Hamad BinSalleeh
Hamad BinSalleeh
Verified email at imamu.edu.sa
Cited by
Cited by
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010
Mining writeprints from anonymous e-mails for forensic investigation
F Iqbal, H Binsalleeh, BCM Fung, M Debbabi
digital investigation 7 (1-2), 56-64, 2010
A unified data mining solution for authorship analysis in anonymous textual communications
F Iqbal, H Binsalleeh, B Fung, M Debbabi
Information Sciences 231, 98-112, 2013
Detection of Malicious Payload Distribution Channels in DNS
AM Kara, H Binsalleeh, M Mannan, A Youssef, M Debbabi
Defaming botnet toolkits: A bottom-up approach to mitigating the threat
T Ormerod, L Wang, M Debbabi, A Youssef, H Binsalleeh, A Boukhtouta, ...
2010 Fourth International Conference on Emerging Security Information …, 2010
Multidimensional investigation of source port 0 probing
E Bou-Harb, NE Lakhdari, H Binsalleeh, M Debbabi
Digital Investigation 11, S114-S123, 2014
An implementation for a worm detection and mitigation system
H Binsalleeh, A Youssef
2008 24th Biennial Symposium on Communications, 54-57, 2008
Characterization of Covert Channels in DNS
H Binsalleeh, AM Kara, A Youssef, M Debbabi
New Technologies, Mobility and Security (NTMS), 2014 6th International …, 2014
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats
I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ...
IEEE Access 7, 99508-99520, 2019
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection
I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro, S Lambotharan, ...
IEEE Access 6, 40008-40023, 2018
Using RFID tags to improve pilgrimage management
H Binsalleeh, N Mohammed, PS Sandhu, F Aljumah, BCM Fung
2009 International Conference on Innovations in Information Technology (IIT …, 2009
Botnets: Analysis, Detection, and Mitigation
H Binsalleeh
Network Security Technologies: Design and Applications: Design and …, 2014
Analysis of Malware and Domain Name System Traffic
H Binsalleeh
Concordia University, 2014
Anomaly Detection Using Dynamic Time Warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
2019 IEEE International Conference on Computational Science and Engineering …, 2019
Design and implementation of a worm detection and mitigation system
H Binsalleeh
Concordia University, 2008
Comparative analysis on imbalanced multi-class classification for malware samples using CNN
A Alzammam, H Binsalleeh, B AsSdhan, K Kyriakopoulos, S Lambotharan
Loughborough University, 0
The system can't perform the operation now. Try again later.
Articles 1–16