BibTeX records: Sadegh Torabi

download as .bib file

@article{DBLP:journals/tdsc/XingWTZLS24,
  author       = {Yunlong Xing and
                  Xinda Wang and
                  Sadegh Torabi and
                  Zeyu Zhang and
                  Lingguang Lei and
                  Kun Sun},
  title        = {A Hybrid System Call Profiling Approach for Container Protection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1068--1083},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3268124},
  doi          = {10.1109/TDSC.2023.3268124},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XingWTZLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SarieddineSAATKPB24,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Chadi Assi and
                  Ribal Atallah and
                  Sadegh Torabi and
                  Joseph Khoury and
                  Morteza Safaei Pour and
                  Elias Bou{-}Harb},
  title        = {{EV} Charging Infrastructure Discovery to Contextualize Its Deployment
                  Security},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {1287--1301},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2023.3318406},
  doi          = {10.1109/TNSM.2023.3318406},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/SarieddineSAATKPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/SarieddineSTAJA24,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Sadegh Torabi and
                  Ribal Attallah and
                  Danial Jafarigiv and
                  Chadi Assi and
                  Mourad Debbabi},
  editor       = {Jianying Zhou and
                  Tony Q. S. Quek and
                  Debin Gao and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Uncovering Covert Attacks on {EV} Charging Infrastructure: How {OCPP}
                  Backend Vulnerabilities Could Compromise Your System},
  booktitle    = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634737.3644999},
  doi          = {10.1145/3634737.3644999},
  timestamp    = {Fri, 16 Aug 2024 09:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/SarieddineSTAJA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Zhang0TA24,
  author       = {Yefei Zhang and
                  Jun Yan and
                  Sadegh Torabi and
                  Chadi Assi},
  title        = {Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and
                  Mitigation},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2024, Denver,
                  CO, USA, June 9-13, 2024},
  pages        = {4638--4643},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICC51166.2024.10622307},
  doi          = {10.1109/ICC51166.2024.10622307},
  timestamp    = {Mon, 02 Sep 2024 15:04:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Zhang0TA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/SarieddineSTAA23,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Sadegh Torabi and
                  Ribal Atallah and
                  Chadi Assi},
  title        = {Investigating the Security of {EV} Charging Mobile Applications as
                  an Attack Surface},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {7},
  number       = {4},
  pages        = {26:1--26:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609508},
  doi          = {10.1145/3609508},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcps/SarieddineSTAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MolinaBTA23,
  author       = {Ricardo Misael Ayala Molina and
                  Elias Bou{-}Harb and
                  Sadegh Torabi and
                  Chadi Assi},
  title        = {{RPM:} Ransomware Prevention and Mitigation Using Operating Systems'
                  Sensing Tactics},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279119},
  doi          = {10.1109/ICC45041.2023.10279119},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/MolinaBTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NasrTBFA23,
  author       = {Tony Nasr and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Claude Fachkha and
                  Chadi Assi},
  title        = {ChargePrint: {A} Framework for Internet-Scale Discovery and Security
                  Analysis of {EV} Charging Management Systems},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/chargeprint-a-framework-for-internet-scale-discovery-and-security-analysis-of-ev-charging-management-systems/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/NasrTBFA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-12890,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Sadegh Torabi and
                  Ribal Atallah and
                  Chadi Assi},
  title        = {Edge-Based Detection and Localization of Adversarial Oscillatory Load
                  Attacks Orchestrated By Compromised {EV} Charging Stations},
  journal      = {CoRR},
  volume       = {abs/2302.12890},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.12890},
  doi          = {10.48550/ARXIV.2302.12890},
  eprinttype    = {arXiv},
  eprint       = {2302.12890},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-12890.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NasrTBFA22,
  author       = {Tony Nasr and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Claude Fachkha and
                  Chadi Assi},
  title        = {Power jacking your station: In-depth security analysis of electric
                  vehicle charging station management systems},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102511},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102511},
  doi          = {10.1016/J.COSE.2021.102511},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NasrTBFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TorabiBAKBD22,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  ElMouatez Billah Karbab and
                  Amine Boukhtouta and
                  Mourad Debbabi},
  title        = {Inferring and Investigating IoT-Generated Scanning Campaigns Targeting
                  a Large Network Telescope},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {402--418},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2979183},
  doi          = {10.1109/TDSC.2020.2979183},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/TorabiBAKBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/MolinaTSBBA22,
  author       = {Ricardo Misael Ayala Molina and
                  Sadegh Torabi and
                  Khaled Sarieddine and
                  Elias Bou{-}Harb and
                  Nizar Bouguila and
                  Chadi Assi},
  title        = {On Ransomware Family Attribution Using Pre-Attack Paranoia Activities},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {1},
  pages        = {19--36},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2021.3112056},
  doi          = {10.1109/TNSM.2021.3112056},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/MolinaTSBBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/DibTBBA22,
  author       = {Mirabelle Dib and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Nizar Bouguila and
                  Chadi Assi},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {EVOLIoT: {A} Self-Supervised Contrastive Learning Framework for Detecting
                  and Characterizing Evolving IoT Malware Variants},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {452--466},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517393},
  doi          = {10.1145/3488932.3517393},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/DibTBBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XingCWTSYL22,
  author       = {Yunlong Xing and
                  Jiahao Cao and
                  Xinda Wang and
                  Sadegh Torabi and
                  Kun Sun and
                  Fei Yan and
                  Qi Li},
  title        = {SysCap: Profiling and Crosschecking Syscall and Capability Configurations
                  for Docker Images},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {236--244},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.9947248},
  doi          = {10.1109/CNS56114.2022.9947248},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XingCWTSYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-10603,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Sadegh Torabi and
                  Ribal Atallah and
                  Chadi Assi},
  title        = {Investigating the Security of {EV} Charging Mobile Applications As
                  an Attack Surface},
  journal      = {CoRR},
  volume       = {abs/2211.10603},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.10603},
  doi          = {10.48550/ARXIV.2211.10603},
  eprinttype    = {arXiv},
  eprint       = {2211.10603},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-10603.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/TorabiDBAD21,
  author       = {Sadegh Torabi and
                  Mirabelle Dib and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {A Strings-Based Similarity Analysis Approach for Characterizing IoT
                  Malware and Inferring Their Underlying Relationships},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {3},
  number       = {3},
  pages        = {161--165},
  year         = {2021},
  url          = {https://doi.org/10.1109/lnet.2021.3076600},
  doi          = {10.1109/LNET.2021.3076600},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/TorabiDBAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/DibTBA21,
  author       = {Mirabelle Dib and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi},
  title        = {A Multi-Dimensional Deep Learning Framework for IoT Malware Classification
                  and Family Attribution},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {1165--1177},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2021.3075315},
  doi          = {10.1109/TNSM.2021.3075315},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/DibTBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TorabiBAD20,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {A Scalable Platform for Enabling the Forensic Investigation of Exploited
                  IoT Devices and Their Generated Unsolicited Activities},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300922},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300922},
  doi          = {10.1016/J.FSIDI.2020.300922},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TorabiBAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/PourTBAD20,
  author       = {Morteza Safaei Pour and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet
                  Scanning Activities},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {2},
  number       = {3},
  pages        = {159--163},
  year         = {2020},
  url          = {https://doi.org/10.1109/lnet.2020.2998045},
  doi          = {10.1109/LNET.2020.2998045},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/PourTBAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/TorabiBAD18,
  author       = {Sadegh Torabi and
                  Amine Boukhtouta and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {Detecting Internet Abuse by Analyzing Passive {DNS} Traffic: {A} Survey
                  of Implemented Systems},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {20},
  number       = {4},
  pages        = {3389--3415},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMST.2018.2849614},
  doi          = {10.1109/COMST.2018.2849614},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/TorabiBAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/TorabiBAGBD18,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mario Galluscio and
                  Amine Boukhtouta and
                  Mourad Debbabi},
  title        = {Inferring, Characterizing, and Investigating Internet-Scale Malicious
                  IoT Device Activities: {A} Network Telescope Perspective},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28,
                  2018},
  pages        = {562--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSN.2018.00064},
  doi          = {10.1109/DSN.2018.00064},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/TorabiBAGBD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/TorabiB16,
  author       = {Sadegh Torabi and
                  Konstantin Beznosov},
  title        = {Sharing Health Information on Facebook: Practices, Preferences, and
                  Risk Perceptions of North American Users},
  booktitle    = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver,
                  CO, USA, June 22-24, 2016},
  pages        = {301--320},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/torabi},
  timestamp    = {Thu, 05 Sep 2024 15:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/TorabiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TorabiB13,
  author       = {Sadegh Torabi and
                  Konstantin Beznosov},
  editor       = {Kevin Fu and
                  Darren Lacey and
                  Zachary N. J. Peterson},
  title        = {Privacy Aspects of Health Related Information Sharing in Online Social
                  Networks},
  booktitle    = {2013 {USENIX} Workshop on Health Information Technologies, HealthTech
                  '13, Washington, DC, USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/torabi},
  timestamp    = {Mon, 01 Feb 2021 08:43:15 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/TorabiB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/procedia/MahdiASRT12,
  author       = {Khaled Mahdi and
                  Ahmed Almajid and
                  Maytham Safar and
                  Hernan Riquelme and
                  Sadegh Torabi},
  editor       = {Elhadi M. Shakshuki and
                  Muhammad Younas},
  title        = {Social Network Analysis of Kuwait Publicly-Held Corporations},
  booktitle    = {Proceedings of the 3rd International Conference on Ambient Systems,
                  Networks and Technologies {(ANT} 2012), the 9th International Conference
                  on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario,
                  Canada, August 27-29, 2012},
  series       = {Procedia Computer Science},
  volume       = {10},
  pages        = {272--281},
  publisher    = {Elsevier},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.procs.2012.06.037},
  doi          = {10.1016/J.PROCS.2012.06.037},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/procedia/MahdiASRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}