Seguir
Claude Fachkha
Claude Fachkha
University of Dubai (UAE), New York University Abu Dhabi (UAE), and Concordia University (Canada)
Dirección de correo verificada de ud.ac.ae - Página principal
Título
Citado por
Citado por
Año
Communication security for smart grid distribution networks
E Bou-Harb, C Fachkha, M Pourzandi, M Debbabi, C Assi
IEEE Communications Magazine 51 (1), 42-49, 2013
2702013
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization
C Fachkha, M Debbabi
IEEE Communications Surveys & Tutorials 18 (2), 1197-1227, 2015
1422015
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
C Fachkha, E Bou-Harb, A Keliris, ND Memon, M Ahamad
NDSS, 2017
932017
Fingerprinting internet DNS amplification DDoS activities
C Fachkha, E Bou-Harb, M Debbabi
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
812014
Inferring distributed reflection denial of service attacks from darknet
C Fachkha, E Bou-Harb, M Debbabi
Computer Communications 62, 59-71, 2015
612015
Towards a forecasting model for distributed denial of service activities
C Fachkha, E Bou-Harb, M Debbabi
2013 IEEE 12th International Symposium on Network Computing and Applications …, 2013
572013
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
C Fachkha, E Bou-Harb, A Boukhtouta, S Dinh, F Iqbal, M Debbabi
2012 7th International Conference on Risks and Security of Internet and …, 2012
442012
Power Jacking your Station: In-depth Security Analysis of Electric Vehicle Charging Station Management Systems
T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi
Computers & Security 112, 102511, 2022
432022
The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions
CA Salwa Razaulla, Claude Fachkha, Christine Markarian, Amjad Gawanmeh ...
IEEE Access, 2023
33*2023
Digital Forensics and Investigations of the Internet of Things: A Short Survey
S Amiroon, C Fachkha
2020 3rd International Conference on Signal Processing and Information …, 2020
282020
A Big Data Fusion to Profile CPS Security Threats Against Operational Technology
K Biron, W Bazzaza, K Yaqoob, A Gawanmeh, C Fachkha
2020 IEEE 21st International Symposium on" A World of Wireless, Mobile and …, 2020
262020
A Microservices Architecture for ADS-B Data Security Using Blockchain
HA Damis, D Shehada, C Fachkha, A Gawanmeh, JN Al-Karaki
2020 3rd International Conference on Signal Processing and Information …, 2020
232020
On the inference and prediction of DDoS campaigns
C Fachkha, E Bou‐Harb, M Debbabi
Wireless Communications and Mobile Computing 15 (6), 1066-1078, 2015
232015
Cyber Threat Investigation of SCADA Modbus Activities
C Fachkha
2019 10th IFIP international conference on new technologies, mobility and …, 2019
212019
Inferring internet-scale infections by correlating malware and probing activities
E Bou-Harb, C Fachkha, M Debbabi, C Assi
2014 IEEE International Conference on Communications (ICC), 640-646, 2014
142014
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems
T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi
Network and Distributed System Security (NDSS) Symposium, 2023
62023
On the collaborative inference of DDoS: an information-theoretic distributed approach
OF Ezzahra, B Khaled, E Bou-Harb, C Fachkha, B Zouari
2018 14th International Wireless Communications & Mobile Computing …, 2018
62018
Security monitoring of the cyber space
C Fachkha
Cybersecurity policies and strategies for cyberwarfare prevention, 62-83, 2015
62015
Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations
N Neshenko, M Husak, E Bou-Harb, P Čeleda, S Al-Mulla, C Fachkha
2018 IEEE Globecom Workshops (GC Wkshps), 1-7, 2018
52018
Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations
V Rammouz, J Khoury, D Klisura, M Safaei Pour, M Safaei Pour, ...
The 19th International Conference on Wireless and Mobile Computing …, 2023
42023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20