Amine Boukhtouta

According to our database1, Amine Boukhtouta authored at least 15 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems.
IEEE Communications Surveys and Tutorials, 2018

Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2016
Network malware classification comparison using DPI and flow packet headers.
J. Computer Virology and Hacking Techniques, 2016

2015
Graph-theoretic characterization of cyber-threat infrastructures.
Digital Investigation, 2015

2014
Inferring Malware Family through Application Protocol Sequences Signature.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

2013
Towards Fingerprinting Malicious Traffic.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2010
Security Evaluation and Hardening of Free and Open Source Software (FOSS).
ECEASST, 2010

Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

On the analysis of the Zeus botnet crimeware toolkit.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Insights from the analysis of the Mariposa botnet.
Proceedings of the CRiSIS 2010, 2010

2009
Capturing Returned Computable Values in AspectJ for Security Hardening.
Information Security Journal: A Global Perspective, 2009

The dataflow pointcut: a formal and practical framework.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

A Practical Framework for the Dataflow Pointcut in AspectJ.
Proceedings of the The Forth International Conference on Availability, 2009


  Loading...