BibTeX records: Bassam Sayed

download as .bib file

@article{DBLP:journals/compsec/SayedTA18,
  author       = {Bassam Sayed and
                  Issa Traor{\'{e}} and
                  Amany Abdelhalim},
  title        = {If-transpiler: Inlining of hybrid flow-sensitive security monitor
                  for JavaScript},
  journal      = {Comput. Secur.},
  volume       = {75},
  pages        = {92--117},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.01.017},
  doi          = {10.1016/J.COSE.2018.01.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SayedTA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SayedT14,
  author       = {Bassam Sayed and
                  Issa Traor{\'{e}}},
  editor       = {Leonard Barolli and
                  Kin Fun Li and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {Protection against Web 2.0 Client-Side Web Attacks Using Information
                  Flow Control},
  booktitle    = {28th International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2014 Workshops, Victoria, BC, Canada,
                  May 13-16, 2014},
  pages        = {261--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/WAINA.2014.52},
  doi          = {10.1109/WAINA.2014.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SayedT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SayedTA14,
  author       = {Bassam Sayed and
                  Issa Traor{\'{e}} and
                  Amany Abdelhalim},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Detection and mitigation of malicious JavaScript using information
                  flow control},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {264--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890948},
  doi          = {10.1109/PST.2014.6890948},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SayedTA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoTSLSGG13,
  author       = {David Zhao and
                  Issa Traor{\'{e}} and
                  Bassam Sayed and
                  Wei Lu and
                  Sherif Saad and
                  Ali A. Ghorbani and
                  Daniel Garant},
  title        = {Botnet detection based on traffic behavior analysis and flow intervals},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {2--16},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.04.007},
  doi          = {10.1016/J.COSE.2013.04.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoTSLSGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/SayedTWO13,
  author       = {Bassam Sayed and
                  Issa Traor{\'{e}} and
                  Isaac Woungang and
                  Mohammad S. Obaidat},
  title        = {Biometric Authentication Using Mouse Gesture Dynamics},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {2},
  pages        = {262--274},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2012.2221932},
  doi          = {10.1109/JSYST.2012.2221932},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/SayedTWO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZhaoTGSSL12,
  author       = {David Zhao and
                  Issa Traor{\'{e}} and
                  Ali A. Ghorbani and
                  Bassam Sayed and
                  Sherif Saad and
                  Wei Lu},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Peer to Peer Botnet Detection Based on Flow Intervals},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {87--102},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_8},
  doi          = {10.1007/978-3-642-30436-1\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ZhaoTGSSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SaadTGSZLFH11,
  author       = {Sherif Saad and
                  Issa Traor{\'{e}} and
                  Ali A. Ghorbani and
                  Bassam Sayed and
                  David Zhao and
                  Wei Lu and
                  John Felix and
                  Payman Hakimian},
  title        = {Detecting {P2P} botnets through network behavior analysis and machine
                  learning},
  booktitle    = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
                  19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {174--180},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PST.2011.5971980},
  doi          = {10.1109/PST.2011.5971980},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/SaadTGSZLFH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ruleml/AbdelhalimTS09,
  author       = {Amany Abdelhalim and
                  Issa Traor{\'{e}} and
                  Bassam Sayed},
  editor       = {Guido Governatori and
                  John Hall and
                  Adrian Paschke},
  title        = {{RBDT-1:} {A} New Rule-Based Decision Tree Generation Technique},
  booktitle    = {Rule Interchange and Applications, International Symposium, RuleML
                  2009, Las Vegas, Nevada, USA, November 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5858},
  pages        = {108--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04985-9\_12},
  doi          = {10.1007/978-3-642-04985-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ruleml/AbdelhalimTS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics