MiniSec: a secure sensor network communication architecture M Luk, G Mezzour, A Perrig, V Gligor Proceedings of the 6th international conference on Information processing in …, 2007 | 539 | 2007 |
Certificate revocation list distribution in vehicular communication systems P Papadimitratos, G Mezzour, JP Hubaux Proceedings of the fifth ACM international workshop on VehiculAr Inter …, 2008 | 192 | 2008 |
Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time H Hammouchi, O Cherqi, G Mezzour, M Ghogho, M El Koutbi Procedia Computer Science 151, 1004-1009, 2019 | 88 | 2019 |
Method for sending and receiving an evaluation of reputation in a social network SY Chiou, SY Chang, G Mezzour, A Perrig, HM Sun US Patent 8,312,276, 2012 | 81 | 2012 |
Privacy-preserving relationship path discovery in social networks G Mezzour, A Perrig, V Gligor, P Papadimitratos Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009 | 77 | 2009 |
Building a soft skill taxonomy from job openings I Khaouja, G Mezzour, KM Carley, I Kassou Social Network Analysis and Mining 9, 1-19, 2019 | 51 | 2019 |
A data-driven characterization of modern Android spyware F Pierazzi, G Mezzour, Q Han, M Colajanni, VS Subrahmanian ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-38, 2020 | 37 | 2020 |
Analysis of hacking related trade in the darkweb O Cherqi, G Mezzour, M Ghogho, M El Koutbi 2018 IEEE international conference on intelligence and security informatics …, 2018 | 27 | 2018 |
An empirical study of wifi security and performance in morocco-wardriving in rabat A Sebbar, SE Boulahya, G Mezzour, M Boulmalf 2016 International Conference on Electrical and Information Technologies …, 2016 | 27 | 2016 |
: Predictive Behavioral Analysis of Recent Android Banking Trojans C Bai, Q Han, G Mezzour, F Pierazzi, VS Subrahmanian IEEE Transactions on Dependable and Secure Computing 18 (3), 1378-1393, 2019 | 24 | 2019 |
An empirical study of global malware encounters G Mezzour, KM Carley, LR Carley Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-11, 2015 | 24 | 2015 |
Analyzing the needs of the offshore sector in Morocco by mining job ads I Khaouja, I Rahhal, M Elouali, G Mezzour, I Kassou, KM Carley 2018 IEEE Global Engineering Education Conference (EDUCON), 1380-1388, 2018 | 18 | 2018 |
Analyzing cybersecurity job market needs in Morocco by mining job ads I Rahhal, I Makdoun, G Mezzour, I Khaouja, K Carley, I Kassou 2019 IEEE global engineering education conference (EDUCON), 535-543, 2019 | 14 | 2019 |
Analyzing the needs of the automotive job market in Morocco I Makdoun, G Mezzour, KM Carley, I Kassou 2018 13th International Conference on Computer Science & Education (ICCSE), 1-6, 2018 | 14 | 2018 |
Longitudinal analysis of a large corpus of cyber threat descriptions G Mezzour, LR Carley, KM Carley Journal of Computer Virology and Hacking Techniques 12 (1), 11-22, 2016 | 14 | 2016 |
Exploratory data analysis of a network telescope traffic and prediction of port probing rates M Zakroum, A Houmz, M Ghogho, G Mezzour, A Lahmadi, J François, ... 2018 IEEE International Conference on Intelligence and Security Informatics …, 2018 | 12 | 2018 |
Detecting the impact of software vulnerability on attacks: A case study of network telescope scans A Houmz, G Mezzour, K Zkik, M Ghogho, H Benbrahim Journal of Network and Computer Applications 195, 103230, 2021 | 10 | 2021 |
Assessing the Global Cyber and Biological Threat. G Mezzour Carnegie Mellon University, USA, 2015 | 9 | 2015 |
Global variation in attack encounters and hosting G Mezzour, KM Carley, LR Carley Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017 | 8 | 2017 |
A socio-computational approach to predicting bioweapon proliferation G Mezzour, W Frankenstein, KM Carley, LR Carley IEEE Transactions on Computational Social Systems 5 (2), 458-467, 2018 | 7 | 2018 |