Seguir
Mohamed Nassar
Mohamed Nassar
Dirección de correo verificada de uah.edu
Título
Citado por
Citado por
Año
Blockchain for explainable and trustworthy artificial intelligence
M Nassar, K Salah, MH ur Rehman, D Svetinovic
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1340, 2019
1272019
Monitoring SIP Traffic Using Support Vector Machines
M Nassar, R State, O Festor
Recent Advances in Intrusion Detection, 311-330, 2008
802008
Holistic VoIP intrusion detection and prevention system
M Nassar, S Niccolini, R State, T Ewald
Proceedings of the 1st international conference on Principles, systems and …, 2007
652007
Voip Honeypot Architecture
M Nassar, O Festor
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
522007
Paillier's encryption: Implementation and cloud applications
M Nassar, A Erradi, QM Malluhi
2015 International Conference on Applied Research in Computer Science and …, 2015
442015
Secure and private outsourcing of shape-based feature extraction
S Wang, M Nassar, M Atallah, Q Malluhi
Information and Communications Security: 15th International Conference …, 2013
412013
Intrusion detection mechanisms for VoIP applications
M Nassar, R State, O Festor
39*2006
Modeling malware as a language
Y Awad, M Nassar, H Safa
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
372018
Artemisa: An open-source honeypot back-end to support security in VoIP domains
R Do Carmo, M Nassar, O Festor
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
352011
Labeled VoIP data-set for intrusion detection evaluation
M Nassar, R State, O Festor
Networked Services and Applications-Engineering, Control and Management, 97-106, 2010
292010
A hybrid game theory and reinforcement learning approach for cyber-physical systems security
J Khoury, M Nassar
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2020
262020
Benchmarking convolutional and recurrent neural networks for malware classification
H Safa, M Nassar, WAR Al Orabi
2019 15th International Wireless Communications & Mobile Computing …, 2019
242019
Securing aggregate queries for DNA databases
M Nassar, Q Malluhi, M Atallah, A Shikfa
IEEE Transactions on Cloud Computing 7 (3), 827-837, 2017
242017
A survey on fraud and service misuse in voice over IP (VoIP) networks
Y Rebahi, M Nassar, T Magedanz, O Festor
information security technical report 16 (1), 12-19, 2011
222011
Secure outsourcing of network flow data analysis
M Nassar, B al Bouna, Q Malluhi
2013 IEEE International Congress on Big Data, 431-432, 2013
212013
A user-centric mechanism for sequentially releasing graph datasets under blowfish privacy
E Chicha, BA Bouna, M Nassar, R Chbeir, RA Haraty, M Oussalah, ...
ACM Transactions on Internet Technology (TOIT) 21 (1), 1-25, 2021
202021
Secure outsourcing of matrix operations as a service
M Nassar, A Erradi, F Sabri, QM Malluhi
2013 IEEE Sixth International Conference on Cloud Computing, 918-925, 2013
182013
Transfer learning for malware multi-classification
MA Kadri, M Nassar, H Safa
Proceedings of the 23rd International Database Applications & Engineering …, 2019
172019
VoIP malware: Attack tool & attack scenarios
M Nassar, R State, O Festor
2009 IEEE International Conference on Communications, 1-6, 2009
16*2009
RPig: A scalable framework for machine learning and advanced statistical functionalities
MX Wang, SB Handurukande, M Nassar
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
142012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20