default search action
Mohamed Nassar 0001
Person information
- affiliation: University of New Haven, West Haven, CT, USA
- affiliation (former): American University of Beirut, Department of Computer Science, Lebanon
- affiliation (former): Antonine University, College of Engineering, Baabda, Lebanon
- affiliation (former): Ericsson Network Management Lab, Athlone, Ireland
- affiliation (former): INRIA Lorraine, LORIA, Villers-Lès-Nancy, France
Other persons with the same name
- Mohamed Nassar 0002 — Microsoft Corporation
- Mohamed Nassar 0003 — Cairo University, Giza, Egypt
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Yehya Nasser, Mohamed Nassar:
Toward Hardware-Assisted Malware Detection Utilizing Explainable Machine Learning: A Survey. IEEE Access 11: 131273-131288 (2023) - [j8]Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir:
Cloud-based differentially private image classification. Wirel. Networks 29(3): 997-1004 (2023) - 2022
- [j7]Sara Al Hajj Ibrahim, Mohamed Nassar:
On the security of deep learning novelty detection. Expert Syst. Appl. 207: 117964 (2022) - 2021
- [j6]Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, Mansour Naser Alraja:
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. ACM Trans. Internet Techn. 21(1): 20:1-20:25 (2021) - [c37]Tiffanie Edwards, Syria McCullough, Mohamed Nassar, Ibrahim M. Baggili:
On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics. ICDF2C 2021: 35-51 - [c36]Doha Al Bared, Mohamed Nassar:
Segmentation Fault: A Cheap Defense Against Adversarial Machine Learning. MENACOMM 2021: 37-42 - [c35]Mohamed Nassar, Joseph Khoury, Abdelkarim Erradi, Elias Bou-Harb:
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems. NTMS 2021: 1-7 - [i7]Sara Hajj Ibrahim, Mohamed Nassar:
Hack The Box: Fooling Deep Learning Abstraction-Based Monitors. CoRR abs/2107.04764 (2021) - [i6]Doha Al Bared, Mohamed Nassar:
Segmentation Fault: A Cheap Defense Against Adversarial Machine Learning. CoRR abs/2108.13617 (2021) - 2020
- [j5]Mohamed Nassar, Khaled Salah, Muhammad Habib Ur Rehman, Davor Svetinovic:
Blockchain for explainable and trustworthy artificial intelligence. WIREs Data Mining Knowl. Discov. 10(1) (2020) - [c34]Mohamed Nassar, Elie Chicha, Bechara al Bouna, Richard Chbeir:
VIP Blowfish Privacy in Communication Graphs. ICETE (2) 2020: 459-467 - [c33]Joseph Khoury, Mohamed Nassar:
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security. NOMS 2020: 1-9
2010 – 2019
- 2019
- [j4]Mohamed Nassar, Qutaibah M. Malluhi, Mikhail J. Atallah, Abdullatif Shikfa:
Securing Aggregate Queries for DNA Databases. IEEE Trans. Cloud Comput. 7(3): 827-837 (2019) - [c32]Nida Khan, Mohamed Nassar:
A Look into Privacy-Preserving Blockchains. AICCSA 2019: 1-6 - [c31]Mohamed Nassar, Abdallah Itani, Mahmoud Karout, Mohamad El Baba, Omar Al Samman Kaakaji:
Shoplifting Smart Stores using Adversarial Machine Learning. AICCSA 2019: 1-6 - [c30]Mohamad Al Kadri, Mohamed Nassar, Haïdar Safa:
Transfer learning for malware multi-classification. IDEAS 2019: 19:1-19:7 - [c29]Mohamed Nassar, Haïdar Safa, Alaa Al Mutawa, Ahmed Helal, Iskander Gaba:
Chi squared feature selection over Apache Spark. IDEAS 2019: 41:1-41:5 - [c28]Mohamed Nassar, Bassel Rawda, Mohamed Mardini:
sElect: secure election as a service. IDEAS 2019: 44:1-44:2 - [c27]Haïdar Safa, Mohamed Nassar, Wael Al Rahal Al Orabi:
Benchmarking Convolutional and Recurrent Neural Networks for Malware Classification. IWCMC 2019: 561-566 - [i5]Mohamed Nassar:
A Practical Scheme for Two-Party Private Linear Least Squares. CoRR abs/1901.09281 (2019) - [i4]Mohamed Nassar, Haïdar Safa:
Throttling Malware Families in 2D. CoRR abs/1901.10590 (2019) - 2018
- [c26]Mohamed Nassar, Qutaibah M. Malluhi, Tanveer Khan:
A Scheme for Three-way Secure and Verifiable E-Voting. AICCSA 2018: 1-6 - [c25]Mohamed Nassar, Haïdar Safa:
Throttling Malware Families in 2D. AIMS 2018: 33-45 - [c24]Yara Awad, Mohamed Nassar, Haïdar Safa:
Modeling Malware as a Language. ICC 2018: 1-6 - 2017
- [j3]Khaled Dassouki, Haïdar Safa, Mohamed Nassar, Abbas Hijazi:
Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints. Comput. Secur. 70: 618-633 (2017) - [c23]Mohamad Jaber, Mohamed Nassar, Wael Al Rahal Al Orabi, Bilal Abi Farraj, Mohamad Omar Kayali, Chadi Helwe:
Reconfigurable and Adaptive Spark Applications. CLOSER 2017: 84-91 - [c22]Haitham Bou-Ammar, Mohamad Jaber, Mohamed Nassar:
Correctness-by-Learning of Infinite-State Component-Based Systems. FACS 2017: 162-178 - 2016
- [c21]Mohamed Nassar, Nathalie Wehbe, Bechara al Bouna:
K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset. CSE/EUC/DCABES 2016: 546-552 - [c20]Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux:
On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. SECRYPT 2016: 318-326 - [i3]Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux:
On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets. CoRR abs/1611.08417 (2016) - 2015
- [c19]Mohamed Nassar, Adel Al-Rahal Orabi, Marwan Doha, Bechara al Bouna:
An SQL-like query tool for data anonymization and outsourcing. CyberSA 2015: 1-3 - [c18]Mohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi:
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud. EDOC 2015: 134-141 - 2014
- [c17]Mohamed Nassar, Abdelkarim Erradi, Farida Sabry, Qutaibah M. Malluhi:
A Model Driven Framework for Secure Outsourcing of Computation to the Cloud. IEEE CLOUD 2014: 968-969 - [c16]Farida Sabry, Abdelkarim Erradi, Mohamed Nassar, Qutaibah M. Malluhi:
Automatic Generation of Optimized Workflow for Distributed Computations on Large-Scale Matrices. ICSOC 2014: 79-92 - 2013
- [j2]Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, Guy Leduc:
Outbound SPIT filter with optimal performance guarantees. Comput. Networks 57(7): 1630-1643 (2013) - [c15]Mohamed Nassar, Abdelkarim Erradi, Farida Sabry, Qutaibah M. Malluhi:
Secure Outsourcing of Matrix Operations as a Service. IEEE CLOUD 2013: 918-925 - [c14]Mohamed Nassar, Bechara al Bouna, Qutaibah M. Malluhi:
Secure Outsourcing of Network Flow Data Analysis. BigData Congress 2013: 431-432 - [c13]Mohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi:
Practical and Secure Outsourcing of Matrix Computations to the Cloud. ICDCS Workshops 2013: 70-75 - [c12]Shumiao Wang, Mohamed Nassar, Mikhail J. Atallah, Qutaibah M. Malluhi:
Secure and Private Outsourcing of Shape-Based Feature Extraction. ICICS 2013: 90-99 - 2012
- [c11]MingXue Wang, Sidath B. Handurukande, Mohamed Nassar:
RPig: A scalable framework for machine learning and advanced statistical functionalities. CloudCom 2012: 293-300 - [i2]Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, Guy Leduc:
Outbound SPIT Filter with Optimal Performance Guarantees. CoRR abs/1201.6190 (2012) - 2011
- [j1]Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, Olivier Festor:
A survey on fraud and service misuse in voice over IP (VoIP) networks. Inf. Secur. Tech. Rep. 16(1): 12-19 (2011) - [c10]Rodrigo do Carmo, Mohamed Nassar, Olivier Festor:
Artemisa: An open-source honeypot back-end to support security in VoIP domains. Integrated Network Management 2011: 361-368 - [c9]Mohamed Nassar, Sylvain Martin, Guy Leduc, Olivier Festor:
Using decision trees for generating adaptive SPIT signatures. SIN 2011: 13-20 - 2010
- [c8]Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Olivier Festor:
Risk management in VoIP infrastructures using support vector machines. CNSM 2010: 48-55 - [c7]Mohamed Nassar, Radu State, Olivier Festor:
Labeled VoIP Data-Set for Intrusion Detection Evaluation. EUNICE 2010: 97-106 - [c6]Mohamed Nassar, Radu State, Olivier Festor:
A Framework for Monitoring SIP Enterprise Networks. NSS 2010: 1-8
2000 – 2009
- 2009
- [b1]Mohamed Nassar:
VoIP Networks Monitoring and Intrusion Detection. (Monitorage et Détection d'Intrusion dans les Réseaux Voix sur IP). Henri Poincaré University, Nancy, France, 2009 - [c5]Mohamed Nassar, Radu State, Olivier Festor:
VoIP Malware: Attack Tool & Attack Scenarios. ICC 2009: 1-6 - 2008
- [c4]Mohamed Nassar, Radu State, Olivier Festor:
Monitoring SIP Traffic Using Support Vector Machines. RAID 2008: 311-330 - 2007
- [c3]Mohamed Nassar, Radu State, Olivier Festor:
IBGP Confederation Provisioning. AIMS 2007: 25-34 - [c2]Mohamed Nassar, Radu State, Olivier Festor:
VoIP Honeypot Architecture. Integrated Network Management 2007: 109-118 - [c1]Mohamed Nassar, Saverio Niccolini, Radu State, Thilo Ewald:
Holistic VoIP intrusion detection and prevention system. IPTComm 2007: 1-9 - 2006
- [i1]Mohamed El Baker Nassar, Radu State, Olivier Festor:
Intrusion detection mechanisms for VoIP applications. CoRR abs/cs/0610109 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint