Takip et
Mourad Debbabi
Mourad Debbabi
Dean, Professor, Hydro-Québec Hitachi Research Chair, Concordia University
concordia.ca üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
A survey and a layered taxonomy of software-defined networking
Y Jarraya, T Madi, M Debbabi
IEEE communications surveys & tutorials 16 (4), 1955-1980, 2014
5142014
MalDozer: Automatic framework for android malware detection using deep learning
EMB Karbab, M Debbabi, A Derhab, D Mouheb
Digital investigation 24, S48-S59, 2018
4442018
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 eighth international conference on privacy, security and trust, 31-38, 2010
3392010
Static detection of malicious code in executable programs
J Bergeron, M Debbabi, J Desharnais, MM Erhioui, Y Lavoie, N Tawbi
Int. J. of Req. Eng 2001 (184-189), 79, 2001
3152001
Communication security for smart grid distribution networks
E Bou-Harb, C Fachkha, M Pourzandi, M Debbabi, C Assi
IEEE Communications Magazine 51 (1), 42-49, 2013
2862013
Cyber scanning: a comprehensive survey
E Bou-Harb, M Debbabi, C Assi
Ieee communications surveys & tutorials 16 (3), 1496-1519, 2013
2222013
Mining writeprints from anonymous e-mails for forensic investigation
F Iqbal, H Binsalleeh, BCM Fung, M Debbabi
digital investigation 7 (1-2), 56-64, 2010
2142010
Mechanism design-based secure leader election model for intrusion detection in MANET
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
IEEE transactions on dependable and secure computing 8 (1), 89-103, 2009
1622009
A novel approach of mining write-prints for authorship attribution in e-mail forensics
F Iqbal, R Hadjidj, BCM Fung, M Debbabi
digital investigation 5, S42-S51, 2008
1592008
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization
C Fachkha, M Debbabi
IEEE Communications Surveys & Tutorials 18 (2), 1197-1227, 2015
1582015
A unified data mining solution for authorship analysis in anonymous textual communications
F Iqbal, H Binsalleeh, BCM Fung, M Debbabi
Information Sciences 231, 98-112, 2013
1472013
Verification and validation in systems engineering: assessing UML/SysML design models
M Debbabi, F Hassaine, Y Jarraya, A Soeanu, L Alawneh
Springer Science & Business Media, 2010
1472010
Towards an integrated e-mail forensic analysis framework
R Hadjidj, M Debbabi, H Lounis, F Iqbal, A Szporer, D Benredjem
digital investigation 5 (3-4), 124-137, 2009
1472009
A game-theoretic intrusion detection model for mobile ad hoc networks
H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya
Computer communications 31 (4), 708-721, 2008
1252008
Binclone: Detecting code clones in malware
MR Farhadi, BCM Fung, P Charland, M Debbabi
2014 Eighth International Conference on Software Security and Reliability …, 2014
1192014
Walking in the crowd: anonymizing trajectory data for pattern analysis
N Mohammed, BCM Fung, M Debbabi
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
1192009
Static analysis of binary code to isolate malicious behaviors
J Bergeron, M Debbabi, MM Erhioui, B Ktari
Proceedings. IEEE 8th International Workshops on Enabling Technologies …, 1999
1141999
Secure two-party differentially private data release for vertically partitioned data
N Mohammed, D Alhadidi, BCM Fung, M Debbabi
IEEE transactions on dependable and secure computing 11 (1), 59-71, 2013
1112013
Electric vehicle attack impact on power grid operation
MA Sayed, R Atallah, C Assi, M Debbabi
International Journal of Electrical Power & Energy Systems 137, 107784, 2022
1072022
Oba2: An onion approach to binary code authorship attribution
S Alrabaee, N Saleem, S Preda, L Wang, M Debbabi
Digital Investigation 11, S94-S103, 2014
1052014
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20