Internet of things: a definition & taxonomy B Dorsemaine, JP Gaulier, JP Wary, N Kheir, P Urien 2015 9th International Conference on Next Generation Mobile Applications …, 2015 | 394 | 2015 |
A service dependency model for cost-sensitive intrusion response N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 164 | 2010 |
Phisheye: Live monitoring of sandboxed phishing kits X Han, N Kheir, D Balzarotti Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 143 | 2016 |
Deception techniques in computer security: A research perspective X Han, N Kheir, D Balzarotti ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018 | 101 | 2018 |
BlindIDS: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic S Canard, A Diop, N Kheir, M Paindavoine, M Sabt Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 75 | 2017 |
Cost evaluation for intrusion response using dependency graphs N Kheir, H Debar, N Cuppens-Boulahia, F Cuppens, J Viinikka 2009 international conference on network and service security, 1-6, 2009 | 66 | 2009 |
Evaluation of deception-based web attacks detection X Han, N Kheir, D Balzarotti Proceedings of the 2017 Workshop on Moving Target Defense, 65-73, 2017 | 47 | 2017 |
A new approach to investigate IoT threats based on a four layer model B Dorsemaine, JP Gaulier, JP Wary, N Kheir, P Urien 2016 13th international conference on new technologies for distributed …, 2016 | 46 | 2016 |
Mentor: positive DNS reputation to skim-off benign domains in botnet C&C blacklists N Kheir, F Tran, P Caron, N Deschamps ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 39 | 2014 |
Botsuer: Suing stealthy p2p bots in network traffic through netflow analysis N Kheir, C Wolley Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013 | 33 | 2013 |
Behavioral classification and detection of malware through http user agent anomalies N Kheir Journal of Information Security and Applications 18 (1), 2-13, 2013 | 27 | 2013 |
Response Policies and Counter-measure: Management of Service Dependencies and Intrusion and Reaction Impacts N Kheir | 26 | 2010 |
Analyzing http user agent anomalies for malware detection N Kheir International Workshop on Data Privacy Management, 187-200, 2012 | 25 | 2012 |
Towards a 5G security architecture: Articulating software-defined security and security as a service G Blanc, N Kheir, D Ayed, V Lefebvre, EM de Oca, P Bisson Proceedings of the 13th International Conference on Availability …, 2018 | 24 | 2018 |
Automated classification of C&C connections through malware URL clustering N Kheir, G Blanc, H Debar, J Garcia-Alfaro, D Yang ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 21 | 2015 |
The role of cloud services in malicious software: Trends and insights X Han, N Kheir, D Balzarotti Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015 | 20 | 2015 |
Strategies for network resilience: Capitalising on policies P Smith, A Schaeffer-Filho, A Ali, M Schöller, N Kheir, A Mauthe, ... Mechanisms for Autonomous Management of Networks and Services: 4th …, 2010 | 19 | 2010 |
A grey-box approach for detecting malicious user interactions in web applications W Ben Jaballah, N Kheir Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016 | 16 | 2016 |
A new threat assessment method for integrating an IoT infrastructure in an information system B Dorsemaine, JP Gaulier, JP Wary, N Kheir, P Urien 2017 IEEE 37th international conference on distributed computing systems …, 2017 | 15 | 2017 |
A new risk assessment framework using graph theory for complex ICT systems MY Naghmouchi, N Perrot, N Kheir, AR Mahjoub, JP Wary Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016 | 13 | 2016 |