Nizar Kheir

According to our database1, Nizar Kheir authored at least 28 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Mobile Edge Slice Broker: Mobile Edge Slices Deployment in Multi-Cloud Environments.
Proceedings of the 7th IEEE International Conference on Fog and Edge Computing, 2023

2022
Demo Paper: Caught in my Radio Net - Experiment with Honeypots in Radio Access Networks.
Proceedings of the 25th Conference on Innovation in Clouds, Internet and Networks, 2022

Cooperative and smart attacks detection systems in 6G-enabled Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

2018
Deception Techniques in Computer Security: A Research Perspective.
ACM Comput. Surv., 2018

Assessing the risk of complex ICT systems.
Ann. des Télécommunications, 2018

Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Evaluation of Deception-Based Web Attacks Detection.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
A new approach to investigate IoT threats based on a four layer model.
Proceedings of the 13th International Conference on New Technologies for Distributed Systems, 2016

A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

PhishEye: Live Monitoring of Sandboxed Phishing Kits.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Behavioral fine-grained detection and classification of P2P bots.
J. Comput. Virol. Hacking Tech., 2015

Automated Classification of C&C Connections Through Malware URL Clustering.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Internet of Things: A Definition & Taxonomy.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

The Role of Cloud Services in Malicious Software: Trends and Insights.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

DGA Bot Detection with Time Series Decision Trees.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
Behavioral classification and detection of malware through HTTP user agent anomalies.
J. Inf. Secur. Appl., 2013

PeerViewer: Behavioral Tracking and Classification of P2P Malware.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Analyzing HTTP User Agent Anomalies for Malware Detection.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2010
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Service Dependencies in Information Systems Security.
Proceedings of the Computer Network Security, 2010

A Service Dependency Model for Cost-Sensitive Intrusion Response.
Proceedings of the Computer Security, 2010

Strategies for Network Resilience: Capitalising on Policies.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
A Service Dependency Modeling Framework for Policy-Based Response Enforcement.
Proceedings of the Detection of Intrusions and Malware, 2009


  Loading...