Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
Fachkha, Claude, Debbabi, Mourad
Published in IEEE Communications surveys and tutorials (01.01.2016)
Published in IEEE Communications surveys and tutorials (01.01.2016)
Get full text
Journal Article
The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions
Razaulla, Salwa, Fachkha, Claude, Markarian, Christine, Gawanmeh, Amjad, Mansoor, Wathiq, Fung, Benjamin C. M., Assi, Chadi
Published in IEEE access (01.01.2023)
Published in IEEE access (01.01.2023)
Get full text
Journal Article
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems
Nasr, Tony, Torabi, Sadegh, Bou-Harb, Elias, Fachkha, Claude, Assi, Chadi
Published in Computers & security (01.01.2022)
Published in Computers & security (01.01.2022)
Get full text
Journal Article
On the inference and prediction of DDoS campaigns
Fachkha, Claude, Bou-Harb, Elias, Debbabi, Mourad
Published in Wireless communications and mobile computing (25.04.2015)
Published in Wireless communications and mobile computing (25.04.2015)
Get full text
Journal Article
Cyber Threat Investigation of SCADA Modbus Activities
Fachkha, Claude
Published in 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (01.06.2019)
Published in 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (01.06.2019)
Get full text
Conference Proceeding
Inferring internet-scale infections by correlating malware and probing activities
Bou-Harb, Elias, Fachkha, Claude, Debbabi, Mourad, Assi, Chadi
Published in 2014 IEEE International Conference on Communications (ICC) (01.06.2014)
Published in 2014 IEEE International Conference on Communications (ICC) (01.06.2014)
Get full text
Conference Proceeding
Tracing the Ransomware Bloodline: Investigation and Detection of Drifting Virlock Variants
Razaulla, Salwa, Fachkha, Claude, Gawanmeh, Amjad, Markarian, Christine, Fung, Benjamin C. M., Assi, Chadi
Published in 2024 6th International Conference on Computer Communication and the Internet (ICCCI) (14.06.2024)
Published in 2024 6th International Conference on Computer Communication and the Internet (ICCCI) (14.06.2024)
Get full text
Conference Proceeding
Fingerprinting Internet DNS Amplification DDoS Activities
Fachkha, Claude, Bou-Harb, Elias, Debbabi, Mourad
Published in 2014 6th International Conference on New Technologies, Mobility and Security (NTMS) (01.03.2014)
Published in 2014 6th International Conference on New Technologies, Mobility and Security (NTMS) (01.03.2014)
Get full text
Conference Proceeding
Blockchain for Email Security: A Perspective on Existing and Potential Solutions for Phishing Attacks
Al-Karaki, Jamal N., Gawanmeh, Amjad, Fachkha, Claude
Published in 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA) (24.10.2023)
Published in 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA) (24.10.2023)
Get full text
Conference Proceeding
A Big Data Fusion to Profile CPS Security Threats Against Operational Technology
Biron, Karl, Bazzaza, Wael, Yaqoob, Khalid, Gawanmeh, Amjad, Fachkha, Claude
Published in 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) (01.08.2020)
Published in 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) (01.08.2020)
Get full text
Conference Proceeding
Towards a Forecasting Model for Distributed Denial of Service Activities
Fachkha, Claude, Bou-Harb, Elias, Debbabi, Mourad
Published in 2013 IEEE 12th International Symposium on Network Computing and Applications (01.08.2013)
Published in 2013 IEEE 12th International Symposium on Network Computing and Applications (01.08.2013)
Get full text
Conference Proceeding