Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems S Torabi, A Boukhtouta, C Assi, M Debbabi IEEE Communications Surveys and Tutorials 20 (4), 3389-3415, 2018 | 69 | 2018 |
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution M Dib, S Torabi, E Bou-Harb, C Assi IEEE Transactions on Network and Service Management (DOI: 10.1109/TNSM.2021 …, 2021 | 57 | 2021 |
Power Jacking Your Station: In-Depth Security Analysis of Electric Vehicle Charging Station Management Systems T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi Computers & Security 112, 102511 (DOI: 10.1016/j.cose.2021.102511), 2021 | 54 | 2021 |
Inferring, Characterizing, and Investigating Internet-scale Malicious IoT Device Activities: A Network Telescope Perspective S Torabi, E Bou-Harb, C Assi, M Galluscio, A Boukhtouta, M Debbabi 48th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2018 | 51 | 2018 |
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting A Large Network Telescope S Torabi, E Bou-Harb, C Assi, EB Karbab, A Boukhtouta, M Debbabi IEEE Transactions on Dependable and Secure Computing (DOI: 10.1109/TDSC.2020 …, 2020 | 43 | 2020 |
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities RMA Molina, S Torabi, K Sarieddine, E Bou-Harb, N Bouguila, C Assi IEEE Transactions on Network and Service Management (DOI: 10.1109/TNSM.2021 …, 2021 | 34 | 2021 |
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships S Torabi, M Dib, E Bou-Harb, C Assi, M Debbabi IEEE Networking Letters 3 (3), 161-165, 2021 | 30 | 2021 |
Privacy Aspects of Health Related Information Sharing in Online Social Networks. S Torabi, K Beznosov USENIX Workshop on Health Information Technologies (HealthTech '13), 2013 | 23 | 2013 |
Investigating the security of ev charging mobile applications as an attack surface K Sarieddine, MA Sayed, S Torabi, R Atallah, C Assi ACM Transactions on Cyber-Physical Systems 7 (4), 1-28, 2023 | 16 | 2023 |
Social Network Analysis of Kuwait Publicly-Held Corporations K Mahdi, A Almajid, M Safar, H Riquelme, S Torabi Procedia Computer Science 10, 272-281, 2012 | 15 | 2012 |
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants M Dib, S Torabi, E Bou-Harb, N Bouguila, C Assi Proceedings of the 2022 ACM Asia Conference on Computer and Communications …, 2022 | 14 | 2022 |
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities S Torabi, E Bou-Harb, C Assi, M Debbabi Forensic Science International: Digital Investigation (https://doi.org/10 …, 2020 | 14 | 2020 |
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users S Torabi, K Beznosov Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 14 | 2016 |
Network robustness and irreversibility of information diffusion in complex networks M Safar, K Mahdi, S Torabi Journal of Computational Science 2 (3), 198-206, 2011 | 13 | 2011 |
A model of diffusion parameter characterizing social networks K Mahdi, M Safar, S Torabi IADIS international conference e-society, 363-370, 2009 | 12 | 2009 |
Stochastic modeling, analysis and investigation of iot-generated internet scanning activities MS Pour, S Torabi, E Bou-Harb, C Assi, M Debbabi IEEE Networking Letters 2 (3), 159-163, 2020 | 10 | 2020 |
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi The Network and Distributed System Security (NDSS) Symposium, 2023. San …, 2023 | 9 | 2023 |
Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations K Sarieddine, MA Sayed, S Torabi, R Atallah, C Assi International Journal of Electrical Power & Energy Systems 156, 109735, 2024 | 8 | 2024 |
Diffusion and reverse diffusion processes in social networks: Analysis using the degree of Diffusion α K Mahdi, S Torabi, M Safar 2010 3rd IEEE International Conference on Ubi-Media Computing, 124-131, 2010 | 6 | 2010 |
RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics RMA Molina, E Bou-Harb, K Sarieddine, S Torabi, C Assi IEEE International Conference on Communications (ICC2023), 1--6, 2023 | 5 | 2023 |