On the analysis of the Zeus botnet crimeware toolkit
- H. Binsalleeh, Thomas Ormerod, Lingyu Wang
- Computer ScienceEighth International Conference on Privacy…
- 30 September 2010
The reverse engineering insights allow for a better understanding of the technologies and behaviors of such modern HTTP botnet crimeware toolkits and opens an opportunity to inject falsified information into the botnet communications which can be used to defame this Crimeware toolkit.
MalDozer: Automatic framework for android malware detection using deep learning
A Survey and a Layered Taxonomy of Software-Defined Networking
- Yosr Jarraya, Taous Madi, M. Debbabi
- Computer ScienceIEEE Communications Surveys and Tutorials
- 24 April 2014
This paper provides an overview on SDN roots and then describes the architecture underlying SDN and its main components, and presents existing SDN-related taxonomies and proposes a taxonomy that classifies the reviewed research works and brings relevant research directions into focus.
Mining writeprints from anonymous e-mails for forensic investigation
Communication security for smart grid distribution networks
- E. Bou-Harb, Claude Fachkha, M. Pourzandi, M. Debbabi, C. Assi
- Engineering, Computer ScienceIEEE Communications Magazine
- 4 January 2013
This article targets the network security of the advanced metering infrastructure coupled with the data communication toward the transmission infrastructure, and discusses the security and feasibility aspects of possible communication mechanisms that could be adopted on that subpart of the grid.
A game-theoretic intrusion detection model for mobile ad hoc networks
A novel approach of mining write-prints for authorship attribution in e-mail forensics
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
- N. Mohammed, H. Otrok, Lingyu Wang, M. Debbabi, P. Bhattacharya
- Computer ScienceIEEE Transactions on Dependable and Secure…
A solution based on mechanism design theory provides nodes with incentives in the form of reputations to encourage nodes in honestly participating in the election process and proposes a series of local election algorithms that can lead to globally optimal election results with a low cost.
A unified data mining solution for authorship analysis in anonymous textual communications