Claude Fachkha

Orcid: 0000-0003-2863-4817

Affiliations:
  • University of Dubai, UAE
  • New York University Abu Dhabi (former)
  • Concordia University, Canada (former)


According to our database1, Claude Fachkha authored at least 36 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media.
CoRR, 2024

Strategic Placement of Data Centers for Economic Analysis: An Online Algorithm Approach.
Proceedings of the 13th International Conference on Data Science, 2024

2023
The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions.
IEEE Access, 2023

Characterizing Mobile Money Phishing Using Reinforcement Learning.
IEEE Access, 2023

Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

A Gamification Architecture to Enhance Phishing Awareness.
Proceedings of the Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, 2023

Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm.
Proceedings of the Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, 2023

Feature Engineering Considerations in IoT: A Case Study.
Proceedings of the Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, 2023

ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

An Online Deterministic Algorithm for Non-Metric Facility Leasing.
Proceedings of the 25th International Conference on Enterprise Information Systems, 2023

Blockchain for Email Security: A Perspective on Existing and Potential Solutions for Phishing Attacks.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Comparing cyber physical systems with RFID applications: common attacks and countermeasure challenges.
Int. J. Bus. Inf. Syst., 2022

Power jacking your station: In-depth security analysis of electric vehicle charging station management systems.
Comput. Secur., 2022

2020
Analysis of biometric data using watermarking techniques.
Turkish J. Electr. Eng. Comput. Sci., 2020

A Big Data Fusion to Profile CPS Security Threats Against Operational Technology.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Performance Evaluation of a Lightweight IoT Authentication Protocol.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

A Microservices Architecture for ADS-B Data Security Using Blockchain.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

Digital Forensics and Investigations of the Internet of Things: A Short Survey.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

Prevention of DDoS Attacks in IoT Networks.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Cyber Threat Investigation of SCADA Modbus Activities.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Distributed Detection System Using Wavelet Decomposition and Chi-Square Test.
Proceedings of the Risks and Security of Internet and Systems, 2019

Multi-scale Adaptive Threshold for DDoS Detection.
Proceedings of the Risks and Security of Internet and Systems, 2019

2018
On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations.
Proceedings of the IEEE Globecom Workshops, 2018

On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Security Monitoring of the Cyber Space.
CoRR, 2016

Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization.
IEEE Commun. Surv. Tutorials, 2016

Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

2015
On the inference and prediction of DDoS campaigns.
Wirel. Commun. Mob. Comput., 2015

Inferring distributed reflection denial of service attacks from darknet.
Comput. Commun., 2015

2014
Fingerprinting Internet DNS Amplification DDoS Activities.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Inferring internet-scale infections by correlating malware and probing activities.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Communication security for smart grid distribution networks.
IEEE Commun. Mag., 2013

Towards a Forecasting Model for Distributed Denial of Service Activities.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

2012
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012


  Loading...