Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bassam Sayed
@article{DBLP:journals/compsec/SayedTA18, author = {Bassam Sayed and Issa Traor{\'{e}} and Amany Abdelhalim}, title = {If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScript}, journal = {Comput. Secur.}, volume = {75}, pages = {92--117}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.01.017}, doi = {10.1016/J.COSE.2018.01.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SayedTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SayedT14, author = {Bassam Sayed and Issa Traor{\'{e}}}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control}, booktitle = {28th International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2014 Workshops, Victoria, BC, Canada, May 13-16, 2014}, pages = {261--268}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/WAINA.2014.52}, doi = {10.1109/WAINA.2014.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SayedT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SayedTA14, author = {Bassam Sayed and Issa Traor{\'{e}} and Amany Abdelhalim}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Detection and mitigation of malicious JavaScript using information flow control}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {264--273}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890948}, doi = {10.1109/PST.2014.6890948}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SayedTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoTSLSGG13, author = {David Zhao and Issa Traor{\'{e}} and Bassam Sayed and Wei Lu and Sherif Saad and Ali A. Ghorbani and Daniel Garant}, title = {Botnet detection based on traffic behavior analysis and flow intervals}, journal = {Comput. Secur.}, volume = {39}, pages = {2--16}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.04.007}, doi = {10.1016/J.COSE.2013.04.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoTSLSGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/SayedTWO13, author = {Bassam Sayed and Issa Traor{\'{e}} and Isaac Woungang and Mohammad S. Obaidat}, title = {Biometric Authentication Using Mouse Gesture Dynamics}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {2}, pages = {262--274}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2012.2221932}, doi = {10.1109/JSYST.2012.2221932}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/SayedTWO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ZhaoTGSSL12, author = {David Zhao and Issa Traor{\'{e}} and Ali A. Ghorbani and Bassam Sayed and Sherif Saad and Wei Lu}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Peer to Peer Botnet Detection Based on Flow Intervals}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {87--102}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_8}, doi = {10.1007/978-3-642-30436-1\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ZhaoTGSSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SaadTGSZLFH11, author = {Sherif Saad and Issa Traor{\'{e}} and Ali A. Ghorbani and Bassam Sayed and David Zhao and Wei Lu and John Felix and Payman Hakimian}, title = {Detecting {P2P} botnets through network behavior analysis and machine learning}, booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011, 19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada}, pages = {174--180}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PST.2011.5971980}, doi = {10.1109/PST.2011.5971980}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/SaadTGSZLFH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ruleml/AbdelhalimTS09, author = {Amany Abdelhalim and Issa Traor{\'{e}} and Bassam Sayed}, editor = {Guido Governatori and John Hall and Adrian Paschke}, title = {{RBDT-1:} {A} New Rule-Based Decision Tree Generation Technique}, booktitle = {Rule Interchange and Applications, International Symposium, RuleML 2009, Las Vegas, Nevada, USA, November 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5858}, pages = {108--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04985-9\_12}, doi = {10.1007/978-3-642-04985-9\_12}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/ruleml/AbdelhalimTS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.