default search action
Mourad Debbabi
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j134]Momen Oqaily, Mohammad Ekramul Kabir, Suryadipta Majumdar, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 2799-2817 (2024) - [j133]Afshin Ebtia, Dhiaa Elhak Rebbah, Mourad Debbabi, Marthe Kassouf, Mohsen Ghafouri, Arash Mohammadi, Andrei Soeanu:
Spatial-Temporal Data-Driven Model for Load Altering Attack Detection in Smart Power Distribution Networks. IEEE Trans. Ind. Informatics 20(5): 7414-7427 (2024) - [j132]Onur Duman, Azadeh Tabiban, Lingyu Wang, Mourad Debbabi:
Measuring and Improving the Security Posture of IEC 61850 Substations Against Supply Chain Attacks. IEEE Trans. Instrum. Meas. 73: 1-20 (2024) - [j131]Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi, Mourad Debbabi:
AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery. IEEE Trans. Netw. Serv. Manag. 21(5): 5178-5196 (2024) - [c204]Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Attallah, Danial Jafarigiv, Chadi Assi, Mourad Debbabi:
Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System. AsiaCCS 2024 - [c203]Sofiane Benahmed, Abdullah Qasem, Anis Lounis, Mourad Debbabi:
Modularizing Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. DIMVA 2024: 84-103 - [c202]Anis Lounis, Anthony Andreoli, Mourad Debbabi, Aiman Hanna:
Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics. DIMVA 2024: 395-415 - [c201]Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi:
SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. DIMVA 2024: 483-502 - [c200]Momen Oqaily, Hinddeep Purohit, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, Mourad Debbabi:
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers. USENIX Security Symposium 2024 - 2023
- [j130]Badis Racherache, Paria Shirani, Andrei Soeanu, Mourad Debbabi:
CPID: Insider threat detection using profiling and cyber-persona identification. Comput. Secur. 132: 103350 (2023) - [j129]Saghar Vahidi, Mohsen Ghafouri, Minh Au, Marthe Kassouf, Arash Mohammadi, Mourad Debbabi:
Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities. IEEE Commun. Surv. Tutorials 25(2): 1294-1335 (2023) - [j128]Boubakr Nour, Makan Pourzandi, Mourad Debbabi:
A Survey on Threat Hunting in Enterprise Networks. IEEE Commun. Surv. Tutorials 25(4): 2299-2324 (2023) - [j127]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. ACM Comput. Surv. 55(2): 19:1-19:41 (2023) - [j126]Anthony Andreoli, Anis Lounis, Mourad Debbabi, Aiman Hanna:
On the prevalence of software supply chain attacks: Empirical study and investigative framework. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301508 (2023) - [j125]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab:
SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features. Expert Syst. Appl. 225: 120017 (2023) - [j124]Khaled Sarieddine, Mohammad Ali Sayed, Danial Jafarigiv, Ribal Atallah, Mourad Debbabi, Chadi Assi:
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security. IEEE Secur. Priv. 21(4): 74-83 (2023) - [j123]Mark Karanfil, Dhiaa Elhak Rebbah, Mourad Debbabi, Marthe Kassouf, Mohsen Ghafouri, El-Nasser S. Youssef, Aiman Hanna:
Detection of Microgrid Cyberattacks Using Network and System Management. IEEE Trans. Smart Grid 14(3): 2390-2405 (2023) - [c199]Abdullah Qasem, Mourad Debbabi, Bernard Lebel, Marthe Kassouf:
Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures. AsiaCCS 2023: 443-456 - [c198]Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A. S. M. Asadujjaman, Makan Pourzandi, Mourad Debbabi:
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds. CODASPY 2023: 79-90 - [c197]Md. Nazmul Hoq, Jia Wei Yao, Suryadipta Majumdar, Luis Suárez, Lingyu Wang, Amine Boukhtouta, Makan Pourzandi, Mourad Debbabi:
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring. ESORICS (2) 2023: 123-144 - [c196]Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi, Mourad Debbabi:
Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting. FPS (2) 2023: 52-69 - [c195]Juanwei Chen, Jun Yan, Hang Du, Mourad Debbabi, Marthe Kassouf:
Vulnerability Analysis of Virtual Power Plant Voltage Support under Denial-of-Service Attacks. ISGT 2023: 1-5 - [c194]Abolfazl Rahiminejad, Onur Duman, Mohsen Ghafouri, Ribal Atallah, Arash Mohammadi, Mourad Debbabi:
A Resilience Quantitative Framework for Wide Area Damping Control Against Cyberattacks. ISGT 2023: 1-5 - [c193]Afshin Ebtia, Dhiaa Elhak Rebbah, Abdullah Qasem, Mohsen Ghafouri, Danial Jafarigiv, Mourad Debbabi, Arash Mohammadi:
Detection of Cyber Attacks on Synchro-Phasor Network Targeting Topology Detection Application of Power Distribution Grids. SmartGridComm 2023: 1-6 - [c192]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
An Enhanced Interface-Based Probabilistic Compositional Verification Approach. VECoS 2023: 60-75 - [i22]Khaled Sarieddine, Mohammad Ali Sayed, Danial Jafarigiv, Ribal Atallah, Mourad Debbabi, Chadi Assi:
A Real-Time Co-simulation Testbed for EV Charging and Smart Grid Security. CoRR abs/2302.12781 (2023) - [i21]Mohammad Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, Chadi Assi:
Protecting the Future Grid: An Electric Vehicle Robust Mitigation Scheme Against Load Altering Attacks on Power Grids. CoRR abs/2308.07526 (2023) - [i20]Mohammad Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, Chadi Assi:
An Electric Vehicle Control Strategy to Mitigate Load Altering Attacks Against Power Grids. CoRR abs/2310.14471 (2023) - 2022
- [j122]Aniss Chohra, Paria Shirani, ElMouatez Billah Karbab, Mourad Debbabi:
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection. Comput. Secur. 117: 102684 (2022) - [j121]Abdullah Qasem, Paria Shirani, Mourad Debbabi, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. ACM Comput. Surv. 54(2): 25:1-25:42 (2022) - [j120]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. IEEE Trans. Dependable Secur. Comput. 19(1): 402-418 (2022) - [j119]Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi, Ribal F. Atallah, Bernard Lebel:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. IEEE Trans. Dependable Secur. Comput. 19(2): 1018-1035 (2022) - [j118]Suryadipta Majumdar, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ProSAS: Proactive Security Auditing System for Clouds. IEEE Trans. Dependable Secur. Comput. 19(4): 2517-2534 (2022) - [j117]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Mourad Debbabi, Amr M. Youssef, Mohsen Ghafouri, Rachid Hadjidj:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management. IEEE Trans. Ind. Informatics 18(3): 1641-1653 (2022) - [c191]Onur Duman, Lingyu Wang, Minh Au, Marthe Kassouf, Mourad Debbabi:
Hardening Substations against Supply Chain Attacks Under Operational Constraints. ISGT 2022: 1-5 - [c190]Mark Karanfil, Dhiaa Elhak Rebbah, Mohsen Ghafouri, Marthe Kassouf, Mourad Debbabi, Aiman Hanna:
Security Monitoring of the Microgrid Using IEC 62351-7 Network and System Management. ISGT 2022: 1-5 - [c189]Abolfazl Rahiminejad, Mohsen Ghafouri, Ribal Atallah, Arash Mohammadi, Mourad Debbabi:
A Cyber-Physical Resilience-Based Survivability Metric against Topological Cyberattacks. ISGT 2022: 1-5 - [c188]Dhiaa Elhak Rebbah, Afshin Ebtia, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Mourad Debbabi, Arash Mohammadi:
Real-Time Co-simulation Platform for Security Analysis of Distribution Automation Systems. ISGT 2022: 1-5 - [c187]Hang Du, Jun Yan, Mohsen Ghafouri, Rawad Zgheib, Mourad Debbabi:
Online Attack-aware Risk Management for PMSG-based Wind Farm Depending on System Strength Evaluation. SmartGridComm 2022: 218-223 - [i19]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - [i18]Mohammad Ali Sayed, Mohsen Ghafouri, Mourad Debbabi, Chadi Assi:
Dynamic Load Altering EV Attacks Against Power Grid Frequency Control. CoRR abs/2207.10129 (2022) - 2021
- [b5]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198 - [j116]Sadegh Torabi, Mirabelle Dib, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships. IEEE Netw. Lett. 3(3): 161-165 (2021) - [j115]Gagandeep Singh Chawla, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. IEEE Trans. Dependable Secur. Comput. 18(4): 1553-1567 (2021) - [j114]Momen Oqaily, Yosr Jarraya, Meisam Mohammady, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing. IEEE Trans. Dependable Secur. Comput. 18(5): 2486-2505 (2021) - [j113]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Ribal Atallah, Basile L. Agba:
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems. IEEE Trans. Inf. Forensics Secur. 16: 3355-3370 (2021) - [j112]Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - [c186]A. S. M. Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains. CNS 2021: 245-253 - [c185]ElMouatez Billah Karbab, Mourad Debbabi:
PetaDroid: Adaptive Android Malware Detection Using Deep Learning. DIMVA 2021: 319-340 - [c184]Hang Du, Jun Yan, Mohsen Ghafouri, Rawad Zgheib, Marthe Kassouf, Mourad Debbabi:
Modeling of Cyber Attacks Against Converter-Driven Stability of PMSG-Based Wind Farms with Intentional Subsynchronous Resonance. SmartGridComm 2021: 391-397 - [i17]ElMouatez Billah Karbab, Mourad Debbabi:
Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques. CoRR abs/2105.13491 (2021) - [i16]Mohammad Ali Sayed, Ribal Atallah, Chadi Assi, Mourad Debbabi:
Electric Vehicle Attack Impact on Power Grid Operation. CoRR abs/2111.11317 (2021) - 2020
- [b4]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j111]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. Comput. Secur. 96: 101932 (2020) - [j110]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97: 101965 (2020) - [j109]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. Digit. Investig. 32 Supplement: 300922 (2020) - [j108]Andrei Soeanu, Sujoy Ray, Jean Berger, Abdeslem Boukhtouta, Mourad Debbabi:
Multi-depot vehicle routing problem with risk mitigation: Model and solution algorithm. Expert Syst. Appl. 145: 113099 (2020) - [j107]Morteza Safaei Pour, Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities. IEEE Netw. Lett. 2(3): 159-163 (2020) - [j106]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. IEEE Trans. Inf. Forensics Secur. 15: 3051-3066 (2020) - [j105]Bassam Moussa, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Chadi Assi:
An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks. IEEE Trans. Ind. Informatics 16(1): 18-27 (2020) - [j104]Bassam Moussa, Abdullah Albarakati, Marthe Kassouf, Mourad Debbabi, Chadi Assi:
Exploiting the Vulnerability of Relative Data Alignment in Phasor Data Concentrators to Time Synchronization Attacks. IEEE Trans. Smart Grid 11(3): 2541-2551 (2020) - [j103]Parisa Akaber, Bassam Moussa, Mohsen Ghafouri, Ribal Atallah, Basile L. Agba, Chadi Assi, Mourad Debbabi:
CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid. IEEE Trans. Smart Grid 11(3): 2676-2687 (2020) - [j102]Mohsen Ghafouri, Minh Au, Marthe Kassouf, Mourad Debbabi, Chadi Assi, Jun Yan:
Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids. IEEE Trans. Smart Grid 11(6): 5227-5238 (2020) - [c183]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c182]Alaa Oqaily, Sudershan Lakshmanan Thirunavukkarasu, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack. CloudCom 2020: 33-40 - [c181]Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [i15]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Clustering using Community Detection on Android Packages Similarity Network. CoRR abs/2005.06075 (2020) - [i14]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [b3]Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - [j101]Farkhund Iqbal, Benjamin C. M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington:
Wordnet-Based Criminal Networks Mining for Cybercrime Investigation. IEEE Access 7: 22740-22755 (2019) - [j100]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
On the feasibility of binary authorship characterization. Digit. Investig. 28 Supplement: S3-S11 (2019) - [j99]ElMouatez Billah Karbab, Mourad Debbabi:
MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports. Digit. Investig. 28 Supplement: S77-S87 (2019) - [j98]Badr Afify, Sujoy Ray, Andrei Soeanu, Anjali Awasthi, Mourad Debbabi, Mohamad Allouche:
Evolutionary learning algorithm for reliable facility location under disruption. Expert Syst. Appl. 115: 223-244 (2019) - [j97]Bassam Moussa, Chantale Robillard, Alf Zugenmaier, Marthe Kassouf, Mourad Debbabi, Chadi Assi:
Securing the Precision Time Protocol (PTP) Against Fake Timestamps. IEEE Commun. Lett. 23(2): 278-281 (2019) - [j96]Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Learning probabilistic dependencies among events for proactive security auditing in clouds. J. Comput. Secur. 27(2): 165-202 (2019) - [j95]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. J. Comput. Secur. 27(6): 613-648 (2019) - [j94]Parisa Akaber, Bassam Moussa, Mourad Debbabi, Chadi Assi:
Automated Post-Failure Service Restoration in Smart Grid Through Network Reconfiguration in the Presence of Energy Storage Systems. IEEE Syst. J. 13(3): 3358-3367 (2019) - [j93]Elias Bou-Harb, Martin Husák, Mourad Debbabi, Chadi Assi:
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Trans. Big Data 5(4): 439-453 (2019) - [j92]Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. ACM Trans. Priv. Secur. 22(1): 1:1-1:35 (2019) - [j91]Reem Kateb, Parisa Akaber, Mosaddek Hossain Kamal Tushar, Abdullah Albarakati, Mourad Debbabi, Chadi Assi:
Enhancing WAMS Communication Network Against Delay Attacks. IEEE Trans. Smart Grid 10(3): 2738-2751 (2019) - [c180]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c179]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c178]Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba:
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. DIMVA 2019: 89-108 - [c177]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - [c176]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - [c175]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - [c174]Abdullah Albarakati, Chantale Robillard, Mark Karanfil, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Amr M. Youssef:
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1. SmartGridComm 2019: 1-7 - [c173]Onur Duman, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, Mourad Debbabi:
Modeling Supply Chain Attacks in IEC 61850 Substations. SmartGridComm 2019: 1-6 - [e2]Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquín García-Alfaro:
Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11358, Springer 2019, ISBN 978-3-030-18418-6 [contents] - 2018
- [j90]Sadegh Torabi, Amine Boukhtouta, Chadi Assi, Mourad Debbabi:
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems. IEEE Commun. Surv. Tutorials 20(4): 3389-3415 (2018) - [j89]Andrei Soeanu, Sujoy Ray, Jean Berger, Mourad Debbabi:
Efficient sensor network management for asset localization. Comput. Oper. Res. 99: 148-165 (2018) - [j88]Houssem Eddine Bordjiba, ElMouatez Billah Karbab, Mourad Debbabi:
Data-driven approach for automatic telephony threat analysis and campaign detection. Digit. Investig. 24 Supplement: S131-S141 (2018) - [j87]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 24 Supplement: S48-S59 (2018) - [j86]Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
CSC-Detector: A System to Infer Large-Scale Probing Campaigns. IEEE Trans. Dependable Secur. Comput. 15(3): 364-377 (2018) - [j85]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. IEEE Trans. Inf. Forensics Secur. 13(5): 1185-1199 (2018) - [j84]Bassam Moussa, Parisa Akaber, Mourad Debbabi, Chadi Assi:
Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks. IEEE Trans. Ind. Informatics 14(2): 472-483 (2018) - [j83]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Trans. Priv. Secur. 21(2): 8:1-8:34 (2018) - [j82]Reem Kateb, Mosaddek Hossain Kamal Tushar, Chadi Assi, Mourad Debbabi:
Optimal Tree Construction Model for Cyber-Attacks to Wide Area Measurement Systems. IEEE Trans. Smart Grid 9(1): 25-34 (2018) - [j81]Bassam Moussa, Mourad Debbabi, Chadi Assi:
A Detection and Mitigation Model for PTP Delay Attack in an IEC 61850 Substation. IEEE Trans. Smart Grid 9(5): 3954-3965 (2018) - [c172]ElMouatez Billah Karbab, Mourad Debbabi:
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. ARES 2018: 20:1-20:10 - [c171]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c170]Taous Madi, Mengyuan Zhang, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - [c169]Azadeh Tabiban, Suryadipta Majumdar, Lingyu Wang, Mourad Debbabi:
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. CNS 2018: 1-7 - [c168]