On correlating network traffic for cyber threat intelligence: A Bloom filter approach

Adil Atifi , Elias Bou-Harb
2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) 384 -389

2
2017
On detecting and clustering distributed cyber scanning

Elias Bou-Harb , Mourad Debbabi , Chadi Assi
international conference on wireless communications and mobile computing 926 -933

2
2013
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning

Felix Anda , David Lillis , Aikaterini Kanta , Brett A. Becker
availability, reliability and security 57

6
2019
Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild

Morteza Safaei Pour , Antonio Mangino , Kurt Friday , Matthias Rathbun
availability, reliability and security

9
2019
A Statistical Approach for Fingerprinting Probing Activities

Elias Bou-Harb , Mourad Debbabi , Chadi Assi
availability, reliability and security 21 -30

16
2013
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic

Elias Bou-Harb , Mourad Debbabi , Chadi Assi
availability, reliability and security 180 -185

11
2015
Exploiting Ransomware Paranoia For Execution Prevention

Ali AlSabeh , Haidar Safa , Elias Bou-Harb , Jorge Crichigno
international conference on communications 1 -6

9
2020
Offloading Media Traffic to Programmable Data Plane Switches.

Elie F. Kfoury , Jorge Crichigno , Elias Bou-Harb
international conference on communications 1 -7

4
2020
On the impact of empirical attack models targeting marine transportation

Elias Bou-Harb , Evangelos I. Kaisar , Mark Austin
ieee international conference on models and technologies for intelligent transportation systems 200 -205

9
2017
Multidimensional investigation of source port 0 probing

Elias Bou-Harb , Nour-Eddine Lakhdari , Hamad Binsalleeh , Mourad Debbabi
Digital Investigation 11 S114 -S123

19
2014
18
2019
Improving the Accuracy of Automated Facial Age Estimation to Aid CSEM Investigations

Felix Anda , David Lillis , Aikaterini Kanta , Brett Becker
Digital Investigation 28 142

4
2019
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation

Claude Fachkha , Elias Bou-Harb , Amine Boukhtouta , Son Dinh
conference on risks and security of internet and systems 1 -8

24
2012
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild

Morteza Safaei Pour , Antonio Mangino , Kurt Friday , Matthias Rathbun
Computers & Security 91 101707

15
2020
A survey of methods supporting cyber situational awareness in the context of smart cities

Nataliia Neshenko , Christelle Nader , Elias Bou-Harb , Borko Furht
Journal of Big Data 7 ( 1) 1 -41

19
2020
On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach

Ouerfelli Fatima Ezzahra , Barbaria Khaled , Elias Bou-Harb , Claude Fachkha
2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) 518 -523

3
2018
On Secrecy Bounds of MIMO Wiretap Channels with ZF detectors

Long Kong , Georges Kaddoum , Daniel Benevides da Costa , Elias Bou-Harb
2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) 724 -729

2
2018
A Performance Evaluation of TCP BBRv2 Alpha

Jose Gomez , Elie Kfoury , Jorge Crichigno , Elias Bou-Harb
international conference on telecommunications 309 -312

2
2020
Leveraging SONiC Functionalities in Disaggregated Network Switches

Ali AlSabeh , Elie Kfoury , Jorge Crichigno , Elias Bou-Harb
international conference on telecommunications 457 -460

2020
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI

Elie F. Kfoury , David Khoury , Ali AlSabeh , Jose Gomez
international conference on telecommunications 461 -465

10
2020