Seguir
Saed Alrabaee
Saed Alrabaee
Associate Professor, Information Systems and Security, UAEU
Dirección de correo verificada de uaeu.ac.ae - Página principal
Título
Citado por
Citado por
Año
Oba2: An onion approach to binary code authorship attribution
S Alrabaee, N Saleem, S Preda, L Wang, M Debbabi
Digital Investigation 11, S94-S103, 2014
1012014
Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code
S Alrabaee, P Shirani, L Wang, M Debbabi
Digital Investigation 12, S61-S71, 2015
822015
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
S Alrabaee, P Shirani, L Wang, M Debbabi
ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-34, 2018
732018
On the feasibility of malware authorship attribution
S Alrabaee, P Shirani, M Debbabi, L Wang
Foundations and Practice of Security: 9th International Symposium, FPS 2016 …, 2017
662017
Bincomp: A stratified approach to compiler provenance attribution
A Rahimian, P Shirani, S Alrbaee, L Wang, M Debbabi
Digital Investigation 14, S146-S155, 2015
612015
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
S Alrabaee, L Wang, M Debbabi
Digital Investigation 18, S11-S22, 2016
572016
The role of national cybersecurity strategies on the improvement of cybersecurity education
S AlDaajeh, H Saleous, S Alrabaee, E Barka, F Breitinger, KKR Choo
Computers & Security 119, 102754, 2022
512022
Network traffic classification: Techniques, datasets, and challenges
A Azab, M Khasawneh, S Alrabaee, KKR Choo, M Sarsour
Digital Communications and Networks, 2022
442022
Dysign: dynamic fingerprinting for the automatic detection of android malware
EMB Karbab, M Debbabi, S Alrabaee, D Mouheb
2016 11th International Conference on Malicious and Unwanted Software …, 2016
382016
Reinforcing the edge: Autonomous energy management for mobile device clouds
V Balasubramanian, F Zaman, M Aloqaily, S Alrabaee, M Gorlatova, ...
IEEE INFOCOM 2019-IEEE conference on computer communications workshops …, 2019
352019
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities
H Saleous, M Ismail, SH AlDaajeh, N Madathil, S Alrabaee, KKR Choo, ...
Digital communications and networks 9 (1), 211-222, 2023
292023
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning
S Alrabaee, EMB Karbab, L Wang, M Debbabi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
232019
On leveraging coding habits for effective binary authorship attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
232018
TD‐PSO: task distribution approach based on particle swarm optimization for vehicular ad hoc network
M Bany Taha, C Talhi, H Ould‐Slimane, S Alrabaee
Transactions on Emerging Telecommunications Technologies 33 (3), e3860, 2022
222022
On the feasibility of binary authorship characterization
S Alrabaee, M Debbabi, L Wang
Digital Investigation 28, S3-S11, 2019
222019
A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features
S Alrabaee, M Debbabi, L Wang
ACM Computing Surveys (CSUR) 55 (1), 1-41, 2022
212022
Game theory for security in cognitive radio networks
S Alrabaee, A Agarwal, D Anand, M Khasawneh
2012 International Conference on Advances in Mobile Network, Communication …, 2012
212012
Discovering public wi-fi vulnerabilities using raspberry pi and kali linux
E Al Neyadi, S Al Shehhi, A Al Shehhi, N Al Hashimi, QH Mohammad, ...
2020 12th Annual Undergraduate Research Conference on Applied Computing (URC …, 2020
172020
Sureness efficient energy technique for cooperative spectrum sensing in cognitive radios
M Khasawneh, A Agarwal, N Goel, M Zaman, S Alrabaee
2012 International conference on telecommunications and multimedia (TEMU), 25-30, 2012
172012
A method for intrusion detection in web services based on time series
P Shirani, MA Azgomi, S Alrabaee
2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering …, 2015
162015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20