Sadegh Torabi

Orcid: 0000-0003-2811-3536

According to our database1, Sadegh Torabi authored at least 23 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Dynamic trigger-based attacks against next-generation IoT malware family classifiers.
Comput. Secur., 2025

2024
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security.
IEEE Trans. Netw. Serv. Manag., February, 2024

A Hybrid System Call Profiling Approach for Container Protection.
IEEE Trans. Dependable Secur. Comput., 2024

Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and Mitigation.
Proceedings of the IEEE International Conference on Communications, 2024

Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Investigating the Security of EV Charging Mobile Applications as an Attack Surface.
ACM Trans. Cyber Phys. Syst., October, 2023

Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated By Compromised EV Charging Stations.
CoRR, 2023

ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics.
Proceedings of the IEEE International Conference on Communications, 2023

2022
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities.
IEEE Trans. Netw. Serv. Manag., 2022

Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope.
IEEE Trans. Dependable Secur. Comput., 2022

Power jacking your station: In-depth security analysis of electric vehicle charging station management systems.
Comput. Secur., 2022

SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution.
IEEE Trans. Netw. Serv. Manag., 2021

A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships.
IEEE Netw. Lett., 2021

2020
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities.
IEEE Netw. Lett., 2020

A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities.
Digit. Investig., 2020

2018
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems.
IEEE Commun. Surv. Tutorials, 2018

Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2016
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2013
Privacy Aspects of Health Related Information Sharing in Online Social Networks.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

2012
Social Network Analysis of Kuwait Publicly-Held Corporations.
Proceedings of the 3rd International Conference on Ambient Systems, 2012


  Loading...