default search action
Elias Bou-Harb
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Ali AlSabeh, Kurt Friday, Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
On DGA Detection and Classification Using P4 Programmable Switches. Comput. Secur. 145: 104007 (2024) - [j53]Elias Bou-Harb, Edgar R. Weippl, Chadi Assi, Martin Husák, Jiangshan Yu, Katherine A. Flanigan:
Guest Editorial: IoT Security and Provisioning in Cyber-Enabled Niche Critical Infrastructure. IEEE Internet Things Mag. 7(6): 10-12 (2024) - [j52]Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
P4BS: Leveraging Passive Measurements From P4 Switches to Dynamically Modify a Router's Buffer Size. IEEE Trans. Netw. Serv. Manag. 21(1): 1082-1099 (2024) - [j51]Khaled Sarieddine, Mohammad Ali Sayed, Chadi Assi, Ribal Atallah, Sadegh Torabi, Joseph Khoury, Morteza Safaei Pour, Elias Bou-Harb:
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security. IEEE Trans. Netw. Serv. Manag. 21(1): 1287-1301 (2024) - [j50]Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova:
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence. IEEE Trans. Netw. Serv. Manag. 21(3): 2608-2612 (2024) - [c72]Taha Gharaibeh, Steven Seiden, Mohamed Abouelsaoud, Elias Bou-Harb, Ibrahim M. Baggili:
Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint). ARES 2024: 200:1-200:11 - [c71]Kurt Friday, Elias Bou-Harb, Ron Lee, Pramod Peethambaran, Mayank Saxena:
Empowering Data Centers with Computational Storage Drive-Based Deep Learning Inference Functionality to Combat Ransomware. DSN-S 2024: 125-132 - [c70]Joseph Khoury, Christelle Nader, Morteza Safaei Pour, Elias Bou-Harb:
Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict. ICC Workshops 2024: 896-901 - [c69]Nasser Tieby, Joseph Khoury, Elias Bou-Harb:
Characterizing and Analyzing LEO Satellite Cyber Landscape: A Starlink Case Study. ICC 2024: 1352-1357 - [c68]Joseph Khoury, Dorde Klisura, Hadi Zanddizari, Gonzalo De La Torre Parra, Peyman Najafirad, Elias Bou-Harb:
Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks. SP 2024: 3644-3660 - [c67]Kurt Friday, Elias Bou-Harb:
Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification. CSET @ USENIX Security Symposium 2024: 8-16 - [i13]Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Gonzalo De La Torre Parra, Elias Bou-Harb, Peyman Najafirad:
LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward. CoRR abs/2401.03374 (2024) - [i12]Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Elias Bou-Harb, Peyman Najafirad:
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs. CoRR abs/2409.00571 (2024) - 2023
- [j49]Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Elias Bou-Harb, Chadi Assi:
A Security Assessment of HTTP/2 Usage in 5G Service-Based Architecture. IEEE Commun. Mag. 61(1): 48-54 (2023) - [j48]Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
P4Tune: Enabling Programmability in Non-Programmable Networks. IEEE Commun. Mag. 61(6): 132-138 (2023) - [j47]Morteza Safaei Pour, Christelle Nader, Kurt Friday, Elias Bou-Harb:
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. Comput. Secur. 128: 103123 (2023) - [j46]Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II. IEEE Trans. Netw. Serv. Manag. 20(2): 882-889 (2023) - [c66]Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno:
Federated Learning Approach for Distributed Ransomware Analysis. ACNS Workshops 2023: 621-641 - [c65]Martin Husák, Joseph Khoury, Ðorde Klisura, Elias Bou-Harb:
On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics. CCE 2023: 167-179 - [c64]Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad:
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph. EuroS&P 2023: 144-159 - [c63]Ricardo Misael Ayala Molina, Elias Bou-Harb, Sadegh Torabi, Chadi Assi:
RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics. ICC 2023: 1-6 - [c62]Ali AlSabeh, Kurt Friday, Jorge Crichigno, Elias Bou-Harb:
Effective DGA Family Classification Using a Hybrid Shallow and Deep Packet Inspection Technique on P4 Programmable Switches. ICC 2023: 3781-3786 - [c61]Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
P4CCI: P4-Based Online TCP Congestion Control Algorithm Identification for Traffic Separation. ICC 2023: 4007-4012 - [c60]Martin Husák, Shanchieh Jay Yang, Joseph Khoury, Dorde Klisura, Elias Bou-Harb:
Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges. ICDF2C (2) 2023: 132-151 - [c59]Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi:
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems. NDSS 2023 - [c58]Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour, Jorge Crichigno:
Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution. NOMS 2023: 1-6 - [c57]Veronica Rammouz, Joseph Khoury, Ðorde Klisura, Morteza Safaei Pour, Mostafa Safaei Pour, Claude Fachkha, Elias Bou-Harb:
Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations. WiMob 2023: 206-211 - [i11]Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegül Yayimli:
Ransomware Detection and Classification Strategies. CoRR abs/2304.04398 (2023) - [i10]Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad:
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph. CoRR abs/2304.11072 (2023) - [i9]Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour, Jorge Crichigno:
Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution. CoRR abs/2305.13287 (2023) - [i8]Farooq Shaikh, Elias Bou-Harb, Aldin Vehabovic, Jorge Crichigno, Aysegül Yayimli, Nasir Ghani:
IoT Threat Detection Testbed Using Generative Adversarial Networks. CoRR abs/2305.15191 (2023) - [i7]Aldin Vehabovic, Hadi Zanddizari, Farooq Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno:
Federated Learning Approach for Distributed Ransomware Analysis. CoRR abs/2306.14090 (2023) - [i6]Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, G. Javidi, A. Selcuk Uluagac, Mohamed Rahouti, Elias Bou-Harb, Morteza Safaei Pour:
Ransomware Detection Using Federated Learning with Imbalanced Datasets. CoRR abs/2311.07760 (2023) - 2022
- [b3]Jorge Crichigno, Elie F. Kfoury, Elias Bou-Harb, Nasir Ghani:
High-Speed Networks - A Tutorial. Springer 2022, ISBN 978-3-030-88840-4, pp. 1-462 - [b2]Nataliia Neshenko, Elias Bou-Harb, Borko Furht:
Smart Cities: Cyber Situational Awareness to Support Decision Making. Springer 2022, ISBN 978-3-031-18463-5, pp. 3-129 - [j45]Ali AlSabeh, Joseph Khoury, Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment. Comput. Networks 207: 108800 (2022) - [j44]Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi:
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems. Comput. Secur. 112: 102511 (2022) - [j43]Dayton Closser, Elias Bou-Harb:
A live digital forensics approach for quantum mechanical computers. Digit. Investig. 40(Supplement): 301341 (2022) - [j42]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. IEEE Trans. Dependable Secur. Comput. 19(1): 402-418 (2022) - [j41]Ricardo Misael Ayala Molina, Sadegh Torabi, Khaled Sarieddine, Elias Bou-Harb, Nizar Bouguila, Chadi Assi:
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities. IEEE Trans. Netw. Serv. Manag. 19(1): 19-36 (2022) - [j40]Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I. IEEE Trans. Netw. Serv. Manag. 19(4): 3988-3994 (2022) - [c56]Joseph Khoury, Morteza Safaei Pour, Elias Bou-Harb:
A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale. ARES 2022: 32:1-32:11 - [c55]Mirabelle Dib, Sadegh Torabi, Elias Bou-Harb, Nizar Bouguila, Chadi Assi:
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants. AsiaCCS 2022: 452-466 - [c54]Farooq Shaikh, Elias Bou-Harb, Aldin Vehabovic, Jorge Crichigno, Aysegül Yayimli, Nasir Ghani:
IoT Threat Detection Testbed Using Generative Adversarial Networks. BlackSeaCom 2022: 77-84 - [c53]Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegül Yayimli:
Ransomware Detection and Classification Strategies. BlackSeaCom 2022: 316-324 - [c52]Christelle Nader, Elias Bou-Harb:
An attentive interpretable approach for identifying and quantifying malware-infected internet-scale IoT bots behind a NAT. CF 2022: 279-286 - [c51]Kurt Friday, Elie F. Kfoury, Elias Bou-Harb, Jorge Crichigno:
INC: In-Network Classification of Botnet Propagation at Line Rate. ESORICS (1) 2022: 551-569 - [c50]Gonzalo De La Torre Parra, Luis Selvera, Joseph Khoury, Hector Irizarry, Elias Bou-Harb, Paul Rad:
Interpretable Federated Transformer Log Learning for Cloud Threat Forensics. NDSS 2022 - [c49]Morteza Safaei Pour, Joseph Khoury, Elias Bou-Harb:
HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts. NOMS 2022: 1-9 - [c48]Kurt Friday, Elias Bou-Harb, Jorge Crichigno:
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches. NSS 2022: 120-139 - 2021
- [j39]Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends. IEEE Access 9: 87094-87155 (2021) - [j38]Felix Anda, Edward Dixon, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Vec2UAge: Enhancing underage age estimation performance through facial embeddings. Digit. Investig. 36 Supplement: 301119 (2021) - [j37]Nataliia Neshenko, Elias Bou-Harb, Borko Furht:
A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs. Digit. Investig. 37 Supplement: 301198 (2021) - [j36]Sadegh Torabi, Mirabelle Dib, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships. IEEE Netw. Lett. 3(3): 161-165 (2021) - [j35]Mirabelle Dib, Sadegh Torabi, Elias Bou-Harb, Chadi Assi:
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution. IEEE Trans. Netw. Serv. Manag. 18(2): 1165-1177 (2021) - [c47]Morteza Safaei Pour, Dylan Watson, Elias Bou-Harb:
Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements. DSN 2021: 497-506 - [c46]Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb, Gautam Srivastava:
Dynamic Router's Buffer Sizing using Passive Measurements and P4 Programmable Switches. GLOBECOM 2021: 1-6 - [c45]Christelle Nader, Elias Bou-Harb:
Revisiting IoT Fingerprinting behind a NAT. ISPA/BDCloud/SocialCom/SustainCom 2021: 1745-1752 - [c44]Antonio Mangino, Elias Bou-Harb:
A Multidimensional Network Forensics Investigation of a State-Sanctioned Internet Outage. IWCMC 2021: 813-818 - [c43]Mohamed Nassar, Joseph Khoury, Abdelkarim Erradi, Elias Bou-Harb:
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems. NTMS 2021: 1-7 - [i5]Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends. CoRR abs/2102.00643 (2021) - 2020
- [b1]Elias Bou-Harb, Nataliia Neshenko:
Cyber Threat Intelligence for the Internet of Things. Springer 2020, ISBN 978-3-030-45857-7, pp. 1-89 - [j34]Elie F. Kfoury, Jose Gomez, Jorge Crichigno, Elias Bou-Harb:
An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband. Comput. Commun. 161: 212-224 (2020) - [j33]Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Sagar Samtani, Jorge Crichigno, Nasir Ghani:
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild. Comput. Secur. 91: 101707 (2020) - [j32]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. Digit. Investig. 32 Supplement: 300922 (2020) - [j31]Morteza Safaei Pour, Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities. IEEE Netw. Lett. 2(3): 159-163 (2020) - [j30]Nataliia Neshenko, Christelle Nader, Elias Bou-Harb, Borko Furht:
A survey of methods supporting cyber situational awareness in the context of smart cities. J. Big Data 7(1): 92 (2020) - [j29]Christian Miranda, Georges Kaddoum, Elias Bou-Harb, Sahil Garg, Kuljeet Kaur:
A Collaborative Security Framework for Software-Defined Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 15: 2602-2615 (2020) - [j28]Kuljeet Kaur, Sahil Garg, Georges Kaddoum, Elias Bou-Harb, Kim-Kwang Raymond Choo:
A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups. IEEE Trans. Ind. Informatics 16(4): 2687-2697 (2020) - [j27]Martin Husák, Tomás Bajtos, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda:
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Trans. Manag. Inf. Syst. 11(4): 19:1-19:16 (2020) - [j26]Antonio Mangino, Morteza Safaei Pour, Elias Bou-Harb:
Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective. ACM Trans. Manag. Inf. Syst. 11(4): 21:1-21:24 (2020) - [c42]Ali AlSabeh, Haïdar Safa, Elias Bou-Harb, Jorge Crichigno:
Exploiting Ransomware Paranoia For Execution Prevention. ICC 2020: 1-6 - [c41]Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
Offloading Media Traffic to Programmable Data Plane Switches. ICC 2020: 1-7 - [c40]Kurt Friday, Elie F. Kfoury, Elias Bou-Harb, Jorge Crichigno:
Towards a Unified In-Network DDoS Detection and Mitigation Strategy. NetSoft 2020: 218-226 - [c39]Jose Gomez, Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb, Gautam Srivastava:
A Performance Evaluation of TCP BBRv2 Alpha. TSP 2020: 309-312 - [c38]Ali AlSabeh, Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
Leveraging SONiC Functionalities in Disaggregated Network Switches. TSP 2020: 457-460 - [c37]Elie F. Kfoury, David J. Khoury, Ali AlSabeh, Jose Gomez, Jorge Crichigno, Elias Bou-Harb:
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI. TSP 2020: 461-465
2010 – 2019
- 2019
- [j25]Farooq Shaikh, Mohamed Rahouti, Nasir Ghani, Kaiqi Xiong, Elias Bou-Harb, Jamal Haque:
A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems. IEEE Access 7: 63164-63180 (2019) - [j24]Elie F. Kfoury, Jose Gomez, Jorge Crichigno, Elias Bou-Harb, David J. Khoury:
Decentralized Distribution of PCP Mappings Over Blockchain for End-to-End Secure Direct Communications. IEEE Access 7: 110159-110173 (2019) - [j23]Diogo Oliveira, Nasir Ghani, Majeed M. Hayat, Jorge Crichigno, Elias Bou-Harb:
SDN Testbed for Evaluation of Large Exo-Atmospheric EMP Attacks. IEEE Commun. Mag. 57(1): 88-97 (2019) - [j22]Morteza Safaei Pour, Elias Bou-Harb:
Theoretic derivations of scan detection operating on darknet traffic. Comput. Commun. 147: 111-121 (2019) - [j21]Martin Husák, Jana Komárková, Elias Bou-Harb, Pavel Celeda:
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Commun. Surv. Tutorials 21(1): 640-660 (2019) - [j20]Jorge Crichigno, Elias Bou-Harb, Nasir Ghani:
A Comprehensive Tutorial on Science DMZ. IEEE Commun. Surv. Tutorials 21(2): 2041-2078 (2019) - [j19]Nataliia Neshenko, Elias Bou-Harb, Jorge Crichigno, Georges Kaddoum, Nasir Ghani:
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Commun. Surv. Tutorials 21(3): 2702-2733 (2019) - [j18]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving the accuracy of automated facial age estimation to aid CSEM investigations. Digit. Investig. 28 Supplement: S142 (2019) - [j17]Morteza Safaei Pour, Elias Bou-Harb, Kavita Varma, Nataliia Neshenko, Dimitris A. Pados, Kim-Kwang Raymond Choo:
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns. Digit. Investig. 28 Supplement: S40-S49 (2019) - [j16]Elias Bou-Harb, Martin Husák, Mourad Debbabi, Chadi Assi:
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Trans. Big Data 5(4): 439-453 (2019) - [c36]Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled B. Shaban, Abdelkarim Erradi:
Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild. ARES 2019: 6:1-6:10 - [c35]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. ARES 2019: 57:1-57:8 - [c34]Jorge Crichigno, Elie F. Kfoury, Elias Bou-Harb, Nasir Ghani, Yasmany Prieto, Christian Vega Caicedo, Jorge E. Pezoa, C. Huang, David Torres:
A Flow-Based Entropy Characterization of a NATed Network and Its Application on Intrusion Detection. ICC 2019: 1-7 - [c33]Diogo Oliveira, Mahsa Pourvali, Jorge Crichigno, Elias Bou-Harb, Mohamed Rahouti, Nasir Ghani:
An Efficient Multi-Objective Resiliency Scheme for Routing of Virtual Functions in Failure Scenarios. SDS 2019: 123-129 - [c32]Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb, David J. Khoury, Gautam Srivastava:
Enabling TCP Pacing using Programmable Data Plane Switches. TSP 2019: 273-277 - [c31]David J. Khoury, Elie F. Kfoury, Joseph Ged, Jorge Crichigno, Elias Bou-Harb:
Method for Securing and Terminating a CS Call over a VoIP System with Multi-Device Support. TSP 2019: 318-322 - [i4]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. CoRR abs/1907.01427 (2019) - 2018
- [j15]Farooq Shaikh, Elias Bou-Harb, Nataliia Neshenko, Andrea P. Wright, Nasir Ghani:
Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices. IEEE Commun. Mag. 56(9): 170-177 (2018) - [j14]Elias Bou-Harb, Nasir Ghani, Abdelkarim Erradi, Khaled Bashir Shaban:
Passive inference of attacks on CPS communication protocols. J. Inf. Secur. Appl. 43: 110-122 (2018) - [j13]Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
CSC-Detector: A System to Infer Large-Scale Probing Campaigns. IEEE Trans. Dependable Secur. Comput. 15(3): 364-377 (2018) - [c30]Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda:
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. ARES 2018: 29:1-29:6 - [c29]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi:
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. DSN 2018: 562-573 - [c28]Nataliia Neshenko, Martin Husák, Elias Bou-Harb, Pavel Celeda, Sameera Al-Mulla, Claude Fachkha:
Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations. GLOBECOM Workshops 2018: 1-7 - [c27]Christian Miranda Moreira, Georges Kaddoum, Elias Bou-Harb:
Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets. ICC 2018: 1-7 - [c26]Morteza Safaei Pour, Elias Bou-Harb:
Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation. ICC 2018: 1-7 - [c25]Charles Wheelus, Elias Bou-Harb, Xingquan Zhu:
Tackling Class Imbalance in Cyber Security Datasets. IRI 2018: 229-232 - [c24]Fatima Ezzahra Ouerfelli, Khaled Barbaria, Elias Bou-Harb, Claude Fachkha, Belhassen Zouari:
On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach. IWCMC 2018: 518-523 - [c23]Long Kong, Georges Kaddoum, Daniel Benevides da Costa, Elias Bou-Harb:
On Secrecy Bounds of MIMO Wiretap Channels with ZF detectors. IWCMC 2018: 724-729 - [c22]Farooq Shaikh, Elias Bou-Harb, Jorge Crichigno, Nasir Ghani:
A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes. IWCMC 2018: 938-943 - [c21]Jorge Crichigno, Zoltan Csibi, Elias Bou-Harb, Nasir Ghani:
Impact of Segment Size and Parallel Streams on TCP BBR. TSP 2018: 1-5 - [p1]Elias Bou-Harb, Claude Fachkha:
On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns. Computer and Network Security Essentials 2018: 461-474 - [i3]Christian Miranda, Georges Kaddoum, Elias Bou-Harb:
Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets. CoRR abs/1802.01719 (2018) - 2017
- [j12]Elias Bou-Harb, Walter Lucia, Nicola Forti, Sean Weerakkody, Nasir Ghani, Bruno Sinopoli:
Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence. IEEE Commun. Mag. 55(5): 198-204 (2017) - [j11]Elias Bou-Harb, Mark Scanlon:
Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections. Digit. Investig. 20 Supplement: S47-S55 (2017) - [j10]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns. IEEE Netw. 31(1): 18-26 (2017) - [c20]Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda:
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. ARES 2017: 22:1-22:10 - [c19]Adil Atifi, Elias Bou-Harb:
On correlating network traffic for cyber threat intelligence: A Bloom filter approach. IWCMC 2017: 384-389 - [c18]Elias Bou-Harb, Evangelos I. Kaisar, Mark Austin:
On the impact of empirical attack models targeting marine transportation. MT-ITS 2017: 200-205 - [c17]Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir D. Memon, Mustaque Ahamad:
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis. NDSS 2017 - [c16]Mario Galluscio, Nataliia Neshenko, Elias Bou-Harb, Yongliang Huang, Nasir Ghani, Jorge Crichigno, Georges Kaddoum:
A first empirical look on internet-scale exploitations of IoT devices. PIMRC 2017: 1-7 - 2016
- [j9]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities. Comput. Networks 94: 327-343 (2016) - [c15]Elias Bou-Harb:
Passive inference of attacks on SCADA communication protocols. ICC 2016: 1-6 - [c14]Elias Bou-Harb:
A probabilistic model to preprocess darknet data for cyber threat intelligence generation. ICC 2016: 1-6 - [c13]Elias Bou-Harb:
A Brief Survey of Security Approaches for Cyber-Physical Systems. NTMS 2016: 1-5 - [c12]Elias Bou-Harb, Mark Scanlon, Claude Fachkha:
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections. NTMS 2016: 1-5 - [c11]Charles Wheelus, Elias Bou-Harb, Xingquan Zhu:
Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence. NTMS 2016: 1-5 - [c10]Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb, Mark Scanlon:
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit. NTMS 2016: 1-5 - [i2]Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb, Mark Scanlon:
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit. CoRR abs/1610.05462 (2016) - 2015
- [j8]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Inferring distributed reflection denial of service attacks from darknet. Comput. Commun. 62: 59-71 (2015) - [j7]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
On the inference and prediction of DDoS campaigns. Wirel. Commun. Mob. Comput. 15(6): 1066-1078 (2015) - [c9]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic. ARES 2015: 180-185 - 2014
- [j6]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
On fingerprinting probing activities. Comput. Secur. 43: 35-48 (2014) - [j5]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
Cyber Scanning: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 16(3): 1496-1519 (2014) - [j4]Elias Bou-Harb, Nour-Eddine Lakhdari, Hamad Binsalleeh, Mourad Debbabi:
Multidimensional investigation of source port 0 probing. Digit. Investig. 11(Supplement 2): S114-S123 (2014) - [c8]Elias Bou-Harb, Claude Fachkha, Mourad Debbabi, Chadi Assi:
Inferring internet-scale infections by correlating malware and probing activities. ICC 2014: 640-646 - [c7]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
Behavioral analytics for inferring large-scale orchestrated probing events. INFOCOM Workshops 2014: 506-511 - [c6]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Fingerprinting Internet DNS Amplification DDoS Activities. NTMS 2014: 1-5 - 2013
- [j3]Elias Bou-Harb, Claude Fachkha, Makan Pourzandi, Mourad Debbabi, Chadi Assi:
Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1): 42-49 (2013) - [j2]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A systematic approach for detecting and clustering distributed cyber scanning. Comput. Networks 57(18): 3826-3839 (2013) - [j1]Elias Bou-Harb, Makan Pourzandi, Mourad Debbabi, Chadi Assi:
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Secur. Commun. Networks 6(12): 1478-1489 (2013) - [c5]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A Statistical Approach for Fingerprinting Probing Activities. ARES 2013: 21-30 - [c4]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
On detecting and clustering distributed cyber scanning. IWCMC 2013: 926-933 - [c3]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Towards a Forecasting Model for Distributed Denial of Service Activities. NCA 2013: 110-117 - [i1]Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Fingerprinting Internet DNS Amplification DDoS Activities. CoRR abs/1310.4216 (2013) - 2012
- [c2]Claude Fachkha, Elias Bou-Harb, Amine Boukhtouta, Son Dinh, Farkhund Iqbal, Mourad Debbabi:
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation. CRiSIS 2012: 1-8 - [c1]Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks. ICC 2012: 982-987
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint