A survey and a layered taxonomy of software-defined networking Y Jarraya, T Madi, M Debbabi IEEE communications surveys & tutorials 16 (4), 1955-1980, 2014 | 510 | 2014 |
MalDozer: Automatic framework for android malware detection using deep learning EMB Karbab, M Debbabi, A Derhab, D Mouheb Digital investigation 24, S48-S59, 2018 | 435 | 2018 |
On the analysis of the zeus botnet crimeware toolkit H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ... 2010 eighth international conference on privacy, security and trust, 31-38, 2010 | 338 | 2010 |
Static detection of malicious code in executable programs J Bergeron, M Debbabi, J Desharnais, MM Erhioui, Y Lavoie, N Tawbi Int. J. of Req. Eng 2001 (184-189), 79, 2001 | 315 | 2001 |
Communication security for smart grid distribution networks E Bou-Harb, C Fachkha, M Pourzandi, M Debbabi, C Assi IEEE Communications Magazine 51 (1), 42-49, 2013 | 283 | 2013 |
Cyber scanning: a comprehensive survey E Bou-Harb, M Debbabi, C Assi Ieee communications surveys & tutorials 16 (3), 1496-1519, 2013 | 220 | 2013 |
Mining writeprints from anonymous e-mails for forensic investigation F Iqbal, H Binsalleeh, BCM Fung, M Debbabi digital investigation 7 (1-2), 56-64, 2010 | 213 | 2010 |
Mechanism design-based secure leader election model for intrusion detection in MANET N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya IEEE transactions on dependable and secure computing 8 (1), 89-103, 2009 | 161 | 2009 |
A novel approach of mining write-prints for authorship attribution in e-mail forensics F Iqbal, R Hadjidj, BCM Fung, M Debbabi digital investigation 5, S42-S51, 2008 | 158 | 2008 |
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization C Fachkha, M Debbabi IEEE Communications Surveys & Tutorials 18 (2), 1197-1227, 2015 | 153 | 2015 |
A unified data mining solution for authorship analysis in anonymous textual communications F Iqbal, H Binsalleeh, BCM Fung, M Debbabi Information Sciences 231, 98-112, 2013 | 146 | 2013 |
Towards an integrated e-mail forensic analysis framework R Hadjidj, M Debbabi, H Lounis, F Iqbal, A Szporer, D Benredjem digital investigation 5 (3-4), 124-137, 2009 | 146 | 2009 |
Verification and validation in systems engineering: assessing UML/SysML design models M Debbabi, F Hassaine, Y Jarraya, A Soeanu, L Alawneh Springer Science & Business Media, 2010 | 144 | 2010 |
A game-theoretic intrusion detection model for mobile ad hoc networks H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya Computer communications 31 (4), 708-721, 2008 | 126 | 2008 |
Walking in the crowd: anonymizing trajectory data for pattern analysis N Mohammed, BCM Fung, M Debbabi Proceedings of the 18th ACM conference on Information and knowledge …, 2009 | 118 | 2009 |
Static analysis of binary code to isolate malicious behaviors J Bergeron, M Debbabi, MM Erhioui, B Ktari Proceedings. IEEE 8th International Workshops on Enabling Technologies …, 1999 | 114 | 1999 |
Binclone: Detecting code clones in malware MR Farhadi, BCM Fung, P Charland, M Debbabi 2014 Eighth International Conference on Software Security and Reliability …, 2014 | 113 | 2014 |
Secure two-party differentially private data release for vertically partitioned data N Mohammed, D Alhadidi, BCM Fung, M Debbabi IEEE transactions on dependable and secure computing 11 (1), 59-71, 2013 | 109 | 2013 |
Oba2: An onion approach to binary code authorship attribution S Alrabaee, N Saleem, S Preda, L Wang, M Debbabi Digital Investigation 11, S94-S103, 2014 | 105 | 2014 |
Anonymity meets game theory: secure data integration with malicious participants N Mohammed, BCM Fung, M Debbabi The VLDB Journal 20, 567-588, 2011 | 101 | 2011 |