Follow
Saed Alrabaee
Saed Alrabaee
Associate Professor, Information Systems and Security, UAEU
Verified email at uaeu.ac.ae - Homepage
Title
Cited by
Cited by
Year
The role of national cybersecurity strategies on the improvement of cybersecurity education
S AlDaajeh, H Saleous, S Alrabaee, E Barka, F Breitinger, KKR Choo
Computers & Security 119, 102754, 2022
1142022
Oba2: An onion approach to binary code authorship attribution
S Alrabaee, N Saleem, S Preda, L Wang, M Debbabi
Digital Investigation 11, S94-S103, 2014
1052014
Network traffic classification: Techniques, datasets, and challenges
A Azab, M Khasawneh, S Alrabaee, KKR Choo, M Sarsour
Digital Communications and Networks 10 (3), 676-692, 2024
882024
Sigma: A semantic integrated graph matching approach for identifying reused functions in binary code
S Alrabaee, P Shirani, L Wang, M Debbabi
Digital Investigation 12, S61-S71, 2015
882015
FOSSIL A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
S Alrabaee, P Shirani, L Wang, M Debbabi
ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-34, 2018
782018
On the feasibility of malware authorship attribution
S Alrabaee, P Shirani, M Debbabi, L Wang
Foundations and Practice of Security: 9th International Symposium, FPS 2016 …, 2017
722017
Bincomp: A stratified approach to compiler provenance attribution
A Rahimian, P Shirani, S Alrbaee, L Wang, M Debbabi
Digital Investigation 14, S146-S155, 2015
672015
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
S Alrabaee, L Wang, M Debbabi
Digital Investigation 18, S11-S22, 2016
572016
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities
H Saleous, M Ismail, SH AlDaajeh, N Madathil, S Alrabaee, KKR Choo, ...
Digital communications and networks 9 (1), 211-222, 2023
522023
Dysign: dynamic fingerprinting for the automatic detection of android malware
EMB Karbab, M Debbabi, S Alrabaee, D Mouheb
2016 11th International Conference on Malicious and Unwanted Software …, 2016
402016
Reinforcing the edge: Autonomous energy management for mobile device clouds
V Balasubramanian, F Zaman, M Aloqaily, S Alrabaee, M Gorlatova, ...
IEEE INFOCOM 2019-IEEE conference on computer communications workshops …, 2019
352019
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning
S Alrabaee, EMB Karbab, L Wang, M Debbabi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
292019
A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features
S Alrabaee, M Debbabi, L Wang
ACM Computing Surveys (CSUR) 55 (1), 1-41, 2022
282022
On the feasibility of binary authorship characterization
S Alrabaee, M Debbabi, L Wang
Digital Investigation 28, S3-S11, 2019
282019
DroidDetectMW: a hybrid intelligent model for android malware detection
F Taher, O AlFandi, M Al-kfairy, H Al Hamadi, S Alrabaee
Applied Sciences 13 (13), 7720, 2023
272023
On leveraging coding habits for effective binary authorship attribution
S Alrabaee, P Shirani, L Wang, M Debbabi, A Hanna
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
252018
Convergence of IoT and cognitive radio networks: A survey of applications, techniques, and challenges
M Khasawneh, A Azab, S Alrabaee, H Sakkal, HH Bakhit
IEEE Access 11, 71097-71112, 2023
242023
TD‐PSO: task distribution approach based on particle swarm optimization for vehicular ad hoc network
M Bany Taha, C Talhi, H Ould‐Slimane, S Alrabaee
Transactions on Emerging Telecommunications Technologies 33 (3), e3860, 2022
242022
Discovering public Wi-Fi vulnerabilities using raspberry pi and Kali Linux
E Al Neyadi, S Al Shehhi, A Al Shehhi, N Al Hashimi, QH Mohammad, ...
2020 12th Annual Undergraduate Research Conference on Applied Computing (URC …, 2020
242020
Game theory for security in cognitive radio networks
S Alrabaee, A Agarwal, D Anand, M Khasawneh
2012 International Conference on Advances in Mobile Network, Communication …, 2012
222012
The system can't perform the operation now. Try again later.
Articles 1–20