeanu, Sujoy Ray, Jean Berger
, Abdeslem Boukhtouta, Mourad Debbabi:
Multi-depot vehicle routing problem with risk mitigation: Model and solution algorithm. Expert Syst. Appl. 145: 113099 (2020) - [j102]Saed Alrabaee
, Mourad Debbabi, Lingyu Wang
:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. IEEE Trans. Inf. Forensics Secur. 15: 3051-3066 (2020) - [j101]Bassam Moussa
, Marthe Kassouf
, Rachid Hadjidj, Mourad Debbabi, Chadi Assi
:
An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks. IEEE Trans. Ind. Informatics 16(1): 18-27 (2020) - [j100]Bassam Moussa
, Abdullah Albarakati, Marthe Kassouf
, Mourad Debbabi, Chadi Assi
:
Exploiting the Vulnerability of Relative Data Alignment in Phasor Data Concentrators to Time Synchronization Attacks. IEEE Trans. Smart Grid 11(3): 2541-2551 (2020) - [j99]Parisa Akaber, Bassam Moussa
, Mohsen Ghafouri
, Ribal Atallah, Basile L. Agba, Chadi Assi
, Mourad Debbabi:
CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid. IEEE Trans. Smart Grid 11(3): 2676-2687 (2020) - [j98]Mohsen Ghafouri
, Minh Au
, Marthe Kassouf
, Mourad Debbabi
, Chadi Assi
, Jun Yan
:
Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids. IEEE Trans. Smart Grid 11(6): 5227-5238 (2020) - [c179]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c178]Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [i15]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Clustering using Community Detection on Android Packages Similarity Network. CoRR abs/2005.06075 (2020) - [i14]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [b3]Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - [j97]Farkhund Iqbal
, Benjamin C. M. Fung
, Mourad Debbabi, Rabia Batool, Andrew Marrington:
Wordnet-Based Criminal Networks Mining for Cybercrime Investigation. IEEE Access 7: 22740-22755 (2019) - [j96]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
On the feasibility of binary authorship characterization. Digit. Investig. 28(Supplement): S3-S11 (2019) - [j95]ElMouatez Billah Karbab, Mourad Debbabi:
MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports. Digit. Investig. 28(Supplement): S77-S87 (2019) - [j94]Badr Afify, Sujoy Ray, Andrei Soeanu, Anjali Awasthi, Mourad Debbabi, Mohamad Allouche:
Evolutionary learning algorithm for reliable facility location under disruption. Expert Syst. Appl. 115: 223-244 (2019) - [j93]Bassam Moussa
, Chantale Robillard
, Alf Zugenmaier, Marthe Kassouf, Mourad Debbabi, Chadi Assi
:
Securing the Precision Time Protocol (PTP) Against Fake Timestamps. IEEE Commun. Lett. 23(2): 278-281 (2019) - [j92]Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Learning probabilistic dependencies among events for proactive security auditing in clouds. J. Comput. Secur. 27(2): 165-202 (2019) - [j91]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. J. Comput. Secur. 27(6): 613-648 (2019) - [j90]Parisa Akaber
, Bassam Moussa
, Mourad Debbabi, Chadi Assi
:
Automated Post-Failure Service Restoration in Smart Grid Through Network Reconfiguration in the Presence of Energy Storage Systems. IEEE Syst. J. 13(3): 3358-3367 (2019) - [j89]Elias Bou-Harb
, Martin Husák
, Mourad Debbabi, Chadi Assi
:
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Trans. Big Data 5(4): 439-453 (2019) - [j88]Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. ACM Trans. Priv. Secur. 22(1): 1:1-1:35 (2019) - [j87]Reem Kateb
, Parisa Akaber
, Mosaddek Hossain Kamal Tushar
, Abdullah Albarakati, Mourad Debbabi, Chadi Assi
:
Enhancing WAMS Communication Network Against Delay Attacks. IEEE Trans. Smart Grid 10(3): 2738-2751 (2019) - [c177]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c176]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c175]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. DIMVA 2019: 89-108 - [c174]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - [c173]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - [c172]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - [c171]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Amr M. Youssef:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1. SmartGridComm 2019: 1-7 - [c170]Onur Duman, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, Mourad Debbabi:
Modeling Supply Chain Attacks in IEC 61850 Substations. SmartGridComm 2019: 1-6 - [e2]A. Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquín García-Alfaro
:
Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11358, Springer 2019, ISBN 978-3-030-18418-6 [contents] - 2018
- [j86]Sadegh Torabi
, Amine Boukhtouta, Chadi Assi
, Mourad Debbabi:
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems. IEEE Commun. Surv. Tutorials 20(4): 3389-3415 (2018) - [j85]Andrei Soeanu, Sujoy Ray, Jean Berger, Mourad Debbabi:
Efficient sensor network management for asset localization. Comput. Oper. Res. 99: 148-165 (2018) - [j84]Houssem Eddine Bordjiba, ElMouatez Billah Karbab, Mourad Debbabi:
Data-driven approach for automatic telephony threat analysis and campaign detection. Digit. Investig. 24: S131-S141 (2018) - [j83]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 24: S48-S59 (2018) - [j82]Elias Bou-Harb
, Chadi Assi
, Mourad Debbabi:
CSC-Detector: A System to Infer Large-Scale Probing Campaigns. IEEE Trans. Dependable Secur. Comput. 15(3): 364-377 (2018) - [j81]Suryadipta Majumdar
, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. IEEE Trans. Inf. Forensics Secur. 13(5): 1185-1199 (2018) - [j80]Bassam Moussa, Parisa Akaber, Mourad Debbabi, Chadi Assi
:
Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks. IEEE Trans. Ind. Informatics 14(2): 472-483 (2018) - [j79]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Trans. Priv. Secur. 21(2): 8:1-8:34 (2018) - [j78]Reem Kateb, Mosaddek Hossain Kamal Tushar, Chadi Assi
, Mourad Debbabi:
Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems. IEEE Trans. Smart Grid 9(1): 25-34 (2018) - [j77]Bassam Moussa, Mourad Debbabi, Chadi Assi
:
A Detection and Mitigation Model for PTP Delay Attack in an IEC 61850 Substation. IEEE Trans. Smart Grid 9(5): 3954-3965 (2018) - [c169]ElMouatez Billah Karbab, Mourad Debbabi:
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. ARES 2018: 20:1-20:10 - [c168]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c167]Taous Madi, Mengyuan Zhang, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - [c166]Azadeh Tabiban, Suryadipta Majumdar, Lingyu Wang, Mourad Debbabi:
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. CNS 2018: 1-7 - [c165]Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna:
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. DIMVA 2018: 114-138 - [c164]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi:
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. DSN 2018: 562-573 - [c163]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. ESORICS (1) 2018: 26-47 - [c162]Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. ESORICS (2) 2018: 463-484 - [c161]Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing: Major Approaches and Existing Challenges. FPS 2018: 61-77 - [c160]Aniss Chohra, Mourad Debbabi, Paria Shirani:
Daedalus: Network Anomaly Detection on IDS Stream Logs. FPS 2018: 95-111 - [c159]Abdullah Albarakati, Bassam Moussa, Mourad Debbabi, Amr M. Youssef, Basile L. Agba, Marthe Kassouf:
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security. SmartGridComm 2018: 1-6 - [i13]ElMouatez Billah Karbab, Mourad Debbabi:
Automatic Investigation Framework for Android Malware Cyber-Infrastructures. CoRR abs/1806.08893 (2018) - [i12]Serguei A. Mokhov, Miao Song, Jashanjot Singh, Joey Paquet, Mourad Debbabi, Sudhir P. Mudur:
Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and ISS. CoRR abs/1808.00118 (2018) - [i11]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - [i10]ElMouatez Billah Karbab, Mourad Debbabi:
Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analysis Reports. CoRR abs/1812.10327 (2018) - 2017
- [j76]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103]. Digit. Investig. 21: 89 (2017) - [j75]Elias Bou-Harb
, Mourad Debbabi, Chadi Assi:
Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns. IEEE Netw. 31(1): 18-26 (2017) - [j74]Feras Aljumah, Makan Pourzandi, Mourad Debbabi:
Privacy-Preserving Querying on Privately Encrypted Data in the Cloud. Trans. Large Scale Data Knowl. Centered Syst. 35: 50-73 (2017) - [c158]Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal
:
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. ARES 2017: 23:1-23:11 - [c157]He Huang, Amr M. Youssef, Mourad Debbabi:
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. AsiaCCS 2017: 155-166 - [c156]Paria Shirani, Lingyu Wang, Mourad Debbabi:
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. DIMVA 2017: 301-324 - [c155]Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. ESORICS (2) 2017: 265-285 - [c154]Reem Kateb, Parisa Akaber, Mosaddek Hossain Kamal Tushar, Mourad Debbabi, Chadi Assi:
Delay aware measurements gathering in WAMS communication network. GlobalSIP 2017: 1090-1094 - [c153]Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. NDSS 2017 - [c152]Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna:
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables. SEC 2017: 341-355 - [c151]Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi:
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks. SmartGridComm 2017: 108-114 - [i9]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. CoRR abs/1701.02711 (2017) - [i8]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware. CoRR abs/1702.05699 (2017) - [i7]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Deep Learning on API Method Sequences. CoRR abs/1712.08996 (2017) - 2016
- [j73]Elias Bou-Harb
, Mourad Debbabi, Chadi Assi:
A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities. Comput. Networks 94: 327-343 (2016) - [j72]Claude Fachkha
, Mourad Debbabi:
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization. IEEE Commun. Surv. Tutorials 18(2): 1197-1227 (2016) - [j71]Bassam Moussa, Mourad Debbabi, Chadi Assi:
Security Assessment of Time Synchronization Mechanisms for the Smart Grid. IEEE Commun. Surv. Tutorials 18(3): 1952-1973 (2016) - [j70]Andrei Soeanu, Mourad Debbabi, Mohamad Allouche, Micheline Bélanger, Nicholas Léchevin:
Hierarchy aware distributed plan execution monitoring. Expert Syst. Appl. 43: 66-81 (2016) - [j69]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - [j68]Sujoy Ray, Mourad Debbabi, Mohamad Khaled Allouche, Nicolas Léchevin, Micheline Bélanger:
Energy-Efficient Monitor Deployment in Collaborative Distributed Setting. IEEE Trans. Ind. Informatics 12(1): 112-123 (2016) - [j67]Amine Boukhtouta, Serguei A. Mokhov
, Nour-Eddine Lakhdari, Mourad Debbabi, Joey Paquet:
Network malware classification comparison using DPI and flow packet headers. J. Comput. Virol. Hacking Tech. 12(2): 69-100 (2016) - [c150]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Cypider: building community-based cyber-defense infrastructure for android malware detection. ACSAC 2016: 348-362 - [c149]Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. ESORICS (1) 2016: 47-66 - [c148]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. FPS 2016: 256-272 - [c147]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: dynamic fingerprinting for the automatic detection of android malware. MALWARE 2016: 139-146 - [c146]Parisa Akaber, Bassam Moussa, Mourad Debbabi, Chadi Assi:
Cascading link failure analysis in interdependent networks for maximal outages in smart grid. SmartGridComm 2016: 429-434 - 2015
- [b2]Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j66]Yosr Jarraya, Arash Eghtesadi, Sahba Sadri, Mourad Debbabi, Makan Pourzandi:
Verification of firewall reconfiguration for virtual machines migrations in the cloud. Comput. Networks 93: 480-491 (2015) - [j65]Claude Fachkha
, Elias Bou-Harb
, Mourad Debbabi:
Inferring distributed reflection denial of service attacks from darknet. Comput. Commun. 62: 59-71 (2015) - [j64]Samir Ouchani
, Mourad Debbabi:
Specification, verification, and quantification of security in model-based systems. Computing 97(7): 691-711 (2015) - [j63]Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb, Mourad Debbabi:
Spam campaign detection, analysis, and investigation. Digit. Investig. 12(Supplement-1): S12-S21 (2015) - [j62]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code. Digit. Investig. 12(Supplement-1): S61-S71 (2015) - [j61]Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinComp: A stratified approach to compiler provenance Attribution. Digit. Investig. 14(1): S146-S155 (2015) - [j60]Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi
, Farkhund Iqbal
, May El Barachi
:
Graph-theoretic characterization of cyber-threat infrastructures. Digit. Investig. 14(1): S3-S15 (2015) - [j59]Mohammad Reza Farhadi, Benjamin C. M. Fung
, Yin Bun Fung
, Philippe Charland, Stere Preda, Mourad Debbabi:
Scalable code clone search for malware analysis. Digit. Investig. 15: 46-60 (2015) - [j58]Andrei Soeanu, Mourad Debbabi, Dima Alhadidi, Makram Makkawi, Mohamad Khaled Allouche, Micheline Bélanger, Nicolas Léchevin:
Transportation risk analysis using probabilistic model checking. Expert Syst. Appl. 42(9): 4410-4421 (2015) - [j57]Steven H. H. Ding, Benjamin C. M. Fung, Mourad Debbabi:
A Visualizable Evidence-Driven Approach for Authorship Attribution. ACM Trans. Inf. Syst. Secur. 17(3): 12:1-12:30 (2015) - [j56]Claude Fachkha
, Elias Bou-Harb
, Mourad Debbabi:
On the inference and prediction of DDoS campaigns. Wirel. Commun. Mob. Comput. 15(6): 1066-1078 (2015) - [c145]Elias Bou-Harb
, Mourad Debbabi, Chadi Assi:
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic. ARES 2015: 180-185 - [c144]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack. CloudCom 2015: 58-65 - [c143]Sahba Sadri, Yosr Jarraya, Arash Eghtesadi, Mourad Debbabi:
Towards migrating security policies of virtual machines in Software Defined Networks. NetSoft 2015: 1-9 - [c142]Bassam Moussa, Mourad Debbabi, Chadi Assi:
A detection and mitigation model for PTP delay attack in a smart grid substation. SmartGridComm 2015: 497-502 - [c141]Serguei A. Mokhov
, Joey Paquet, Mourad Debbabi:
MARFCAT: Fast code analysis for defects and vulnerabilities. SWAN@SANER 2015: 35-38 - 2014
- [j55]Elias Bou-Harb
, Mourad Debbabi, Chadi Assi:
On fingerprinting probing activities. Comput. Secur. 43: 35-48 (2014) - [j54]Elias Bou-Harb
, Mourad Debbabi, Chadi Assi:
Cyber Scanning: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 16(3): 1496-1519 (2014) - [j53]Yosr Jarraya, Taous Madi, Mourad Debbabi:
A Survey and a Layered Taxonomy of Software-Defined Networking. IEEE Commun. Surv. Tutorials 16(4): 1955-1980 (2014) - [j52]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
OBA2: An Onion approach to Binary code Authorship Attribution. Digit. Investig. 11(1): S94-S103 (2014) - [j51]Elias Bou-Harb
, Nour-Eddine Lakhdari, Hamad Binsalleeh, Mourad Debbabi:
Multidimensional investigation of source port 0 probing. Digit. Investig. 11(S-2): S114-S123 (2014) - [j50]Samir Ouchani
, Otmane Aït Mohamed, Mourad Debbabi:
A formal verification framework for SysML activity diagrams. Expert Syst. Appl. 41(6): 2713-2728 (2014) - [j49]Samir Ouchani
, Otmane Aït Mohamed, Mourad Debbabi:
A property-based abstraction framework for SysML activity diagrams. Knowl. Based Syst. 56: 328-343 (2014) - [j48]Sujoy Ray, Andrei Soeanu, Jean Berger, Mourad Debbabi:
The multi-depot split-delivery vehicle routing problem: Model and solution algorithm. Knowl. Based Syst. 71: 238-265 (2014) - [j47]Yosr Jarraya, Mourad Debbabi:
Quantitative and qualitative analysis of SysML activity diagrams. Int. J. Softw. Tools Technol. Transf. 16(4): 399-419 (2014) - [j46]Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung
, Mourad Debbabi:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. IEEE Trans. Dependable Secur. Comput. 11(1): 59-71 (2014) - [j45]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren
, Shunzhi Zhu, Mourad Debbabi:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. IEEE Trans. Dependable Secur. Comput. 11(6): 538-552 (2014) - [c140]Serguei A. Mokhov
, Joey Paquet, Mourad Debbabi:
The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities. Canadian Conference on AI 2014: 326-332 - [c139]Serguei A. Mokhov
, Michael J. Assels, Joey Paquet, Mourad Debbabi:
Toward Automated MAC Spoofer Investigations. C3S2E 2014: 27:1-27:6 - [c138]Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi:
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. DBSec 2014: 82-97 - [c137]Serguei A. Mokhov
, Michael J. Assels, Joey Paquet, Mourad Debbabi:
Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. FPS 2014: 168-183 - [c136]Arash Eghtesadi, Yosr Jarraya, Mourad Debbabi, Makan Pourzandi:
Preservation of Security Configurations in the Cloud. IC2E 2014: 17-26 - [c135]Elias Bou-Harb
, Claude Fachkha
, Mourad Debbabi, Chadi Assi:
Inferring internet-scale infections by correlating malware and probing activities. ICC 2014: 640-646 - [c134]A. Mert Kara, Hamad Binsalleeh, Mohammad Mannan, Amr M. Youssef, Mourad Debbabi:
Detection of malicious payload distribution channels in DNS. ICC 2014: 853-858 - [c133]Elias Bou-Harb
, Mourad Debbabi, Chadi Assi:
Behavioral analytics for inferring large-scale orchestrated probing events. INFOCOM Workshops 2014: 506-511 - [c132]Hamad Binsalleeh, A. Mert Kara, Amr M. Youssef, Mourad Debbabi:
Characterization of Covert Channels in DNS. NTMS 2014: 1-5 - [c131]Amine Boukhtouta, Nour-Eddine Lakhdari, Mourad Debbabi:
Inferring Malware Family through Application Protocol Sequences Signature. NTMS 2014: 1-5 - [c130]