Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bilal Shebaro
@article{DBLP:journals/ijesdf/Al-SalehS16, author = {Mohammed I. Al{-}Saleh and Bilal Shebaro}, title = {Enhancing malware detection: clients deserve more protection}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {8}, number = {1}, pages = {1--16}, year = {2016}, url = {https://doi.org/10.1504/IJESDF.2016.073728}, doi = {10.1504/IJESDF.2016.073728}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Al-SalehS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShebaroOB15, author = {Bilal Shebaro and Oyindamola Oluwatimi and Elisa Bertino}, title = {Context-Based Access Control Systems for Mobile Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {150--163}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2320731}, doi = {10.1109/TDSC.2014.2320731}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShebaroOB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/ShebaroOMB14, author = {Bilal Shebaro and Oyindamola Oluwatimi and Daniele Midi and Elisa Bertino}, title = {IdentiDroid: Android can finally Wear its Anonymous Suit}, journal = {Trans. Data Priv.}, volume = {7}, number = {1}, pages = {27--50}, year = {2014}, url = {http://www.tdp.cat/issues11/abs.a150a13.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/ShebaroOMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MidiOSB14, author = {Daniele Midi and Oyindamola Oluwatimi and Bilal Shebaro and Elisa Bertino}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Demo Overview: Privacy-Enhancing Features of IdentiDroid}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1481--1483}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662380}, doi = {10.1145/2660267.2662380}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MidiOSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ShebaroMB14, author = {Bilal Shebaro and Daniele Midi and Elisa Bertino}, title = {Fine-grained analysis of packet losses in wireless sensor networks}, booktitle = {Eleventh Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2014, Singapore, June 30 - July 3, 2014}, pages = {320--328}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SAHCN.2014.6990368}, doi = {10.1109/SAHCN.2014.6990368}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/secon/ShebaroMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShebaroPC13, author = {Bilal Shebaro and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Jedidiah R. Crandall}, title = {Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {1}, pages = {54--69}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013010104}, doi = {10.4018/JDCF.2013010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ShebaroPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShebaroJB13, author = {Bilal Shebaro and Di Jin and Elisa Bertino}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Performance signatures of mobile phone browsers}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1407--1410}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512512}, doi = {10.1145/2508859.2512512}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShebaroJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/ShebaroSKB13, author = {Bilal Shebaro and Asmaa Sallam and Ashish Kamra and Elisa Bertino}, editor = {Giovanna Guerrini and Norman W. Paton}, title = {PostgreSQL anomalous query detector}, booktitle = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa, Italy, March 18-22, 2013}, pages = {741--744}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2452376.2452469}, doi = {10.1145/2452376.2452469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/ShebaroSKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/ShebaroMB13, author = {Bilal Shebaro and Daniele Midi and Elisa Bertino}, editor = {Chiara Petrioli and Landon P. Cox and Kamin Whitehouse}, title = {Fine-grained analysis of packet loss symptoms in wireless sensor networks}, booktitle = {The 11th {ACM} Conference on Embedded Network Sensor Systems, SenSys '13, Roma, Italy, November 11-15, 2013}, pages = {38:1--38:2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517351.2517408}, doi = {10.1145/2517351.2517408}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/ShebaroMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShebaroSGB12, author = {Bilal Shebaro and Salmin Sultana and Shakthidhar Reddy Gopavaram and Elisa Bertino}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Demonstrating a lightweight data provenance for sensor networks}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1022--1024}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382312}, doi = {10.1145/2382196.2382312}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShebaroSGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShebaroC11, author = {Bilal Shebaro and Jedidiah R. Crandall}, title = {Privacy-preserving network flow recording}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S90--S100}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.011}, doi = {10.1016/J.DIIN.2011.05.011}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ShebaroC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShebaroPC10, author = {Bilal Shebaro and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Jedidiah R. Crandall}, title = {Leaving timing-channel fingerprints in hidden service log files}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S104--S113}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.013}, doi = {10.1016/J.DIIN.2010.05.013}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ShebaroPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/CrandallEFLS08, author = {Jedidiah R. Crandall and Roya Ensafi and Stephanie Forrest and Joshua Ladau and Bilal Shebaro}, editor = {Matt Bishop and Christian W. Probst and Angelos D. Keromytis and Anil Somayaji}, title = {The ecology of Malware}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {99--106}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1595676.1595692}, doi = {10.1145/1595676.1595692}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/CrandallEFLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/HaratyES06, author = {Ramzi A. Haraty and Abdul Nasser El{-}Kassar and Bilal Shebaro}, title = {A comparative study of ElGamal based digital signature algorithms}, journal = {J. Comput. Methods Sci. Eng.}, volume = {6}, number = {5-6}, pages = {147--156}, year = {2006}, url = {https://doi.org/10.3233/jcm-2006-6s112}, doi = {10.3233/JCM-2006-6S112}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/HaratyES06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.