Mohamed Nabeel

Orcid: 0000-0001-6299-8732

According to our database1, Mohamed Nabeel authored at least 47 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

Vaccination trials on hold: malicious and low credibility content on Twitter during the AstraZeneca COVID-19 vaccine development.
Comput. Math. Organ. Theory, September, 2023

DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023

2022
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior.
CoRR, 2022

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
CoRR, 2022

PDNS-Net: A Large Heterogeneous Graph Benchmark Dataset of Network Resolutions for Graph Learning.
CoRR, 2022

CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform.
CoRR, 2022

PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs.
CoRR, 2022

Demo: PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

HeteroGuard: Defending Heterogeneous Graph Neural Networks against Adversarial Attacks.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

GREENER: Graph Neural Networks for News Media Profiling.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Uncovering IP Address Hosting Types Behind Malicious Websites.
CoRR, 2021

Malicious and Low Credibility URLs on Twitter during COVID-19.
CoRR, 2021

Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs.
Proceedings of the 30th USENIX Security Symposium, 2021

Malicious and Low Credibility URLs on Twitter During the AstraZeneca COVID-19 Vaccine Development.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2021

CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference.
ACM Trans. Priv. Secur., 2020

2019
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019

2018
Securing Named Data Networks: Challenges and the Way Forward.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage.
CoRR, 2017

Distributed Cardinality Estimation of Set Operations with Differential Privacy.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

The Many Faces of End-to-End Encryption and Their Security Analysis.
Proceedings of the IEEE International Conference on Edge Computing, 2017

2016
DBMask: Fine-Grained Access Control on Encrypted Relational Databases.
Trans. Data Priv., 2016

2015
Scalable end-to-end security for advanced metering infrastructures.
Inf. Syst., 2015

2014
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2014

Privacy Preserving Delegated Access Control in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2014

Attribute Based Group Key Management.
Trans. Data Priv., 2014

Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Privacy Preserving Policy-Based Content Sharing in Public Clouds.
IEEE Trans. Knowl. Data Eng., 2013

Privacy Preserving Context Aware Publish Subscribe Systems.
Proceedings of the Network and System Security - 7th International Conference, 2013

An efficient certificateless cryptography scheme without pairing.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Privacy-Preserving Fine-Grained Access Control in Public Clouds.
IEEE Data Eng. Bull., 2012

Cryptographic Key Management for Smart Power Grids - Approaches and Issues
CoRR, 2012

Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Efficient privacy preserving content based publish subscribe systems.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Privacy preserving delegated access control in the storage as a service model.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Lonomics Atlas: a tool to explore interconnected ionomic, genomic and environmental data.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Towards privacy preserving access control in the cloud.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: towards attribute based group key management.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Mask: a system for privacy-preserving policy-based access to published content.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

A privacy-preserving approach to policy-based content dissemination.
Proceedings of the 26th International Conference on Data Engineering, 2010

2008
Secure Delta-Publishing of XML Content.
Proceedings of the 24th International Conference on Data Engineering, 2008

2007
A structure preserving approach for securing XML documents.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007


  Loading...