Security Evaluation and Hardening of Free and Open Source Software (FOSS)

Rachid Hadjidj , Dima Alhadidi , Mourad Debbabi , Hakim Idrissi Kaitouni
Electronic Communication of The European Association of Software Science and Technology 33

1
2010
Th eDataflo wPointcu t - AForma lan dPractica lFramework *

Dima Alhadidi , Amine Boukhtouta , Nadia Belblidia , Mourad Debbabi

2009
A Practical Framework for the Dataflow Pointcut in AspectJ

Amine Boukhtouta , Dima Alhadidi , Mourad Debbabi
availability, reliability and security 835 -840

2009
Towards Fingerprinting Malicious Traffic

Amine Boukhtouta , Nour-Eddine Lakhdari , Serguei A Mokhov , Mourad Debbabi
Procedia Computer Science 19 548 -555

11
2013
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting A Large Network Telescope

Sadegh Torabi , Elias Bou-Harb , Chadi Assi , ElMouatez Billah Karbab
IEEE Transactions on Dependable and Secure Computing 1 -1

3
2020
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems

Sadegh Torabi , Amine Boukhtouta , Chadi Assi , Mourad Debbabi
IEEE Communications Surveys and Tutorials 20 ( 4) 3389 -3415

12
2018
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective

Sadegh Torabi , Elias Bou-Harb , Chadi Assi , Mario Galluscio
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 562 -573

14
2018
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat

Thomas Ormerod , Lingyu Wang , Mourad Debbabi , Amr Youssef
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies 195 -200

20
2010
Insights from the analysis of the Mariposa botnet

Prosenjit Sinha , Amine Boukhtouta , Victor Heber Belarde , Mourad Debbabi
conference on risks and security of internet and systems 1 -9

30
2010
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation

Claude Fachkha , Elias Bou-Harb , Amine Boukhtouta , Son Dinh
conference on risks and security of internet and systems 1 -8

24
2012
Inferring Malware Family through Application Protocol Sequences Signature

Amine Boukhtouta , Nour-Eddine Lakhdari , Mourad Debbabi
new technologies, mobility and security 1 -5

3
2014
Multi-perspective content delivery networks security framework using optimized unsupervised anomaly detection

Li Yang , Abdallah Moubayed , Abdallah Shami , Parisa Heidari
IEEE Transactions on Network and Service Management 19 ( 1) 686 -705

11
2021
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring

Md Nazmul Hoq , Jia Wei Yao , Suryadipta Majumdar , Luis Suárez
Springer Nature Switzerland 123 -144

1
2023
NFV security survey in 5G networks: A three-dimensional threat taxonomy

Taous Madi , Hyame Assem Alameddine , Makan Pourzandi , Amine Boukhtouta
Computer Networks 197 108288 -108288

35
2021
Autoguard: A dual intelligence proactive anomaly detection at application-layer in 5g networks

Taous Madi , Hyame Assem Alameddine , Makan Pourzandi , Amine Boukhtouta
Computer Security–ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I 26 715 -735

6
2021
Cloud native applications profiling using a graph neural networks approach

Amine Boukhtouta , Taous Madi , Makan Pourzandi , Hyame Alameddine
2022 IEEE Future Networks World Forum (FNWF) 220 -227

2
2022
Fingerprinting crowd events in content delivery networks: A semi-supervised methodology

Amine Boukhtouta , Makan Pourzandi , Richard Brunner , Stéphane Dault
Data and Applications Security and Privacy XXXII: 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings 32 312 -329

1
2018
Network malware classification comparison using DPI and flow packet headers

Amine Boukhtouta , Serguei A Mokhov , Nour-Eddine Lakhdari , Mourad Debbabi
Journal of Computer Virology and Hacking Techniques 11

81
2015
Intrusion prevention scheme against rank attacks for software-defined low power IoT networks

Christian Miranda , Georges Kaddoum , Amine Boukhtouta , Taous Madi
IEEE Access 10 129970 -129984

9
2022
Signalling storm mitigation in a secured radio access network

Stere Preda , Amine Boukhtouta , Daniel Migault , Fereydoun Farrahi Moghaddam

6
2021