Mourad Debbabi

Universite Laval (Canada) 
Computer Science
"Mourad Debbabi"
BETA: Related publications


You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Ray S, Debbabi M, Allouche M, et al. (2016) Energy-Efficient Monitor Deployment in Collaborative Distributed Setting Ieee Transactions On Industrial Informatics. 12: 112-123
Moussa B, Debbabi M, Assi C. (2016) A detection and mitigation model for PTP delay attack in a smart grid substation 2015 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2015. 497-502
Fachkha C, Debbabi M. (2016) Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization Ieee Communications Surveys and Tutorials. 18: 1197-1227
Bou-Harb E, Debbabi M, Assi C. (2016) A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities Computer Networks. 94: 327-343
Ding SHH, Fung BCM, Debbabi M. (2015) A visualizable evidence-driven approach for Authorship attribution Acm Transactions On Information and System Security. 17
Mokhov SA, Paquet J, Debbabi M. (2015) MARFCAT: Fast code analysis for defects and vulnerabilities 2015 Ieee 1st International Workshop On Software Analytics, Swan 2015 - Proceedings. 35-38
Sadri S, Jarraya Y, Eghtesadi A, et al. (2015) Towards migrating security policies of virtual machines in Software Defined Networks 1st Ieee Conference On Network Softwarization: Software-Defined Infrastructures For Networks, Clouds, Iot and Services, Netsoft 2015
Bou-Harb E, Debbabi M, Assi C. (2015) A time series approach for inferring orchestrated probing campaigns by analyzing darknet traffic Proceedings - 10th International Conference On Availability, Reliability and Security, Ares 2015. 180-185
Aljumah F, Soeanu A, Liu WM, et al. (2015) Protocols for secure multi-party private function evaluation 2015 1st International Conference On Anti-Cybercrime, Icacc 2015
Farhadi MR, Fung BCM, Fung YB, et al. (2015) Scalable code clone search for malware analysis Digital Investigation
See more...