Ghita Mezzour

Orcid: 0000-0002-4306-1589

According to our database1, Ghita Mezzour authored at least 28 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk.
IEEE Trans. Dependable Secur. Comput., 2023

2021
$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans.
IEEE Trans. Dependable Secur. Comput., 2021

Detecting the impact of software vulnerability on attacks: A case study of network telescope scans.
J. Netw. Comput. Appl., 2021

Using Social Network Analysis to Analyze Development Priorities of Moroccan Institutions.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2021

Unsupervised Skill Identification from Job Ads.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021

Skill mismatch evidence for Cybersecurity skills in Morocco.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2020
A Data-driven Characterization of Modern Android Spyware.
ACM Trans. Manag. Inf. Syst., 2020

2019
Building a soft skill taxonomy from job openings.
Soc. Netw. Anal. Min., 2019

Predicting Probing Rate Severity by Leveraging Twitter Sentiments.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Analyzing Cybersecurity Job Market Needs in Morocco by Mining Job Ads.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

2018
A Socio-Computational Approach to Predicting Bioweapon Proliferation.
IEEE Trans. Comput. Soc. Syst., 2018

Remote assessment of countries' cyber weapon capabilities.
Soc. Netw. Anal. Min., 2018

Securing the Internet of Things (IoT).
Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications, 2018

Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Analysis of Hacking Related Trade in the Darkweb.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Analyzing the needs of the offshore sector in Morocco by mining job ads.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

2017
Global Variation in Attack Encounters and Hosting.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

2016
Longitudinal analysis of a large corpus of cyber threat descriptions.
J. Comput. Virol. Hacking Tech., 2016

Field study of cybercafe usage & security in Morocco.
Proceedings of the International Conference on Advanced Communication Systems and Information Security, 2016

2015
Assessing the Global Cyber and Biological Threat.
PhD thesis, 2015

Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach.
Soc. Netw. Anal. Min., 2015

An empirical study of global malware encounters.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
Spam diffusion in a social network initiated by hacked e-mail accounts.
Int. J. Secur. Networks, 2014

2009
Privacy-Preserving Relationship Path Discovery in Social Networks.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

A Trustable Reputation Scheme Based on Private Relationships.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

2008
Certificate revocation list distribution in vehicular communication systems.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

2007
MiniSec: a secure sensor network communication architecture.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007


  Loading...