Mohamed Nassar
Mohamed Nassar
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Monitoring SIP Traffic Using Support Vector Machines
M Nassar, R State, O Festor
Recent Advances in Intrusion Detection, 311-330, 2008
Blockchain for explainable and trustworthy artificial intelligence
M Nassar, K Salah, MH ur Rehman, D Svetinovic
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1340, 2019
Holistic VoIP intrusion detection and prevention system
M Nassar, S Niccolini, R State, T Ewald
Proceedings of the 1st international conference on Principles, systems and …, 2007
Voip Honeypot Architecture
M Nassar, O Festor
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
Intrusion detection mechanisms for VoIP applications
M Nassar, R State, O Festor
Secure and private outsourcing of shape-based feature extraction
S Wang, M Nassar, M Atallah, Q Malluhi
International conference on information and communications security, 90-99, 2013
Paillier's encryption: Implementation and cloud applications
M Nassar, A Erradi, QM Malluhi
2015 International Conference on Applied Research in Computer Science and …, 2015
Artemisa: An open-source honeypot back-end to support security in VoIP domains
R Do Carmo, M Nassar, O Festor
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
Labeled VoIP data-set for intrusion detection evaluation
M Nassar, R State, O Festor
Networked Services and Applications-Engineering, Control and Management, 97-106, 2010
Modeling malware as a language
Y Awad, M Nassar, H Safa
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
Secure outsourcing of network flow data analysis
M Nassar, B al Bouna, Q Malluhi
2013 IEEE International Congress on Big Data, 431-432, 2013
A survey on fraud and service misuse in voice over IP (VoIP) networks
Y Rebahi, M Nassar, T Magedanz, O Festor
information security technical report 16 (1), 12-19, 2011
Benchmarking convolutional and recurrent neural networks for malware classification
H Safa, M Nassar, WAR Al Orabi
2019 15th International Wireless Communications & Mobile Computing …, 2019
Securing aggregate queries for DNA databases
M Nassar, Q Malluhi, M Atallah, A Shikfa
IEEE Transactions on Cloud Computing 7 (3), 827-837, 2017
Secure outsourcing of matrix operations as a service
M Nassar, A Erradi, F Sabri, QM Malluhi
2013 IEEE Sixth International Conference on Cloud Computing, 918-925, 2013
Risk management in VoIP infrastructures using support vector machines
M Nassar, O Dabbebi, R Badonnel, O Festor
2010 International Conference on Network and Service Management, 48-55, 2010
VoIP malware: Attack tool & attack scenarios
M Nassar, R State, O Festor
2009 IEEE International Conference on Communications, 1-6, 2009
RPig: A scalable framework for machine learning and advanced statistical functionalities
MX Wang, SB Handurukande, M Nassar
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets
S Barakat, BA Bouna, M Nassar, C Guyeux
Proceedings of the 13th International Joint Conference on e-Business and …, 2016
Transfer learning for malware multi-classification
MA Kadri, M Nassar, H Safa
Proceedings of the 23rd International Database Applications & Engineering …, 2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20