Seguir
Mohamed Nassar
Mohamed Nassar
Dirección de correo verificada de newhaven.edu
Título
Citado por
Citado por
Año
Blockchain for explainable and trustworthy artificial intelligence
M Nassar, K Salah, MH ur Rehman, D Svetinovic
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1340, 2019
1482019
Monitoring SIP Traffic Using Support Vector Machines
M Nassar, R State, O Festor
Recent Advances in Intrusion Detection, 311-330, 2008
802008
Holistic VoIP intrusion detection and prevention system
M Nassar, S Niccolini, R State, T Ewald
Proceedings of the 1st international conference on Principles, systems and …, 2007
662007
Voip Honeypot Architecture
M Nassar, O Festor
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
522007
Paillier's encryption: Implementation and cloud applications
M Nassar, A Erradi, QM Malluhi
2015 International Conference on Applied Research in Computer Science and …, 2015
472015
Secure and private outsourcing of shape-based feature extraction
S Wang, M Nassar, M Atallah, Q Malluhi
Information and Communications Security: 15th International Conference …, 2013
412013
Modeling malware as a language
Y Awad, M Nassar, H Safa
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
392018
Intrusion detection mechanisms for VoIP applications
M Nassar, R State, O Festor
39*2006
Artemisa: An open-source honeypot back-end to support security in VoIP domains
R Do Carmo, M Nassar, O Festor
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
352011
Labeled VoIP data-set for intrusion detection evaluation
M Nassar, R State, O Festor
Networked Services and Applications-Engineering, Control and Management, 97-106, 2010
312010
A hybrid game theory and reinforcement learning approach for cyber-physical systems security
J Khoury, M Nassar
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2020
302020
Benchmarking convolutional and recurrent neural networks for malware classification
H Safa, M Nassar, WAR Al Orabi
2019 15th International Wireless Communications & Mobile Computing …, 2019
272019
Securing aggregate queries for DNA databases
M Nassar, Q Malluhi, M Atallah, A Shikfa
IEEE Transactions on Cloud Computing 7 (3), 827-837, 2017
242017
Secure outsourcing of network flow data analysis
M Nassar, B al Bouna, Q Malluhi
2013 IEEE International Congress on Big Data, 431-432, 2013
232013
A user-centric mechanism for sequentially releasing graph datasets under blowfish privacy
E Chicha, BA Bouna, M Nassar, R Chbeir, RA Haraty, M Oussalah, ...
ACM Transactions on Internet Technology (TOIT) 21 (1), 1-25, 2021
212021
A survey on fraud and service misuse in voice over IP (VoIP) networks
Y Rebahi, M Nassar, T Magedanz, O Festor
information security technical report 16 (1), 12-19, 2011
212011
Transfer learning for malware multi-classification
MA Kadri, M Nassar, H Safa
Proceedings of the 23rd International Database Applications & Engineering …, 2019
202019
Secure outsourcing of matrix operations as a service
M Nassar, A Erradi, F Sabri, QM Malluhi
2013 IEEE Sixth International Conference on Cloud Computing, 918-925, 2013
182013
VoIP malware: Attack tool & attack scenarios
M Nassar, R State, O Festor
2009 IEEE International Conference on Communications, 1-6, 2009
17*2009
RPig: A scalable framework for machine learning and advanced statistical functionalities
MX Wang, SB Handurukande, M Nassar
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
152012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20