Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media

Jwen Fai Low , Benjamin Fung , Farkhund Iqbal , Claude Fachkha
arXiv preprint arXiv:2402.01905

1
2024
Blockchain for Email Security: A Perspective on Existing and Potential Solutions for Phishing Attacks

Jamal Al-Karaki , Islam Almalkawi , Loiy Al-Abed , Claude Fachkha
2023 Fifth International Conference on Blockchain Computing and Applications (BCCA) 404 -411

1
2023
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems

Tony Nasr , Sadegh Torabi , Elias Bou-Harb , Claude Fachkha
Computers & Security 112 102511 -102511

51
2022
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems

Tony Nasr , Sadegh Torabi , Elias Bou-Harb , Claude Fachkha
The Network and Distributed System Security (NDSS) Symposium 2023. San Diego, CA, USA 1 -16

8
2023
Characterizing Mobile Money Phishing Using Reinforcement Learning

Alima Nzeket Njoya , Vanelle Laure Tchaya Ngongag , Franklin Tchakounté , Marcellin Atemkeng
IEEE Access 26 -26

1
2023
Cyber security threats targeting cps systems: A novel approach using honeypots

Sameera Almulla , Elias Bou-Harb , Claude Fachkha
The Twelfth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 85 -91

6
2018
Helium-based IoT devices: Threat analysis and Internet-scale exploitations

Veronica Rammouz , Joseph Khoury , Ðorđe Klisura , Morteza Safaei Pour
2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 206 -211

5
2023
Multi-scale Adaptive Threshold for DDoS Detection

Fatima Ezzahra Ouerfelli , Khaled Barbaria , Belhassen Zouari , Claude Fachkha
Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings 14 342 -354

2
2020
Distributed Detection System Using Wavelet Decomposition and Chi-Square Test

Fatima Ezzahra Ouerfelli , Khaled Barbaria , Belhassen Zouari , Claude Fachkha
Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings 12026 365 -365

2020
A Gamification Architecture to Enhance Phishing Awareness

Jean Emmanuel Ntsama , Claude Fachkha , Philippe Brice Owomo , Adrian Chickagwe Focho
Springer Nature Switzerland 37 -57

3
2023
Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm

Roger Yiran Mawoh , Franklin Tchakounte , Joan Beri Ali , Claude Fachkha
Springer Nature Switzerland 86 -96

2023
Feature Engineering Considerations in IoT: A Case Study

Jean-Marie Kuate Fotso , Ismael Abbo , Franklin Tchakounté , William Shu
Springer Nature Switzerland 97 -107

2023
Security monitoring of the cyber space

Claude Fachkha
IGI Global 62 -83

6
2015
An Online Deterministic Algorithm for Non-metric Facility Leasing

Christine Markarian , Claude Fachkha
26th International Conference on Enterprise Information Systems (ICEIS)

1
2023
Comparing Cyber Physical Systems with RFID Applications: Common Attacks and Countermeasure Challenges

Sami Miniaoui , Suadad Muammar , Claude Lubamba , Claude Fachkha
International Journal of Business Information Systems 40 ( 4) 540 -559

1
2022
How to Tame Pre-Trained Transformers for Authorship Verification

Miles Q Li , Benjamin Fung , Shih-Chia Huang , Claude Fachkha
Available at SSRN 4889071

2024
Strategic Placement of Data Centers for Economic Analysis: An Online Algorithm Approach

Christine Markarian , Claude Fachkha
The International Conference on Data Science, Technology and Applications (DATA)

2024
Tracing the Ransomware Bloodline: Investigation and Detection of Drifting Virlock Variants

Salwa Razaulla , Claude Fachkha , Amjad Gawanmeh , Christine Markarian
6th International Conference on Computer Communication and the Internet (ICCCI)

2024