BibTeX records: Bilal Shebaro

download as .bib file

@article{DBLP:journals/ijesdf/Al-SalehS16,
  author       = {Mohammed I. Al{-}Saleh and
                  Bilal Shebaro},
  title        = {Enhancing malware detection: clients deserve more protection},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {8},
  number       = {1},
  pages        = {1--16},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJESDF.2016.073728},
  doi          = {10.1504/IJESDF.2016.073728},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Al-SalehS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShebaroOB15,
  author       = {Bilal Shebaro and
                  Oyindamola Oluwatimi and
                  Elisa Bertino},
  title        = {Context-Based Access Control Systems for Mobile Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {150--163},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2320731},
  doi          = {10.1109/TDSC.2014.2320731},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShebaroOB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/ShebaroOMB14,
  author       = {Bilal Shebaro and
                  Oyindamola Oluwatimi and
                  Daniele Midi and
                  Elisa Bertino},
  title        = {IdentiDroid: Android can finally Wear its Anonymous Suit},
  journal      = {Trans. Data Priv.},
  volume       = {7},
  number       = {1},
  pages        = {27--50},
  year         = {2014},
  url          = {http://www.tdp.cat/issues11/abs.a150a13.php},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdp/ShebaroOMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MidiOSB14,
  author       = {Daniele Midi and
                  Oyindamola Oluwatimi and
                  Bilal Shebaro and
                  Elisa Bertino},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Demo Overview: Privacy-Enhancing Features of IdentiDroid},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1481--1483},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662380},
  doi          = {10.1145/2660267.2662380},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MidiOSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ShebaroMB14,
  author       = {Bilal Shebaro and
                  Daniele Midi and
                  Elisa Bertino},
  title        = {Fine-grained analysis of packet losses in wireless sensor networks},
  booktitle    = {Eleventh Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2014, Singapore, June 30 - July 3, 2014},
  pages        = {320--328},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SAHCN.2014.6990368},
  doi          = {10.1109/SAHCN.2014.6990368},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/ShebaroMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShebaroPC13,
  author       = {Bilal Shebaro and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Jedidiah R. Crandall},
  title        = {Exploiting Geometrical Structure for Forensic Applications of Timing
                  Inference Channels},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {5},
  number       = {1},
  pages        = {54--69},
  year         = {2013},
  url          = {https://doi.org/10.4018/jdcf.2013010104},
  doi          = {10.4018/JDCF.2013010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShebaroPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShebaroJB13,
  author       = {Bilal Shebaro and
                  Di Jin and
                  Elisa Bertino},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Performance signatures of mobile phone browsers},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1407--1410},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512512},
  doi          = {10.1145/2508859.2512512},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShebaroJB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/ShebaroSKB13,
  author       = {Bilal Shebaro and
                  Asmaa Sallam and
                  Ashish Kamra and
                  Elisa Bertino},
  editor       = {Giovanna Guerrini and
                  Norman W. Paton},
  title        = {PostgreSQL anomalous query detector},
  booktitle    = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa,
                  Italy, March 18-22, 2013},
  pages        = {741--744},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2452376.2452469},
  doi          = {10.1145/2452376.2452469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/ShebaroSKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/ShebaroMB13,
  author       = {Bilal Shebaro and
                  Daniele Midi and
                  Elisa Bertino},
  editor       = {Chiara Petrioli and
                  Landon P. Cox and
                  Kamin Whitehouse},
  title        = {Fine-grained analysis of packet loss symptoms in wireless sensor networks},
  booktitle    = {The 11th {ACM} Conference on Embedded Network Sensor Systems, SenSys
                  '13, Roma, Italy, November 11-15, 2013},
  pages        = {38:1--38:2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517351.2517408},
  doi          = {10.1145/2517351.2517408},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/ShebaroMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShebaroSGB12,
  author       = {Bilal Shebaro and
                  Salmin Sultana and
                  Shakthidhar Reddy Gopavaram and
                  Elisa Bertino},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Demonstrating a lightweight data provenance for sensor networks},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1022--1024},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382312},
  doi          = {10.1145/2382196.2382312},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShebaroSGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShebaroC11,
  author       = {Bilal Shebaro and
                  Jedidiah R. Crandall},
  title        = {Privacy-preserving network flow recording},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S90--S100},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.011},
  doi          = {10.1016/J.DIIN.2011.05.011},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShebaroC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShebaroPC10,
  author       = {Bilal Shebaro and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Jedidiah R. Crandall},
  title        = {Leaving timing-channel fingerprints in hidden service log files},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S104--S113},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.013},
  doi          = {10.1016/J.DIIN.2010.05.013},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShebaroPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/CrandallEFLS08,
  author       = {Jedidiah R. Crandall and
                  Roya Ensafi and
                  Stephanie Forrest and
                  Joshua Ladau and
                  Bilal Shebaro},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {The ecology of Malware},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {99--106},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595692},
  doi          = {10.1145/1595676.1595692},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/CrandallEFLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/HaratyES06,
  author       = {Ramzi A. Haraty and
                  Abdul Nasser El{-}Kassar and
                  Bilal Shebaro},
  title        = {A comparative study of ElGamal based digital signature algorithms},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {6},
  number       = {5-6},
  pages        = {147--156},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcm-2006-6s112},
  doi          = {10.3233/JCM-2006-6S112},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/HaratyES06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics