关注
Sadegh Torabi
Sadegh Torabi
Cyber Security Researcher, Center for Secure Information Systems (CSIS), George Mason University
在 gmu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems
S Torabi, A Boukhtouta, C Assi, M Debbabi
IEEE Communications Surveys and Tutorials 20 (4), 3389-3415, 2018
692018
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution
M Dib, S Torabi, E Bou-Harb, C Assi
IEEE Transactions on Network and Service Management (DOI: 10.1109/TNSM.2021 …, 2021
572021
Power Jacking Your Station: In-Depth Security Analysis of Electric Vehicle Charging Station Management Systems
T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi
Computers & Security 112, 102511 (DOI: 10.1016/j.cose.2021.102511), 2021
542021
Inferring, Characterizing, and Investigating Internet-scale Malicious IoT Device Activities: A Network Telescope Perspective
S Torabi, E Bou-Harb, C Assi, M Galluscio, A Boukhtouta, M Debbabi
48th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2018
512018
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting A Large Network Telescope
S Torabi, E Bou-Harb, C Assi, EB Karbab, A Boukhtouta, M Debbabi
IEEE Transactions on Dependable and Secure Computing (DOI: 10.1109/TDSC.2020 …, 2020
432020
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities
RMA Molina, S Torabi, K Sarieddine, E Bou-Harb, N Bouguila, C Assi
IEEE Transactions on Network and Service Management (DOI: 10.1109/TNSM.2021 …, 2021
342021
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships
S Torabi, M Dib, E Bou-Harb, C Assi, M Debbabi
IEEE Networking Letters 3 (3), 161-165, 2021
302021
Privacy Aspects of Health Related Information Sharing in Online Social Networks.
S Torabi, K Beznosov
USENIX Workshop on Health Information Technologies (HealthTech '13), 2013
232013
Investigating the security of ev charging mobile applications as an attack surface
K Sarieddine, MA Sayed, S Torabi, R Atallah, C Assi
ACM Transactions on Cyber-Physical Systems 7 (4), 1-28, 2023
162023
Social Network Analysis of Kuwait Publicly-Held Corporations
K Mahdi, A Almajid, M Safar, H Riquelme, S Torabi
Procedia Computer Science 10, 272-281, 2012
152012
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants
M Dib, S Torabi, E Bou-Harb, N Bouguila, C Assi
Proceedings of the 2022 ACM Asia Conference on Computer and Communications …, 2022
142022
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities
S Torabi, E Bou-Harb, C Assi, M Debbabi
Forensic Science International: Digital Investigation (https://doi.org/10 …, 2020
142020
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users
S Torabi, K Beznosov
Symposium on Usable Privacy and Security (SOUPS 2016), 2016
142016
Network robustness and irreversibility of information diffusion in complex networks
M Safar, K Mahdi, S Torabi
Journal of Computational Science 2 (3), 198-206, 2011
132011
A model of diffusion parameter characterizing social networks
K Mahdi, M Safar, S Torabi
IADIS international conference e-society, 363-370, 2009
122009
Stochastic modeling, analysis and investigation of iot-generated internet scanning activities
MS Pour, S Torabi, E Bou-Harb, C Assi, M Debbabi
IEEE Networking Letters 2 (3), 159-163, 2020
102020
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems
T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi
The Network and Distributed System Security (NDSS) Symposium, 2023. San …, 2023
92023
Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations
K Sarieddine, MA Sayed, S Torabi, R Atallah, C Assi
International Journal of Electrical Power & Energy Systems 156, 109735, 2024
82024
Diffusion and reverse diffusion processes in social networks: Analysis using the degree of Diffusion α
K Mahdi, S Torabi, M Safar
2010 3rd IEEE International Conference on Ubi-Media Computing, 124-131, 2010
62010
RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics
RMA Molina, E Bou-Harb, K Sarieddine, S Torabi, C Assi
IEEE International Conference on Communications (ICC2023), 1--6, 2023
52023
系统目前无法执行此操作,请稍后再试。
文章 1–20