Mohammad A. Noureddine

According to our database1, Mohammad A. Noureddine authored at least 14 papers between 2015 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Achieving network resiliency using sound theoretical and practical methods
PhD thesis, 2020

OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
P4AIG: Circuit-Level Verification of P4 Programs.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Revisiting Client Puzzles for State Exhaustion Attacks Resilience.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Revisiting Client Puzzles for State Exhaustion Attacks Resilience.
CoRR, 2018

Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
PowerAlert: An Integrity Checker using Power Measurement.
CoRR, 2017

An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Accounting for the Human User in Predictive Security Models.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

2016
Model Checking Software with First Order Logic Specifications Using AIG Solvers.
IEEE Trans. Software Eng., 2016

A Game-Theoretic Approach to Respond to Attacker Lateral Movement.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

2015
Quantitative security metrics with human in the loop.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015


  Loading...