Detection of online fake news using n-gram analysis and machine learning techniques H Ahmed, I Traore, S Saad Intelligent, Secure, and Dependable Systems in Distributed and Cloud …, 2017 | 731 | 2017 |
Detecting opinion spams and fake news using text classification H Ahmed, I Traore, S Saad Security and Privacy 1 (1), e9, 2018 | 486 | 2018 |
Botnet detection based on traffic behavior analysis and flow intervals D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant computers & security 39, 2-16, 2013 | 463 | 2013 |
Detecting P2P botnets through network behavior analysis and machine learning S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian 2011 Ninth annual international conference on privacy, security and trust …, 2011 | 406 | 2011 |
Authorship verification for short messages using stylometry ML Brocardo, I Traore, S Saad, I Woungang 2013 International Conference on Computer, Information and Telecommunication …, 2013 | 176 | 2013 |
Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning S Krishnamoorthy, L Rueda, S Saad, H Elmiligi Proceedings of the 2018 2nd international conference on biometric …, 2018 | 89 | 2018 |
Peer to peer botnet detection based on flow intervals D Zhao, I Traore, A Ghorbani, B Sayed, S Saad, W Lu Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 87 | 2012 |
Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets N Moustafa, M Ahmed, S Saad 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 60 | 2020 |
Ensuring online exam integrity through continuous biometric authentication I Traoré, Y Nakkabi, S Saad, B Sayed, JD Ardigo, PM de Faria Quinan Information security practices: Emerging threats and perspectives, 73-81, 2017 | 57 | 2017 |
The curious case of machine learning in malware detection S Saad, W Briguglio, H Elmiligi arXiv preprint arXiv:1905.07573, 2019 | 53 | 2019 |
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring B Jethva, I Traoré, A Ghaleb, K Ganame, S Saad Journal of Computer Security 28 (3), 337-373, 2020 | 42 | 2020 |
Method ontology for intelligent network forensics analysis S Saad, I Traore 2010 Eighth International Conference on Privacy, Security and Trust, 7-14, 2010 | 38 | 2010 |
Spam review detection using self-organizing maps and convolutional neural networks A Neisari, L Rueda, S Saad Computers & security 106, 102274, 2021 | 31 | 2021 |
Verifying online user identity using stylometric analysis for short messages ML Brocardo, I Traore, S Saad, I Woungang Journal of networks 9 (12), 3347, 2014 | 31 | 2014 |
Extracting attack scenarios using intrusion semantics S Saad, I Traore Foundations and Practice of Security: 5th International Symposium, FPS 2012 …, 2013 | 26 | 2013 |
Detecting opinion spams and fake news using text classification. Security and Privacy, 1 (1), e9 H Ahmed, I Traore, S Saad | 18 | 2018 |
Semantic aware attack scenarios reconstruction S Saad, I Traore Journal of Information Security and Applications 18 (1), 53-67, 2013 | 17 | 2013 |
Information security practices I Traoré, Y Nakkabi, S Saad, B Sayed, JD Ardigo, PM De Faria Quinan Cham: Springer International Publishing, 11, 2017 | 15 | 2017 |
Preserving privacy through dememorization: An unlearning technique for mitigating memorization risks in language models A Kassem, O Mahmoud, S Saad Proceedings of the 2023 Conference on Empirical Methods in Natural Language …, 2023 | 14 | 2023 |
Jsless: A tale of a fileless javascript memory-resident malware S Saad, F Mahmood, W Briguglio, H Elmiligi Information Security Practice and Experience: 15th International Conference …, 2019 | 13 | 2019 |