Bilal Shebaro

According to our database1, Bilal Shebaro authored at least 22 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Scaffolding Mobile Programming with a Student-Centered and Asset-Based Framework.
J. Comput. Sci. Coll., April, 2025

2022
Closing the gap: building internship programs for career readiness.
J. Comput. Sci. Coll., 2022

Teaching blockchain in security.
J. Comput. Sci. Coll., 2022

2020
SYN, SYN-ACK, and beyond: learning by networking.
J. Comput. Sci. Coll., 2020

2019
Crime in the 21<sup>st</sup> century: a co-teaching experience.
J. Comput. Sci. Coll., 2019

2018
Using active learning strategies in teaching introductory database courses.
J. Comput. Sci. Coll., 2018

2016
There's an app for that: an introduction to ioS development: conference workshop.
J. Comput. Sci. Coll., 2016

Enhancing malware detection: clients deserve more protection.
Int. J. Electron. Secur. Digit. Forensics, 2016

2015
Context-Based Access Control Systems for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2015

Digital forensics: you can run but you can't hide: conference tutorial.
J. Comput. Sci. Coll., 2015

2014
IdentiDroid: Android can finally Wear its Anonymous Suit.
Trans. Data Priv., 2014

Fine-grained analysis of packet losses in wireless sensor networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Demo Overview: Privacy-Enhancing Features of IdentiDroid.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels.
Int. J. Digit. Crime Forensics, 2013

Fine-grained analysis of packet loss symptoms in wireless sensor networks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

PostgreSQL anomalous query detector.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Performance signatures of mobile phone browsers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Demonstrating a lightweight data provenance for sensor networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Privacy-preserving network flow recording.
Digit. Investig., 2011

2010
Leaving timing-channel fingerprints in hidden service log files.
Digit. Investig., 2010

2008
The ecology of Malware.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

2006
A comparative study of ElGamal based digital signature algorithms.
J. Comput. Methods Sci. Eng., 2006


  Loading...