Sherif Saad
Title
Cited by
Cited by
Year
Botnet detection based on traffic behavior analysis and flow intervals
D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant
computers & security 39, 2-16, 2013
2712013
Detecting P2P botnets through network behavior analysis and machine learning
S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian
2011 Ninth annual international conference on privacy, security and trust …, 2011
2402011
Authorship verification for short messages using stylometry
ML Brocardo, I Traore, S Saad, I Woungang
2013 International Conference on Computer, Information and Telecommunication …, 2013
922013
Detection of online fake news using n-gram analysis and machine learning techniques
H Ahmed, I Traore, S Saad
International conference on intelligent, secure, and dependable systems in …, 2017
752017
Peer to peer botnet detection based on flow intervals
D Zhao, I Traore, A Ghorbani, B Sayed, S Saad, W Lu
IFIP International Information Security Conference, 87-102, 2012
672012
Detecting opinion spams and fake news using text classification
H Ahmed, I Traore, S Saad
Security and Privacy 1 (1), e9, 2018
332018
Method ontology for intelligent network forensics analysis
S Saad, I Traore
2010 Eighth International Conference on Privacy, Security and Trust, 7-14, 2010
292010
Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning
S Krishnamoorthy, L Rueda, S Saad, H Elmiligi
Proceedings of the 2018 2nd International Conference on Biometric …, 2018
202018
Extracting attack scenarios using intrusion semantics
S Saad, I Traore
International Symposium on Foundations and Practice of Security, 278-292, 2012
122012
Ensuring online exam integrity through continuous biometric authentication
I Traoré, Y Nakkabi, S Saad, B Sayed, JD Ardigo, PM de Faria Quinan
Information Security Practices, 73-81, 2017
112017
Semantic aware attack scenarios reconstruction
S Saad, I Traore
Journal of Information Security and Applications 18 (1), 53-67, 2013
112013
Verifying online user identity using stylometric analysis for short messages
ML Brocardo, I Traore, S Saad, I Woungang
Journal of networks 9 (12), 3347, 2014
92014
A semantic analysis approach to manage IDS alerts flooding
S Saad, I Traore
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
72011
The Curious Case of Machine Learning In Malware Detection
S Saad, W Briguglio, H Elmiligi
52019
Identifying vulnerabilities and attacking capabilities against pseudonym changing schemes in VANET
I Saini, S Saad, A Jaekel
International Conference on Intelligent, Secure, and Dependable Systems in …, 2018
52018
Context-aware intrusion alerts verification approach
S Saad, I Traore, ML Brocardo
2014 10th International Conference on Information Assurance and Security, 53-59, 2014
42014
Speed based attacker placement for evaluating location privacy in VANET
I Saini, S Saad, A Jaekel
International Conference on Ad Hoc Networks, 215-224, 2018
22018
attacker placement for detecting vulnerabilities of pseudonym change strategies in VANET
I Saini, SS Ahmed, A Jakel
2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 1-5, 2018
22018
Passphrase protected device‐to‐device mutual authentication schemes for smart homes
MS Raniyal, I Woungang, SK Dhurandher, SS Ahmed
Security and Privacy 1 (3), e42, 2018
22018
Ontology-based Intelligent Network-Forensics Investigation.
S Saad, I Traore
SEDE, 313-319, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20