Mahdi Abadi

According to our database1, Mahdi Abadi authored at least 32 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep Learning for Zero-day Malware Detection and Classification: A Survey.
ACM Comput. Surv., February, 2024

2022
Android Malware Detection Using One-Class Graph Neural Networks.
ISC Int. J. Inf. Secur., 2022

2021
A differentially private location generalization approach to guarantee non-uniform privacy in moving objects databases.
Knowl. Based Syst., 2021

Enhancing spatial and temporal utilities in differentially private moving objects database release.
Int. J. Inf. Sec., 2021

2020
Incremental collusive fraud detection in large-scale online auction networks.
J. Supercomput., 2020

A fully spatial personalized differentially private mechanism to provide non-uniform privacy guarantees for spatial databases.
Inf. Syst., 2020

HAL-RD: cross-correlating heterogeneous alerts and logs using resource dependencies.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
HLMD: a signature-based approach to hardware-level behavioral malware detection and classification.
J. Supercomput., 2019

RAMD: registry-based anomaly malware detection using one-class ensemble classifiers.
Appl. Intell., 2019

PDP-SAG: Personalized Privacy Protection in Moving Objects Databases by Combining Differential Privacy and Sensitive Attribute Generalization.
IEEE Access, 2019

2018
PLDP-TD: Personalized-location differentially private data analysis on trajectory databases.
Pervasive Mob. Comput., 2018

Akoman: Hardware-Level Malware Detection Using Discrete Wavelet Transform.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets.
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018

SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
CAFD: Detecting Collusive Frauds in Online Auction Networks by Combining One-Class Classification and Collective Classification.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression.
Knowl. Based Syst., 2016

2015
BeeOWA: A novel approach based on ABC algorithm and induced OWA operators for constructing one-class classifier ensembles.
Neurocomputing, 2015

DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic.
Digit. Investig., 2015

BotGrab: A negative reputation system for botnet detection.
Comput. Electr. Eng., 2015

2014
Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
On the trade-off between stealth and propagation speed of Internet worms.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

2012
BotOnus: an online unsupervised method for Botnet detection.
ISC Int. J. Inf. Secur., 2012

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms.
ISC Int. J. Inf. Secur., 2012

A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data.
Proceedings of the Network and System Security - 6th International Conference, 2012

A generalization-based approach for personalized privacy preservation in trajectory data publishing.
Proceedings of the 6th International Symposium on Telecommunications, 2012

2011
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs.
Comput. Networks, 2011

An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs.
ISC Int. J. Inf. Secur., 2010

Distributed PCA-based anomaly detection in wireless sensor networks.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
A novel quantum-inspired evolutionary algorithm for solving combinatorial optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

2008
Minimization Analysis of Network Attack Graphs Using Genetic Algorithms.
Int. J. Comput. Their Appl., 2008

A multi-start quantum-inspired evolutionary algorithm for solving combinatorial optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008


  Loading...