Fadi Mohsen

Orcid: 0000-0003-3876-5781

According to our database1, Fadi Mohsen authored at least 23 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hybrid Android Malware Detection: A Review of Heuristic-Based Approach.
IEEE Access, 2024

On Identification of Intrusive Applications: A Step Toward Heuristics-Based Adaptive Security Policy.
IEEE Access, 2024

2023
A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations.
J. Cyber Secur. Mobil., 2023

An Approach to Guide Users Towards Less Revealing Internet Browsers.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
A Taxonomy for Large-Scale Cyber Security Attacks.
EAI Endorsed Trans. Cloud Syst., 2022

To remove or not remove Mobile Apps? A data-driven predictive model approach.
CoRR, 2022

Security-centric ranking algorithm and two privacy scores to mitigate intrusive apps.
Concurr. Comput. Pract. Exp., 2022

2021
Enhancing malware detection in Android application by incorporating broadcast receivers.
Int. J. Inf. Priv. Secur. Integr., 2021

KotlinDetector: Towards Understanding the Implications of Using Kotlin in Android Applications.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

ArabiaNer: A System to Extract Named Entities from Arabic Content.
Proceedings of the 13th International Conference on Agents and Artificial Intelligence, 2021

Extending the Exposure Score of Web Browsers by Incorporating CVSS.
Proceedings of the Risks and Security of Internet and Systems, 2021

2019
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of Elasticsearch.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Detecting Android Malwares by Mining Statically Registered Broadcast Receivers.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

2016
The Listening Patterns to System Events by Benign and Malicious Android Apps.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2014
Towards Enhancing the Security of OAuth Implementations in Smart Phones.
Proceedings of the IEEE Third International Conference on Mobile Services, Anchorage, AK, USA, June 27, 2014

Securing OAuth implementations in smart phones.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

POSTER: Android System Broadcast Actions Broadcasts Your Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Android keylogging threat.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

A formal model for sustainable vehicle-to-grid management.
Proceedings of the SEGS'13, 2013

Private and Anonymous Data Storage and Distribution in Cloud.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013


  Loading...