Amine Boukhtouta

Orcid: 0000-0002-0261-815X

According to our database1, Amine Boukhtouta authored at least 24 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The critical node game.
J. Comb. Optim., July, 2024

2023
Forensic Data Analytics for Anomaly Detection in Evolving Networks.
CoRR, 2023

Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection.
IEEE Trans. Netw. Serv. Manag., 2022

Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope.
IEEE Trans. Dependable Secur. Comput., 2022

Intrusion Prevention Scheme Against Rank Attacks for Software-Defined Low Power IoT Networks.
IEEE Access, 2022

Cloud Native Applications Profiling using a Graph Neural Networks Approach.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
NFV security survey in 5G networks: A three-dimensional threat taxonomy.
Comput. Networks, 2021

AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

2018
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems.
IEEE Commun. Surv. Tutorials, 2018

Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2016
Network malware classification comparison using DPI and flow packet headers.
J. Comput. Virol. Hacking Tech., 2016

2015
Graph-theoretic characterization of cyber-threat infrastructures.
Digit. Investig., 2015

2014
Inferring Malware Family through Application Protocol Sequences Signature.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

2013
Towards Fingerprinting Malicious Traffic.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2010
Security Evaluation and Hardening of Free and Open Source Software (FOSS).
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010

Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

On the analysis of the Zeus botnet crimeware toolkit.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Insights from the analysis of the Mariposa botnet.
Proceedings of the CRiSIS 2010, 2010

2009
Capturing Returned Computable Values in AspectJ for Security Hardening.
Inf. Secur. J. A Glob. Perspect., 2009

The dataflow pointcut: a formal and practical framework.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

A Practical Framework for the Dataflow Pointcut in AspectJ.
Proceedings of the The Forth International Conference on Availability, 2009


  Loading...