Saed Alrabaee

Orcid: 0000-0001-8842-493X

According to our database1, Saed Alrabaee authored at least 60 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Deep Learning Approach to Discover Router Firmware Vulnerabilities.
IEEE Trans. Ind. Informatics, January, 2024

Social Commerce Adoption Model Based on Usability, Perceived Risks, and Institutional Trust.
IEEE Trans. Engineering Management, 2024

Compiler-provenance identification in obfuscated binaries using vision transformers.
Forensic Sci. Int. Digit. Investig., 2024

Internet of things (IoT) forensics and incident response: The good, the bad, and the unaddressed.
Forensic Sci. Int. Digit. Investig., 2024

Network traffic classification: Techniques, datasets, and challenges.
Digit. Commun. Networks, 2024

Strategic cybersecurity.
Comput. Secur., 2024

Using AI to Detect Android Malware Families.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024

2023
The Good, The Bad, and The Ugly About Insta Shopping: A Qualitative Study.
IEEE Trans. Comput. Soc. Syst., October, 2023

A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs.
IEEE Trans. Veh. Technol., March, 2023

COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities.
Digit. Commun. Networks, February, 2023

Efficient Resource Management of Micro-Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2023

A Proposed Artificial Intelligence Model for Android-Malware Detection.
Informatics, 2023

A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features.
ACM Comput. Surv., 2023

Convergence of IoT and Cognitive Radio Networks: A Survey of Applications, Techniques, and Challenges.
IEEE Access, 2023

PESS: Progress Enhancing Student Support.
Proceedings of the International Conference on Smart Applications, 2023

SES: Smart Education System.
Proceedings of the International Conference on Computer and Applications, 2023

Investigating Online Searching Behavior Based on Google Trends in MENA Region Before and After COVID-19.
Proceedings of the IEEE Frontiers in Education Conference, 2023

Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2023

An Efficient Strategy for Deploying Deception Technology.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2023

AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks.
Proceedings of the IEEE Global Engineering Education Conference, 2023

AI Techniques for Software Vulnerability Detection and Mitigation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network.
Trans. Emerg. Telecommun. Technol., 2022

A stratified approach to function fingerprinting in program binaries using diverse features.
Expert Syst. Appl., 2022

The role of national cybersecurity strategies on the improvement of cybersecurity education.
Comput. Secur., 2022

Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review.
Proceedings of the International Conference on Computer and Applications, 2022

Safe: Cryptographic Algorithms and Security Principles Gamification.
Proceedings of the IEEE Global Engineering Education Conference, 2022

Efforts and Suggestions for Improving Cybersecurity Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

2021
Fault-Detection Tactics for Optimized Embedded Systems Efficiency.
IEEE Access, 2021

BinDeep: Binary to Source Code Matching Using Deep Learning.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Boosting Students and Teachers Cybersecurity Awareness During COVID-19 Pandemic.
Proceedings of the IEEE Global Engineering Education Conference, 2021

2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020

CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA.
IEEE Trans. Inf. Forensics Secur., 2020

An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Decoupling coding habits from functionality for effective binary authorship attribution.
J. Comput. Secur., 2019

On the feasibility of binary authorship characterization.
Digit. Investig., 2019

Applied Comparative Evaluation of the Metasploit Evasion Module.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Reinforcing the Edge: Autonomous Energy Management for Mobile Device Clouds.
Proceedings of the IEEE INFOCOM 2019, 2019

BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
<i>FOSSIL</i>: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries.
ACM Trans. Priv. Secur., 2018

On Leveraging Coding Habits for Effective Binary Authorship Attribution.
Proceedings of the Computer Security, 2018

2017
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103].
Digit. Investig., 2017

2016
Power trading in cognitive radio networks.
J. Netw. Comput. Appl., 2016

<i>BinGold</i>: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs).
Digit. Investig., 2016

DySign: dynamic fingerprinting for the automatic detection of android malware.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

On the Feasibility of Malware Authorship Attribution.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
BinComp: A stratified approach to compiler provenance Attribution.
Digit. Investig., 2015

SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code.
Digit. Investig., 2015

A method for intrusion detection in web services based on time series.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
Applications architectures and protocol design issues for cognitive radio networks: a survey.
Int. J. Wirel. Mob. Comput., 2014

OBA2: An Onion approach to Binary code Authorship Attribution.
Digit. Investig., 2014

Preserving Database Privacy in Cloud Computing.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Using model checking for Trivial File Transfer Protocol validation.
Proceedings of the Fourth International Conference on Communications and Networking, 2014

2012
Sureness efficient energy technique for cooperative spectrum sensing in cognitive radios.
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012

A game theoretic approach to power trading in cognitive radio systems.
Proceedings of the 20th International Conference on Software, 2012

A price setting approach to power trading in cognitive radio networks.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

A game theoretic approach to spectrum management in cognitive radio network.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

Higher layer issues in cognitive radio network.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

A game theory approach: Dynamic behaviours for spectrum management in cognitive radio network.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Routing Management Algorithm Based on Spectrum Trading and Spectrum Competition in Cognitive Radio Networks.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Comparison of Spectrum Management without Game Theory (SMWG) and with Game Theory (SMG) for Network Performance in Cognitive Radio Network.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012


  Loading...