How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection A Ghaleb, K Pattabiraman Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020 | 148 | 2020 |
On PLC network security A Ghaleb, S Zhioua, A Almulhem International Journal of Critical Infrastructure Protection 22, 62-69, 2018 | 62 | 2018 |
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring B Jethva, I Traoré, A Ghaleb, K Ganame, S Ahmed Journal of Computer Security 28 (3), 337-373, 2020 | 41 | 2020 |
Scada-sst: a scada security testbed A Ghaleb, S Zhioua, A Almulhem 2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016 | 32 | 2016 |
eTainter: detecting gas-related vulnerabilities in smart contracts A Ghaleb, J Rubin, K Pattabiraman Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 26 | 2022 |
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities A Ghaleb, J Rubin, K Pattabiraman | 17 | 2023 |
Detecting ransomware in encrypted web traffic J Modi, I Traore, A Ghaleb, K Ganame, S Ahmed Foundations and Practice of Security: 12th International Symposium, FPS 2019 …, 2020 | 11 | 2020 |
A framework architecture for agentless cloud endpoint security monitoring A Ghaleb, I Traore, K Ganame 2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019 | 6 | 2019 |
Towards effective static analysis approaches for security vulnerabilities in smart contracts A Ghaleb Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 4 | 2022 |
Static analysis approaches for finding vulnerabilities in smart contracts AAE Ghaleb University of British Columbia, 2023 | | 2023 |
SCADA Security Assessment Under Cyber Attacks AAE Ghaleb PQDT-Global, 2015 | | 2015 |
Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study ESM El-Alfy, AA Ghaleb 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 1-8, 2014 | | 2014 |