关注
Elias Bou-Harb
标题
引用次数
引用次数
年份
Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations
N Neshenko, E Bou-Harb, J Crichigno, G Kaddoum, N Ghani
IEEE Communications Surveys & Tutorials 21 (3), 2702-2733, 2019
5562019
Communication security for smart grid distribution networks
E Bou-Harb, C Fachkha, M Pourzandi, M Debbabi, C Assi
IEEE Communications Magazine 51 (1), 42-49, 2013
2472013
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
2242018
Cyber scanning: a comprehensive survey
E Bou-Harb, M Debbabi, C Assi
Ieee communications surveys & tutorials 16 (3), 1496-1519, 2013
1762013
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
C Fachkha, E Bou-Harb, A Keliris, ND Memon, M Ahamad
NDSS, 2017
842017
A big data-enabled consolidated framework for energy efficient software defined data centers in IoT setups
K Kaur, S Garg, G Kaddoum, E Bou-Harb, KKR Choo
IEEE Transactions on Industrial Informatics 16 (4), 2687-2697, 2019
812019
An exhaustive survey on p4 programmable data plane switches: Taxonomy, applications, challenges, and future trends
EF Kfoury, J Crichigno, E Bou-Harb
IEEE Access 9, 87094-87155, 2021
802021
Fingerprinting internet DNS amplification DDoS activities
C Fachkha, E Bou-Harb, M Debbabi
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
782014
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
MS Pour, A Mangino, K Friday, M Rathbun, E Bou-Harb, F Iqbal, ...
Computers & Security 91, 101707, 2020
632020
Inferring distributed reflection denial of service attacks from darknet
C Fachkha, E Bou-Harb, M Debbabi
Computer Communications 62, 59-71, 2015
572015
A collaborative security framework for software-defined wireless sensor networks
C Miranda, G Kaddoum, E Bou-Harb, S Garg, K Kaur
IEEE Transactions on Information Forensics and Security 15, 2602-2615, 2020
552020
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns
MS Pour, E Bou-Harb, K Varma, N Neshenko, DA Pados, KKR Choo
Digital Investigation 28, S40-S49, 2019
552019
Towards a forecasting model for distributed denial of service activities
C Fachkha, E Bou-Harb, M Debbabi
2013 IEEE 12th International Symposium on Network Computing and Applications …, 2013
472013
A machine learning model for classifying unsolicited IoT devices by observing network telescopes
F Shaikh, E Bou-Harb, J Crichigno, N Ghani
2018 14th International Wireless Communications & Mobile Computing …, 2018
452018
A comprehensive tutorial on science DMZ
J Crichigno, E Bou-Harb, N Ghani
IEEE Communications Surveys & Tutorials 21 (2), 2041-2078, 2018
432018
Cyber meets control: A novel federated approach for resilient cps leveraging real cyber threat intelligence
E Bou-Harb, W Lucia, N Forti, S Weerakkody, N Ghani, B Sinopoli
IEEE Communications Magazine 55 (5), 198-204, 2017
432017
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
C Fachkha, E Bou-Harb, A Boukhtouta, S Dinh, F Iqbal, M Debbabi
2012 7th International Conference on Risks and Security of Internet and …, 2012
422012
Inferring, characterizing, and investigating internet-scale malicious iot device activities: A network telescope perspective
S Torabi, E Bou-Harb, C Assi, M Galluscio, A Boukhtouta, M Debbabi
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
412018
On fingerprinting probing activities
E Bou-Harb, M Debbabi, C Assi
computers & security 43, 35-48, 2014
412014
Internet of malicious things: Correlating active and passive measurements for inferring and characterizing internet-scale unsolicited iot devices
F Shaikh, E Bou-Harb, N Neshenko, AP Wright, N Ghani
IEEE Communications Magazine 56 (9), 170-177, 2018
392018
系统目前无法执行此操作,请稍后再试。
文章 1–20