Aiman Hanna

Orcid: 0000-0002-2657-0154

According to our database1, Aiman Hanna authored at least 16 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Detection of Microgrid Cyberattacks Using Network and System Management.
IEEE Trans. Smart Grid, May, 2023

On the prevalence of software supply chain attacks: Empirical study and investigative framework.
Forensic Sci. Int. Digit. Investig., March, 2023

2022
Security Monitoring of the Microgrid Using IEC 62351-7 Network and System Management.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022

2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020

An Analysis of Security Vulnerabilities in Container Images for Scientific Data Analysis.
CoRR, 2020

2019
Decoupling coding habits from functionality for effective binary authorship attribution.
J. Comput. Secur., 2019

2018
On Leveraging Coding Habits for Effective Binary Authorship Attribution.
Proceedings of the Computer Security, 2018

BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2017
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

2010
Security Evaluation and Hardening of Free and Open Source Software (FOSS).
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

2009
A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Targeting Security Vulnerabilities: From Specification to Detection (Short Paper).
Proceedings of the Eighth International Conference on Quality Software, 2008

Towards Automation of Testing High-Level Security Properties.
Proceedings of the Data and Applications Security XXII, 2008

2007
Team Edit Automata for Testing Security Property.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Security Design Patterns: Survey and Evaluation.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

AOP Extension for Security Testing of Programs.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006


  Loading...