Saed Alrabaee
Saed Alrabaee
Associate Professor, Information Systems and Security, UAEU
Verified email at - Homepage
Cited by
Cited by
Oba2: An onion approach to binary code authorship attribution
S Alrabaee, N Saleem, S Preda, L Wang, M Debbabi
Digital Investigation 11, S94-S103, 2014
Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code
S Alrabaee, P Shirani, L Wang, M Debbabi
Digital Investigation 12, S61-S71, 2015
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
S Alrabaee, P Shirani, L Wang, M Debbabi
ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-34, 2018
On the feasibility of malware authorship attribution
S Alrabaee, P Shirani, M Debbabi, L Wang
Foundations and Practice of Security: 9th International Symposium, FPS 2016 …, 2017
The role of national cybersecurity strategies on the improvement of cybersecurity education
S AlDaajeh, H Saleous, S Alrabaee, E Barka, F Breitinger, KKR Choo
Computers & Security 119, 102754, 2022
Bincomp: A stratified approach to compiler provenance attribution
A Rahimian, P Shirani, S Alrbaee, L Wang, M Debbabi
Digital Investigation 14, S146-S155, 2015
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
S Alrabaee, L Wang, M Debbabi
Digital Investigation 18, S11-S22, 2016
Network traffic classification: Techniques, datasets, and challenges
A Azab, M Khasawneh, S Alrabaee, KKR Choo, M Sarsour
Digital Communications and Networks, 2022
Dysign: dynamic fingerprinting for the automatic detection of android malware
EMB Karbab, M Debbabi, S Alrabaee, D Mouheb
2016 11th International Conference on Malicious and Unwanted Software …, 2016
Reinforcing the edge: Autonomous energy management for mobile device clouds
V Balasubramanian, F Zaman, M Aloqaily, S Alrabaee, M Gorlatova, ...
IEEE INFOCOM 2019-IEEE conference on computer communications workshops …, 2019
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities
H Saleous, M Ismail, SH AlDaajeh, N Madathil, S Alrabaee, KKR Choo, ...
Digital communications and networks 9 (1), 211-222, 2023
TD‐PSO: task distribution approach based on particle swarm optimization for vehicular ad hoc network
M Bany Taha, C Talhi, H Ould‐Slimane, S Alrabaee
Transactions on Emerging Telecommunications Technologies 33 (3), e3860, 2022
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning
S Alrabaee, EMB Karbab, L Wang, M Debbabi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
On leveraging coding habits for effective binary authorship attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features
S Alrabaee, M Debbabi, L Wang
ACM Computing Surveys (CSUR) 55 (1), 1-41, 2022
On the feasibility of binary authorship characterization
S Alrabaee, M Debbabi, L Wang
Digital Investigation 28, S3-S11, 2019
Game theory for security in cognitive radio networks
S Alrabaee, A Agarwal, D Anand, M Khasawneh
2012 International Conference on Advances in Mobile Network, Communication …, 2012
Discovering public wi-fi vulnerabilities using raspberry pi and kali linux
E Al Neyadi, S Al Shehhi, A Al Shehhi, N Al Hashimi, QH Mohammad, ...
2020 12th Annual Undergraduate Research Conference on Applied Computing (URC …, 2020
Sureness efficient energy technique for cooperative spectrum sensing in cognitive radios
M Khasawneh, A Agarwal, N Goel, M Zaman, S Alrabaee
2012 International conference on telecommunications and multimedia (TEMU), 25-30, 2012
Security vulnerabilities detected in medical devices
A Alsuwaidi, A Hassan, F Alkhatri, H Ali, QH Mohammad, S Alrabaee
2020 12th Annual Undergraduate Research Conference on Applied Computing (URC …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20