Login | Register

Items where Author is "Debbabi, Mourad"

Group by: Item Type | No Grouping
Number of items: 14.

Article

Soeanu, Andrei, Ray, Sujoy, Berger, Jean and Debbabi, Mourad (2018) Efficient Sensor Network Management for Asset Localization. Computers & Operations Research . ISSN 03050548 (In Press)

Rahimian, Ashkan, Shirani, Paria, Alrabaee, Saed, Wang, Lingyu and Debbabi, Mourad (2015) BinComp: A Stratified Approach to Compiler Provenance Attribution. Digital Investigation, 14 (1). pp. 146-155. ISSN 1742-2876

Alrabaee, Saed, Saleem, Noman, Preda, Stere, Wang, Lingyu and Debbabi, Mourad (2014) OBA2: An Onion approach to Binary Code Authorship Attribution. Digital Investigation, 11 (1). S94-S103. ISSN http://dx.doi.org/10.1016/j.diin.2014.03.012

Iqbal, Farkhund, Binsalleeh, Hamad, Fung, Benjamin C.M. and Debbabi, Mourad (2013) A unified data mining solution for authorship analysis in anonymous textual communications. Information Sciences, 231 . pp. 98-112. ISSN 00200255

Mohammed, Noman, Fung, Benjamin C.M. and Debbabi, Mourad (2011) Anonymity meets game theory: secure data integration with malicious participants. The VLDB Journal, 20 (4). pp. 567-588. ISSN 1066-8888

Iqbal, Farkhund, Binsalleeh, Hamad, Fung, Benjamin C.M. and Debbabi, Mourad (2010) Mining writeprints from anonymous e-mails for forensic investigation. Digital Investigation, 7 (1-2). pp. 56-64. ISSN 17422876

Ibqal, F, Hadjidi, R., R, Fung, Benjamin C.M. and Debbabi, Mourad (2008) A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digital Investigation, 5 . S42-S51. ISSN 17422876

Book Section

Rahimian, Ashkan, Ziarati, Raha, Preda, Stere and Debbabi, Mourad (2014) On the Reverse Engineering of the Citadel Botnet. In: Foundations and Practice of Security. Lecture Notes in Computer Science, 8352 . Springer International Publishing, pp. 408-425. ISBN 978-3-319-05302-8

Rahimian, Ashkan, Ziarati, Raha, Preda, Stere and Debbabi, Mourad (2014) On the Reverse Engineering of the Citadel Botnet. In: Foundations and Practice of Security. Lecture Notes in Computer Science, 8352 . Springer International Publishing, pp. 408-425. ISBN 978-3-319-05302-8

Rahimian, Ashkan, Charland, Philippe, Preda, Stere and Debbabi, Mourad (2013) RESource: A Framework for Online Matching of Assembly with Open Source Code. In: Garcia-Alfaro, J. and Cuppens, F. and Cuppens-Boulahia, N. and Miri, A. and Tawbi, N., (eds.) Foundations and Practice of Security. Lecture Notes in Computer Science, 7743 . Springer, pp. 211-226. ISBN 978-3-642-37119-6

Mokhov, Serguei A., Paquet, Joey and Debbabi, Mourad (2010) Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence. In: Jha, S. and Sommer, R. and Kreibich, C., (eds.) Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, 6307 . Springer, pp. 508-509. ISBN 978-3-642-15511-6

Monograph

Mohammed, Noman, Fung, Benjamin C.M. and Debbabi, Mourad (2010) Preserving Privacy and Utility in RFID Data Publishing. Technical Report. N/A.

Conference or Workshop Item

Mokhov, Serguei A., Paquet, Joey and Debbabi, Mourad (2011) Reasoning About a Simulated Printer Case Investigation with Forensic Lucid. In: International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), October 2011, Dublin, Ireland. (In Press)

Mokhov, Serguei A., Vassev, Emil, Paquet, Joey and Debbabi, Mourad (2010) Towards a Self-Forensics Property in the ASSL Toolset. In: C3S2E 2010, May 19-21, 2010, Montreal, QC, Canada.

This list was generated on Tue Mar 19 03:11:42 2024 EDT.
Back to top Back to top