Saeed Abu-Nimeh

According to our database1, Saeed Abu-Nimeh authored at least 17 papers between 2006 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2013
Cyber security of networked critical infrastructures [Guest Editorial].
IEEE Network, 2013

2012
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Three-Factor Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Lessons from Stuxnet.
IEEE Computer, 2011

Malicious and Spam Posts in Online Social Networks.
IEEE Computer, 2011

2010
Circumventing security toolbars and phishing filters via rogue wireless access points.
Wireless Communications and Mobile Computing, 2010

Proliferation and Detection of Blog Spam.
IEEE Security & Privacy, 2010

Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
Integrating Privacy Requirements into Security Requirements Engineering.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Privacy Risk Assessment in Privacy Requirements Engineering.
Proceedings of the Second International Workshop on Requirements Engineering and Law, 2009

Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees.
Proceedings of IEEE International Conference on Communications, 2009

2008
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A distributed architecture for phishing detection using Bayesian Additive Regression Trees.
Proceedings of the 2008 eCrime Researchers Summit, 2008

Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy.
Proceedings of the The Third International Conference on Availability, 2008

2007
A comparison of machine learning techniques for phishing detection.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

2006
Avoiding Denial of Service via Stress Testing.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006


  Loading...