Elias Bou-Harb
Cited by
Cited by
Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
N Neshenko, E Bou-Harb, J Crichigno, G Kaddoum, N Ghani
IEEE Communications Surveys & Tutorials 21 (3), 2702-2733, 2019
Communication security for smart grid distribution networks
E Bou-Harb, C Fachkha, M Pourzandi, M Debbabi, C Assi
IEEE Communications Magazine 51 (1), 42-49, 2013
Cyber scanning: a comprehensive survey
E Bou-Harb, M Debbabi, C Assi
Ieee communications surveys & tutorials 16 (3), 1496-1519, 2013
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
C Fachkha, E Bou-Harb, A Keliris, ND Memon, M Ahamad
NDSS, 2017
Fingerprinting internet DNS amplification DDoS activities
C Fachkha, E Bou-Harb, M Debbabi
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
A big data-enabled consolidated framework for energy efficient software defined data centers in IoT setups
K Kaur, S Garg, G Kaddoum, E Bou-Harb, KKR Choo
IEEE Transactions on Industrial Informatics 16 (4), 2687-2697, 2019
Inferring distributed reflection denial of service attacks from darknet
C Fachkha, E Bou-Harb, M Debbabi
Computer Communications 62, 59-71, 2015
Towards a forecasting model for distributed denial of service activities
C Fachkha, E Bou-Harb, M Debbabi
2013 IEEE 12th International Symposium on Network Computing and Applications …, 2013
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
C Fachkha, E Bou-Harb, A Boukhtouta, S Dinh, F Iqbal, M Debbabi
2012 7th International Conference on Risks and Security of Internet and …, 2012
On fingerprinting probing activities
E Bou-Harb, M Debbabi, C Assi
computers & security 43, 35-48, 2014
A comprehensive tutorial on science DMZ
J Crichigno, E Bou-Harb, N Ghani
IEEE Communications Surveys & Tutorials 21 (2), 2041-2078, 2018
Cyber meets control: A novel federated approach for resilient cps leveraging real cyber threat intelligence
E Bou-Harb, W Lucia, N Forti, S Weerakkody, N Ghani, B Sinopoli
IEEE Communications Magazine 55 (5), 198-204, 2017
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns
MS Pour, E Bou-Harb, K Varma, N Neshenko, DA Pados, KKR Choo
Digital Investigation 28, S40-S49, 2019
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
MS Pour, A Mangino, K Friday, M Rathbun, E Bou-Harb, F Iqbal, ...
Computers & Security 91, 101707, 2020
Inferring, characterizing, and investigating Internet-scale malicious IoT device activities: A network telescope perspective
S Torabi, E Bou-Harb, C Assi, M Galluscio, A Boukhtouta, M Debbabi
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
A brief survey of security approaches for cyber-physical systems
E Bou-Harb
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
Multidimensional investigation of source port 0 probing
E Bou-Harb, NE Lakhdari, H Binsalleeh, M Debbabi
Digital Investigation 11, S114-S123, 2014
Internet of malicious things: Correlating active and passive measurements for inferring and characterizing internet-scale unsolicited iot devices
F Shaikh, E Bou-Harb, N Neshenko, AP Wright, N Ghani
IEEE Communications Magazine 56 (9), 170-177, 2018
Cross-layer authentication protocol design for ultra-dense 5G HetNets
CM Moreira, G Kaddoum, E Bou-Harb
2018 IEEE International Conference on Communications (ICC), 1-7, 2018
The system can't perform the operation now. Try again later.
Articles 1–20