• Publications
  • Influence
On the analysis of the Zeus botnet crimeware toolkit
TLDR
The reverse engineering insights allow for a better understanding of the technologies and behaviors of such modern HTTP botnet crimeware toolkits and opens an opportunity to inject falsified information into the botnet communications which can be used to defame this Crimeware toolkit. Expand
A Survey and a Layered Taxonomy of Software-Defined Networking
TLDR
This paper provides an overview on SDN roots and then describes the architecture underlying SDN and its main components, and presents existing SDN-related taxonomies and proposes a taxonomy that classifies the reviewed research works and brings relevant research directions into focus. Expand
MalDozer: Automatic framework for android malware detection using deep learning
TLDR
MalDozer is proposed, an automatic Android malware detection and family attribution framework that relies on sequences classification using deep learning techniques that can serve as a ubiquitous malware detection system that is not only deployed on servers, but also on mobile and even IoT devices. Expand
Mining writeprints from anonymous e-mails for forensic investigation
TLDR
Experiments on a real-life dataset suggest that clustering by writing style is a promising approach for grouping e-mails written by the same author. Expand
A novel approach of mining write-prints for authorship attribution in e-mail forensics
TLDR
An innovative data mining method to capture the write-print of every suspect and model it as combinations of features that occurred frequently in the suspect's e-mails is introduced, for the first time to be applied to the problem of authorship attribution. Expand
Communication security for smart grid distribution networks
TLDR
This article targets the network security of the advanced metering infrastructure coupled with the data communication toward the transmission infrastructure, and discusses the security and feasibility aspects of possible communication mechanisms that could be adopted on that subpart of the grid. Expand
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
TLDR
A solution based on mechanism design theory provides nodes with incentives in the form of reputations to encourage nodes in honestly participating in the election process and proposes a series of local election algorithms that can lead to globally optimal election results with a low cost. Expand
A game-theoretic intrusion detection model for mobile ad hoc networks
TLDR
A unified framework to increase the effectiveness of an IDS in MANET is proposed that is able to balance the resource consumption among all the nodes and thus increase the overall lifetime of a cluster by electing truthfully and efficiently the most cost-efficient node known as leader-IDS. Expand
A unified data mining solution for authorship analysis in anonymous textual communications
TLDR
This paper is the first work that presents a unified data mining solution to address authorship analysis problems based on the concept of frequent pattern-based writeprint, and extensive experiments suggest that the proposed solution can precisely capture the writing styles of individuals. Expand
Security Design Patterns: Survey and Evaluation
TLDR
A classification of inappropriate pattern qualities is determined using a six sigma approach and a set of desirable properties that would prevent flaws in new design patterns, as well as a template for expressing them are proposed. Expand
...
1
2
3
4
5
...