Elias Bou-Harb
Orcid: 0000-0001-8040-4635
According to our database1,
Elias Bou-Harb
authored at least 134 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Guest Editorial: IoT Security and Provisioning in Cyber-Enabled Niche Critical Infrastructure.
IEEE Internet Things Mag., November, 2024
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence.
IEEE Trans. Netw. Serv. Manag., June, 2024
IEEE Trans. Netw. Serv. Manag., February, 2024
P4BS: Leveraging Passive Measurements From P4 Switches to Dynamically Modify a Router's Buffer Size.
IEEE Trans. Netw. Serv. Manag., February, 2024
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs.
CoRR, 2024
LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward.
CoRR, 2024
Comput. Secur., 2024
Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification.
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 2024
Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
Empowering Data Centers with Computational Storage Drive-Based Deep Learning Inference Functionality to Combat Ransomware.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023
IEEE Commun. Mag., June, 2023
Comput. Secur., May, 2023
IEEE Commun. Mag., January, 2023
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023
Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution.
Proceedings of the NOMS 2023, 2023
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Proceedings of the IEEE International Conference on Communications, 2023
P4CCI: P4-Based Online TCP Congestion Control Algorithm Identification for Traffic Separation.
Proceedings of the IEEE International Conference on Communications, 2023
Effective DGA Family Classification Using a Hybrid Shallow and Deep Packet Inspection Technique on P4 Programmable Switches.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics.
Proceedings of the Complex Computational Ecosystems - First International Conference, 2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Netw. Serv. Manag., 2022
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope.
IEEE Trans. Dependable Secur. Comput., 2022
Digit. Investig., 2022
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems.
Comput. Secur., 2022
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment.
Comput. Networks, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
An attentive interpretable approach for identifying and quantifying malware-infected internet-scale IoT bots behind a NAT.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022
Proceedings of the 10th IEEE International Black Sea Conference on Communications and Networking, 2022
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Springer, ISBN: 978-3-031-18463-5, 2022
2021
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution.
IEEE Trans. Netw. Serv. Manag., 2021
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships.
IEEE Netw. Lett., 2021
A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs.
Digit. Investig., 2021
Digit. Investig., 2021
An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends.
IEEE Access, 2021
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
A Multidimensional Network Forensics Investigation of a State-Sanctioned Internet Outage.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Dynamic Router's Buffer Sizing using Passive Measurements and P4 Programmable Switches.
Proceedings of the IEEE Global Communications Conference, 2021
Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective.
ACM Trans. Manag. Inf. Syst., 2020
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach.
ACM Trans. Manag. Inf. Syst., 2020
A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
A survey of methods supporting cyber situational awareness in the context of smart cities.
J. Big Data, 2020
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities.
IEEE Netw. Lett., 2020
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities.
Digit. Investig., 2020
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020
Comput. Commun., 2020
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Springer, ISBN: 978-3-030-45857-7, 2020
2019
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective.
IEEE Trans. Big Data, 2019
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns.
Digit. Investig., 2019
Improving the accuracy of automated facial age estimation to aid CSEM investigations.
Digit. Investig., 2019
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations.
IEEE Commun. Surv. Tutorials, 2019
IEEE Commun. Surv. Tutorials, 2019
Comput. Commun., 2019
IEEE Commun. Mag., 2019
A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems.
IEEE Access, 2019
Decentralized Distribution of PCP Mappings Over Blockchain for End-to-End Secure Direct Communications.
IEEE Access, 2019
Method for Securing and Terminating a CS Call over a VoIP System with Multi-Device Support.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019
An Efficient Multi-Objective Resiliency Scheme for Routing of Virtual Functions in Failure Scenarios.
Proceedings of the 6th International Conference on Software Defined Systems, 2019
A Flow-Based Entropy Characterization of a NATed Network and Its Application on Intrusion Detection.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
J. Inf. Secur. Appl., 2018
Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices.
IEEE Commun. Mag., 2018
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018
A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
On the Collaborative Inference of DDoS: An Information-theoretic Distributed Approach.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Globecom Workshops, 2018
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the Computer and Network Security Essentials., 2018
2017
IEEE Netw., 2017
Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections.
Digit. Investig., 2017
Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence.
IEEE Commun. Mag., 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, 2017
On correlating network traffic for cyber threat intelligence: A Bloom filter approach.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities.
Comput. Networks, 2016
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
A probabilistic model to preprocess darknet data for cyber threat intelligence generation.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Comput. Commun., 2015
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks.
Secur. Commun. Networks, 2013
Comput. Networks, 2013
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks.
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012