关注
Sherif Saad
Sherif Saad
School of Computer Science, University of Windsor, Canada
在 uwindsor.ca 的电子邮件经过验证
标题
引用次数
引用次数
年份
Detection of online fake news using n-gram analysis and machine learning techniques
H Ahmed, I Traore, S Saad
Intelligent, Secure, and Dependable Systems in Distributed and Cloud …, 2017
7312017
Detecting opinion spams and fake news using text classification
H Ahmed, I Traore, S Saad
Security and Privacy 1 (1), e9, 2018
4862018
Botnet detection based on traffic behavior analysis and flow intervals
D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant
computers & security 39, 2-16, 2013
4632013
Detecting P2P botnets through network behavior analysis and machine learning
S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian
2011 Ninth annual international conference on privacy, security and trust …, 2011
4062011
Authorship verification for short messages using stylometry
ML Brocardo, I Traore, S Saad, I Woungang
2013 International Conference on Computer, Information and Telecommunication …, 2013
1762013
Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning
S Krishnamoorthy, L Rueda, S Saad, H Elmiligi
Proceedings of the 2018 2nd international conference on biometric …, 2018
892018
Peer to peer botnet detection based on flow intervals
D Zhao, I Traore, A Ghorbani, B Sayed, S Saad, W Lu
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
872012
Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets
N Moustafa, M Ahmed, S Saad
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
602020
Ensuring online exam integrity through continuous biometric authentication
I Traoré, Y Nakkabi, S Saad, B Sayed, JD Ardigo, PM de Faria Quinan
Information security practices: Emerging threats and perspectives, 73-81, 2017
572017
The curious case of machine learning in malware detection
S Saad, W Briguglio, H Elmiligi
arXiv preprint arXiv:1905.07573, 2019
532019
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring
B Jethva, I Traoré, A Ghaleb, K Ganame, S Saad
Journal of Computer Security 28 (3), 337-373, 2020
422020
Method ontology for intelligent network forensics analysis
S Saad, I Traore
2010 Eighth International Conference on Privacy, Security and Trust, 7-14, 2010
382010
Spam review detection using self-organizing maps and convolutional neural networks
A Neisari, L Rueda, S Saad
Computers & security 106, 102274, 2021
312021
Verifying online user identity using stylometric analysis for short messages
ML Brocardo, I Traore, S Saad, I Woungang
Journal of networks 9 (12), 3347, 2014
312014
Extracting attack scenarios using intrusion semantics
S Saad, I Traore
Foundations and Practice of Security: 5th International Symposium, FPS 2012 …, 2013
262013
Detecting opinion spams and fake news using text classification. Security and Privacy, 1 (1), e9
H Ahmed, I Traore, S Saad
182018
Semantic aware attack scenarios reconstruction
S Saad, I Traore
Journal of Information Security and Applications 18 (1), 53-67, 2013
172013
Information security practices
I Traoré, Y Nakkabi, S Saad, B Sayed, JD Ardigo, PM De Faria Quinan
Cham: Springer International Publishing, 11, 2017
152017
Preserving privacy through dememorization: An unlearning technique for mitigating memorization risks in language models
A Kassem, O Mahmoud, S Saad
Proceedings of the 2023 Conference on Empirical Methods in Natural Language …, 2023
142023
Jsless: A tale of a fileless javascript memory-resident malware
S Saad, F Mahmood, W Briguglio, H Elmiligi
Information Security Practice and Experience: 15th International Conference …, 2019
132019
系统目前无法执行此操作,请稍后再试。
文章 1–20