Mohamed Nassar
Mohamed Nassar
Verified email at newhaven.edu
Title
Cited by
Cited by
Year
Monitoring SIP Traffic Using Support Vector Machines
M Nassar, R State, O Festor
Recent Advances in Intrusion Detection, 311-330, 2008
752008
Holistic VoIP intrusion detection and prevention system
M Nassar, S Niccolini, R State, T Ewald
Proceedings of the 1st international conference on Principles, systems and …, 2007
672007
Voip Honeypot Architecture
M Nassar, O Festor
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
43*2007
Secure and private outsourcing of shape-based feature extraction
S Wang, M Nassar, M Atallah, Q Malluhi
International conference on information and communications security, 90-99, 2013
352013
Intrusion detection mechanisms for VoIP applications
M Nassar, R State, O Festor
35*2006
Blockchain for explainable and trustworthy artificial intelligence
M Nassar, K Salah, MH ur Rehman, D Svetinovic
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1340, 2019
312019
Artemisa: An open-source honeypot back-end to support security in VoIP domains
R Do Carmo, M Nassar, O Festor
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
292011
Paillier's encryption: Implementation and cloud applications
M Nassar, A Erradi, QM Malluhi
2015 International Conference on Applied Research in Computer Science and …, 2015
262015
Labeled VoIP data-set for intrusion detection evaluation
M Nassar, R State, O Festor
Networked Services and Applications-Engineering, Control and Management, 97-106, 2010
242010
Secure outsourcing of network flow data analysis
M Nassar, B al Bouna, Q Malluhi
2013 IEEE International Congress on Big Data, 431-432, 2013
232013
Modeling malware as a language
Y Awad, M Nassar, H Safa
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
202018
VoIP malware: Attack tool & attack scenarios
M Nassar, R State, O Festor
2009 IEEE International Conference on Communications, 1-6, 2009
17*2009
A survey on fraud and service misuse in voice over IP (VoIP) networks
Y Rebahi, M Nassar, T Magedanz, O Festor
Information Security Technical Report 16 (1), 12-19, 2011
152011
Secure outsourcing of matrix operations as a service
M Nassar, A Erradi, F Sabri, QM Malluhi
2013 IEEE Sixth International Conference on Cloud Computing, 918-925, 2013
142013
RPig: A scalable framework for machine learning and advanced statistical functionalities
MX Wang, SB Handurukande, M Nassar
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
142012
Risk management in VoIP infrastructures using support vector machines
M Nassar, O Dabbebi, R Badonnel, O Festor
2010 International Conference on Network and Service Management, 48-55, 2010
132010
Benchmarking convolutional and recurrent neural networks for malware classification
H Safa, M Nassar, WAR Al Orabi
2019 15th International Wireless Communications & Mobile Computing …, 2019
102019
Securing aggregate queries for DNA databases
M Nassar, Q Malluhi, M Atallah, A Shikfa
IEEE Transactions on Cloud Computing 7 (3), 827-837, 2017
102017
On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets
S Barakat, BA Bouna, M Nassar, C Guyeux
Proceedings of the 13th International Joint Conference on e-Business and …, 2016
72016
Throttling Malware Families in 2D
M Nassar, H Safa
12th International Conference on Autonomous Infrastructure, Management and …, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20