Follow
Sadegh Torabi
Sadegh Torabi
Cyber Security Researcher, Center for Secure Information Systems (CSIS), George Mason University
Verified email at gmu.edu - Homepage
Title
Cited by
Cited by
Year
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems
S Torabi, A Boukhtouta, C Assi, M Debbabi
IEEE Communications Surveys and Tutorials 20 (4), 3389-3415, 2018
442018
Inferring, Characterizing, and Investigating Internet-scale Malicious IoT Device Activities: A Network Telescope Perspective
S Torabi, E Bou-Harb, C Assi, M Galluscio, A Boukhtouta, M Debbabi
48th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2018
322018
Privacy Aspects of Health Related Information Sharing in Online Social Networks.
S Torabi, K Beznosov
USENIX Workshop on Health Information Technologies (HealthTech '13), 2013
212013
Social Network Analysis of Kuwait Publicly-Held Corporations
K Mahdi, A Almajid, M Safar, H Riquelme, S Torabi
Procedia Computer Science 10, 272-281, 2012
152012
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting A Large Network Telescope
S Torabi, E Bou-Harb, C Assi, EB Karbab, A Boukhtouta, M Debbabi
IEEE Transactions on Dependable and Secure Computing (DOI: 10.1109/TDSC.2020 …, 2020
142020
Network robustness and irreversibility of information diffusion in complex networks
M Safar, K Mahdi, S Torabi
Journal of Computational Science 2 (3), 198-206, 2011
142011
A model of diffusion parameter characterizing social networks
K Mahdi, M Safar, S Torabi
IADIS international conference e-society, 363-370, 2009
132009
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution
M Dib, S Torabi, E Bou-Harb, C Assi
IEEE Transactions on Network and Service Management (DOI: 10.1109/TNSM.2021 …, 2021
82021
Diffusion and reverse diffusion processes in social networks: Analysis using the degree of Diffusion α
K Mahdi, S Torabi, M Safar
2010 3rd IEEE International Conference on Ubi-Media Computing, 124-131, 2010
82010
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships
S Torabi, M Dib, E Bou-Harb, C Assi, M Debbabi
IEEE Networking Letters 3 (3), 161-165, 2021
72021
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users
S Torabi, K Beznosov
Symposium on Usable Privacy and Security (SOUPS 2016), 2016
72016
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities
M Safaei Pour, S Torabi, E Bou-Harb, C Assi, M Debbabi
IEEE Networking Letters (DOI: 10.1109/LNET.2020.2998045) 2 (3), 159-163, 2020
4*2020
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities
S Torabi, E Bou-Harb, C Assi, M Debbabi
Forensic Science International: Digital Investigation (https://doi.org/10 …, 2020
42020
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities
RMA Molina, S Torabi, K Sarieddine, E Bou-Harb, N Bouguila, C Assi
IEEE Transactions on Network and Service Management (DOI: 10.1109/TNSM.2021 …, 2021
22021
Towards understanding users' motivation to share health information on Facebook
S Torabi
University of British Columbia, 2016
12016
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware
M Dib, S Torabi, E Bou-Harb, N Bouguila, C Assi
To appear in the Proceedings of the 17th ACM ASIA Conference on Computer and …, 2022
2022
Power Jacking Your Station: In-Depth Security Analysis of Electric Vehicle Charging Station Management Systems
T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi
Computers & Security 112, 102511 (DOI: 10.1016/j.cose.2021.102511), 2021
2021
Data-Driven Approaches for Detecting Malware-Infected IoT Devices and Characterizing Their Unsolicited Behaviors by Leveraging Passive Internet Measurements
S Torabi
Concordia University, 2021
2021
Poster: Privacy Aspects of Health Related Information Sharing in Online Social Networks
S Torabi, K Beznosov
Understanding Users’ Perception Toward Sharing Personal Health Information
S Torabi
The system can't perform the operation now. Try again later.
Articles 1–20