“Why should I read the privacy policy, I just need the service”: A study on attitudes and perceptions toward privacy policies D Ibdah, N Lachtar, SM Raparthi, A Bacha IEEE access 9, 166465-166487, 2021 | 53 | 2021 |
A cross-stack approach towards defending against cryptojacking N Lachtar, AA Elkhail, A Bacha, H Malik IEEE Computer Architecture Letters 19 (2), 126-129, 2020 | 33 | 2020 |
The case for native instructions in the detection of mobile ransomware N Lachtar, D Ibdah, A Bacha IEEE Letters of the Computer Society 2 (2), 16-19, 2019 | 29 | 2019 |
Toward mobile malware detection through convolutional neural networks N Lachtar, D Ibdah, A Bacha IEEE Embedded Systems Letters 13 (3), 134-137, 2020 | 24 | 2020 |
Seamlessly safeguarding data against ransomware attacks AA Elkhail, N Lachtar, D Ibdah, R Aslam, H Khan, A Bacha, H Malik IEEE Transactions on Dependable and Secure Computing 20 (1), 1-16, 2023 | 16 | 2023 |
On the security of SDN-enabled smartgrid systems D Ibdah, M Kanani, N Lachtar, N Allan, B Al-Duwairi 2017 International Conference on Electrical and Computing Technologies and …, 2017 | 14 | 2017 |
Ransomshield: A visualization approach to defending mobile systems against ransomware N Lachtar, D Ibdah, H Khan, A Bacha ACM Transactions on Privacy and Security 26 (3), 1-30, 2023 | 9 | 2023 |
Dark firmware: a systematic approach to exploring application security risks in the presence of untrusted firmware D Ibdah, N Lachtar, AA Elkhail, A Bacha, H Malik 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 8 | 2020 |
An application agnostic defense against the dark arts of cryptojacking N Lachtar, AA Elkhail, A Bacha, H Malik 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 7 | 2021 |