Sadegh Torabi
Orcid: 0000-0003-2811-3536
According to our database1,
Sadegh Torabi
authored at least 23 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Dynamic trigger-based attacks against next-generation IoT malware family classifiers.
Comput. Secur., 2025
2024
IEEE Trans. Netw. Serv. Manag., February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the IEEE International Conference on Communications, 2024
Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
ACM Trans. Cyber Phys. Syst., October, 2023
Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated By Compromised EV Charging Stations.
CoRR, 2023
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE International Conference on Communications, 2023
2022
IEEE Trans. Netw. Serv. Manag., 2022
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope.
IEEE Trans. Dependable Secur. Comput., 2022
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems.
Comput. Secur., 2022
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution.
IEEE Trans. Netw. Serv. Manag., 2021
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships.
IEEE Netw. Lett., 2021
2020
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities.
IEEE Netw. Lett., 2020
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities.
Digit. Investig., 2020
2018
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems.
IEEE Commun. Surv. Tutorials, 2018
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2016
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
2013
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
2012
Proceedings of the 3rd International Conference on Ambient Systems, 2012