Nizar Kheir
According to our database1,
Nizar Kheir
authored at least 28 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 7th IEEE International Conference on Fog and Edge Computing, 2023
2022
Demo Paper: Caught in my Radio Net - Experiment with Honeypots in Radio Access Networks.
Proceedings of the 25th Conference on Innovation in Clouds, Internet and Networks, 2022
Proceedings of the IEEE International Conference on Communications, 2022
2018
ACM Comput. Surv., 2018
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Proceedings of the 13th International Conference on New Technologies for Distributed Systems, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
J. Comput. Virol. Hacking Tech., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015
2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
2013
Behavioral classification and detection of malware through HTTP user agent anomalies.
J. Inf. Secur. Appl., 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010
2009
Proceedings of the Detection of Intrusions and Malware, 2009