On the analysis of the zeus botnet crimeware toolkit H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ... 2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010 | 339 | 2010 |
Mining writeprints from anonymous e-mails for forensic investigation F Iqbal, H Binsalleeh, BCM Fung, M Debbabi digital investigation 7 (1-2), 56-64, 2010 | 214 | 2010 |
A unified data mining solution for authorship analysis in anonymous textual communications F Iqbal, H Binsalleeh, B Fung, M Debbabi Information Sciences 231, 98-112, 2013 | 146 | 2013 |
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ... IEEE Access 7, 99508-99520, 2019 | 97 | 2019 |
Detection of Malicious Payload Distribution Channels in DNS AM Kara, H Binsalleeh, M Mannan, A Youssef, M Debbabi | 65 | 2014 |
Anomaly Detection Using Dynamic Time Warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... 2019 IEEE International Conference on Computational Science and Engineering …, 2019 | 52 | 2019 |
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro, S Lambotharan, ... IEEE Access 6, 40008-40023, 2018 | 39 | 2018 |
Multidimensional investigation of source port 0 probing E Bou-Harb, NE Lakhdari, H Binsalleeh, M Debbabi Digital Investigation 11, S114-S123, 2014 | 36 | 2014 |
Defaming botnet toolkits: A bottom-up approach to mitigating the threat T Ormerod, L Wang, M Debbabi, A Youssef, H Binsalleeh, A Boukhtouta, ... 2010 Fourth International Conference on Emerging Security Information …, 2010 | 26 | 2010 |
Characterization of Covert Channels in DNS H Binsalleeh, AM Kara, A Youssef, M Debbabi New Technologies, Mobility and Security (NTMS), 2014 6th International …, 2014 | 23 | 2014 |
Denial of service detection using dynamic time warping DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ... International Journal of Network Management 31 (6), e2159, 2021 | 14 | 2021 |
An Explanation of the LSTM Model Used for DDoS Attacks Classification A Bashaiwth, H Binsalleeh, B AsSadhan Applied Sciences 13 (15), 8820, 2023 | 13 | 2023 |
An implementation for a worm detection and mitigation system H Binsalleeh, A Youssef 2008 24th Biennial Symposium on Communications, 54-57, 2008 | 12 | 2008 |
Using RFID tags to improve pilgrimage management H Binsalleeh, N Mohammed, PS Sandhu, F Aljumah, BCM Fung 2009 International Conference on Innovations in Information Technology (IIT …, 2009 | 11 | 2009 |
Comparative analysis on imbalanced multi-class classification for malware samples using CNN A Alzammam, H Binsalleeh, B AsSadhan, KG Kyriakopoulos, ... 2019 International Conference on Advances in the Emerging Computing …, 2020 | 5 | 2020 |
Enhancing Explanation of LSTM-based DDoS Attack Classification using SHAP with Pattern Dependency B AsSadhan, A Bashaiwth, H Binsalleeh IEEE Access, 2024 | 4 | 2024 |
Analysis of Malware and Domain Name System Traffic H Binsalleeh Concordia University, 2014 | 4 | 2014 |
Adversarial Attacks with Defense Mechanisms on Convolutional Neural Networks and Recurrent Neural Networks for Malware Classification S Alzaidy, H Binsalleeh Applied Sciences 14 (4), 1673, 2024 | 3 | 2024 |
Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis B AsSadhan, A Alzoghaiby, H Binsalleeh, KG Kyriakopoulos, ... International Journal of Network Management 30 (6), e2129, 2020 | 3 | 2020 |
Botnets: Analysis, Detection, and Mitigation H Binsalleeh Network Security Technologies: Design and Applications: Design and …, 2014 | 3 | 2014 |