Elias Bou-Harb

Orcid: 0000-0001-8040-4635

According to our database1, Elias Bou-Harb authored at least 123 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security.
IEEE Trans. Netw. Serv. Manag., February, 2024

P4BS: Leveraging Passive Measurements From P4 Switches to Dynamically Modify a Router's Buffer Size.
IEEE Trans. Netw. Serv. Manag., February, 2024

LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward.
CoRR, 2024

2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023

P4Tune: Enabling Programmability in Non-Programmable Networks.
IEEE Commun. Mag., June, 2023

A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security.
Comput. Secur., May, 2023

A Security Assessment of HTTP/2 Usage in 5G Service-Based Architecture.
IEEE Commun. Mag., January, 2023

Ransomware Detection Using Federated Learning with Imbalanced Datasets.
CoRR, 2023

Federated Learning Approach for Distributed Ransomware Analysis.
CoRR, 2023

Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution.
Proceedings of the NOMS 2023, 2023

ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics.
Proceedings of the IEEE International Conference on Communications, 2023

P4CCI: P4-Based Online TCP Congestion Control Algorithm Identification for Traffic Separation.
Proceedings of the IEEE International Conference on Communications, 2023

Effective DGA Family Classification Using a Hybrid Shallow and Deep Packet Inspection Technique on P4 Programmable Switches.
Proceedings of the IEEE International Conference on Communications, 2023

An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics.
Proceedings of the Complex Computational Ecosystems - First International Conference, 2023

Federated Learning Approach for Distributed Ransomware Analysis.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022

On Ransomware Family Attribution Using Pre-Attack Paranoia Activities.
IEEE Trans. Netw. Serv. Manag., 2022

Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope.
IEEE Trans. Dependable Secur. Comput., 2022

A live digital forensics approach for quantum mechanical computers.
Digit. Investig., 2022

Power jacking your station: In-depth security analysis of electric vehicle charging station management systems.
Comput. Secur., 2022

A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment.
Comput. Networks, 2022

A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches.
Proceedings of the Network and System Security - 16th International Conference, 2022

HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Interpretable Federated Transformer Log Learning for Cloud Threat Forensics.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

INC: In-Network Classification of Botnet Propagation at Line Rate.
Proceedings of the Computer Security - ESORICS 2022, 2022

An attentive interpretable approach for identifying and quantifying malware-infected internet-scale IoT bots behind a NAT.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022

Ransomware Detection and Classification Strategies.
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022

IoT Threat Detection Testbed Using Generative Adversarial Networks.
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022

EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Smart Cities: Cyber Situational Awareness to Support Decision Making
Springer, ISBN: 978-3-031-18463-5, 2022

High-Speed Networks - A Tutorial
Springer, ISBN: 978-3-030-88840-4, 2022

2021
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution.
IEEE Trans. Netw. Serv. Manag., 2021

A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships.
IEEE Netw. Lett., 2021

A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs.
Digit. Investig., 2021

Vec2UAge: Enhancing underage age estimation performance through facial embeddings.
Digit. Investig., 2021

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends.
IEEE Access, 2021

Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

A Multidimensional Network Forensics Investigation of a State-Sanctioned Internet Outage.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Revisiting IoT Fingerprinting behind a NAT.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Dynamic Router's Buffer Sizing using Passive Measurements and P4 Programmable Switches.
Proceedings of the IEEE Global Communications Conference, 2021

Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective.
ACM Trans. Manag. Inf. Syst., 2020

Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach.
ACM Trans. Manag. Inf. Syst., 2020

A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups.
IEEE Trans. Ind. Informatics, 2020

A Collaborative Security Framework for Software-Defined Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2020

A survey of methods supporting cyber situational awareness in the context of smart cities.
J. Big Data, 2020

Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities.
IEEE Netw. Lett., 2020

A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities.
Digit. Investig., 2020

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020

An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband.
Comput. Commun., 2020

A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020

A Performance Evaluation of TCP BBRv2 Alpha.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020

Leveraging SONiC Functionalities in Disaggregated Network Switches.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020

Towards a Unified In-Network DDoS Detection and Mitigation Strategy.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Offloading Media Traffic to Programmable Data Plane Switches.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Exploiting Ransomware Paranoia For Execution Prevention.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Cyber Threat Intelligence for the Internet of Things
Springer, ISBN: 978-3-030-45857-7, 2020

2019
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective.
IEEE Trans. Big Data, 2019

Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns.
Digit. Investig., 2019

Improving the accuracy of automated facial age estimation to aid CSEM investigations.
Digit. Investig., 2019

Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations.
IEEE Commun. Surv. Tutorials, 2019

Survey of Attack Projection, Prediction, and Forecasting in Cyber Security.
IEEE Commun. Surv. Tutorials, 2019

A Comprehensive Tutorial on Science DMZ.
IEEE Commun. Surv. Tutorials, 2019

Theoretic derivations of scan detection operating on darknet traffic.
Comput. Commun., 2019

SDN Testbed for Evaluation of Large Exo-Atmospheric EMP Attacks.
IEEE Commun. Mag., 2019

A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems.
IEEE Access, 2019

Decentralized Distribution of PCP Mappings Over Blockchain for End-to-End Secure Direct Communications.
IEEE Access, 2019

Method for Securing and Terminating a CS Call over a VoIP System with Multi-Device Support.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Enabling TCP Pacing using Programmable Data Plane Switches.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

An Efficient Multi-Objective Resiliency Scheme for Routing of Virtual Functions in Failure Scenarios.
Proceedings of the 6th International Conference on Software Defined Systems, 2019

A Flow-Based Entropy Characterization of a NATed Network and Its Application on Intrusion Detection.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
CSC-Detector: A System to Infer Large-Scale Probing Campaigns.
IEEE Trans. Dependable Secur. Comput., 2018

Passive inference of attacks on CPS communication protocols.
J. Inf. Secur. Appl., 2018

Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices.
IEEE Commun. Mag., 2018

Impact of Segment Size and Parallel Streams on TCP BBR.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

On Secrecy Bounds of MIMO Wiretap Channels with ZF detectors.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Tackling Class Imbalance in Cyber Security Datasets.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations.
Proceedings of the IEEE Globecom Workshops, 2018

Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Assessing Internet-wide Cyber Situational Awareness of Critical Sectors.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Big Data Behavioral Analytics Meet Graph Theory: On Effective Botnet Takedowns.
IEEE Netw., 2017

Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections.
Digit. Investig., 2017

Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence.
IEEE Commun. Mag., 2017

A first empirical look on internet-scale exploitations of IoT devices.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

On the impact of empirical attack models targeting marine transportation.
Proceedings of the 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, 2017

On correlating network traffic for cyber threat intelligence: A Bloom filter approach.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities.
Comput. Networks, 2016

Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

A Brief Survey of Security Approaches for Cyber-Physical Systems.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

A probabilistic model to preprocess darknet data for cyber threat intelligence generation.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Passive inference of attacks on SCADA communication protocols.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
On the inference and prediction of DDoS campaigns.
Wirel. Commun. Mob. Comput., 2015

Inferring distributed reflection denial of service attacks from darknet.
Comput. Commun., 2015

A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Multidimensional investigation of source port 0 probing.
Digit. Investig., 2014

Cyber Scanning: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2014

On fingerprinting probing activities.
Comput. Secur., 2014

Fingerprinting Internet DNS Amplification DDoS Activities.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Behavioral analytics for inferring large-scale orchestrated probing events.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Inferring internet-scale infections by correlating malware and probing activities.
Proceedings of the IEEE International Conference on Communications, 2014

2013
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks.
Secur. Commun. Networks, 2013

A systematic approach for detecting and clustering distributed cyber scanning.
Comput. Networks, 2013

Communication security for smart grid distribution networks.
IEEE Commun. Mag., 2013

Towards a Forecasting Model for Distributed Denial of Service Activities.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

On detecting and clustering distributed cyber scanning.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

A Statistical Approach for Fingerprinting Probing Activities.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks.
Proceedings of IEEE International Conference on Communications, 2012

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012


  Loading...