Mohamed Nassar

Orcid: 0000-0001-8857-4436

Affiliations:
  • University of New Haven, West Haven, CT, USA
  • American University of Beirut, Department of Computer Science, Lebanon (former)
  • Antonine University, College of Engineering, Baabda, Lebanon (former)
  • Ericsson Network Management Lab, Athlone, Ireland (former)
  • INRIA Lorraine, LORIA, Villers-Lès-Nancy, France (former)


According to our database1, Mohamed Nassar authored at least 50 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cloud-based differentially private image classification.
Wirel. Networks, April, 2023

Toward Hardware-Assisted Malware Detection Utilizing Explainable Machine Learning: A Survey.
IEEE Access, 2023

2022
On the security of deep learning novelty detection.
Expert Syst. Appl., 2022

2021
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy.
ACM Trans. Internet Techn., 2021

Hack The Box: Fooling Deep Learning Abstraction-Based Monitors.
CoRR, 2021

Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Segmentation Fault: A Cheap Defense Against Adversarial Machine Learning.
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021

On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Blockchain for explainable and trustworthy artificial intelligence.
WIREs Data Mining Knowl. Discov., 2020

A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security.
Proceedings of the NOMS 2020, 2020

VIP Blowfish Privacy in Communication Graphs.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Securing Aggregate Queries for DNA Databases.
IEEE Trans. Cloud Comput., 2019

A Practical Scheme for Two-Party Private Linear Least Squares.
CoRR, 2019

Benchmarking Convolutional and Recurrent Neural Networks for Malware Classification.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Chi squared feature selection over Apache Spark.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

sElect: secure election as a service.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Transfer learning for malware multi-classification.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Shoplifting Smart Stores using Adversarial Machine Learning.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

A Look into Privacy-Preserving Blockchains.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Modeling Malware as a Language.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Throttling Malware Families in 2D.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

A Scheme for Three-way Secure and Verifiable E-Voting.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints.
Comput. Secur., 2017

Correctness-by-Learning of Infinite-State Component-Based Systems.
Proceedings of the Formal Aspects of Component Software - 14th International Conference, 2017

Reconfigurable and Adaptive Spark Applications.
Proceedings of the CLOSER 2017, 2017

2016
On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

2015
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud.
Proceedings of the 19th IEEE International Enterprise Distributed Object Computing Conference, 2015

An SQL-like query tool for data anonymization and outsourcing.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Automatic Generation of Optimized Workflow for Distributed Computations on Large-Scale Matrices.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

A Model Driven Framework for Secure Outsourcing of Computation to the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Outbound SPIT filter with optimal performance guarantees.
Comput. Networks, 2013

Secure and Private Outsourcing of Shape-Based Feature Extraction.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Practical and Secure Outsourcing of Matrix Computations to the Cloud.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Secure Outsourcing of Network Flow Data Analysis.
Proceedings of the IEEE International Congress on Big Data, 2013

Secure Outsourcing of Matrix Operations as a Service.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
RPig: A scalable framework for machine learning and advanced statistical functionalities.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
A survey on fraud and service misuse in voice over IP (VoIP) networks.
Inf. Secur. Tech. Rep., 2011

Using decision trees for generating adaptive SPIT signatures.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Artemisa: An open-source honeypot back-end to support security in VoIP domains.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

2010
A Framework for Monitoring SIP Enterprise Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Labeled VoIP Data-Set for Intrusion Detection Evaluation.
Proceedings of the Networked Services and Applications, 2010

Risk management in VoIP infrastructures using support vector machines.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
VoIP Networks Monitoring and Intrusion Detection. (Monitorage et Détection d'Intrusion dans les Réseaux Voix sur IP).
PhD thesis, 2009

VoIP Malware: Attack Tool & Attack Scenarios.
Proceedings of IEEE International Conference on Communications, 2009

2008
Monitoring SIP Traffic Using Support Vector Machines.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
Holistic VoIP intrusion detection and prevention system.
Proceedings of the Principles, 2007

VoIP Honeypot Architecture.
Proceedings of the Integrated Network Management, 2007

IBGP Confederation Provisioning.
Proceedings of the Inter-Domain Management, 2007

2006
Intrusion detection mechanisms for VoIP applications
CoRR, 2006


  Loading...