Mohamed Nassar
Mohamed Nassar
Verified email at
Cited by
Cited by
Monitoring SIP Traffic Using Support Vector Machines
M Nassar, R State, O Festor
Recent Advances in Intrusion Detection, 311-330, 2008
Blockchain for explainable and trustworthy artificial intelligence
M Nassar, K Salah, MH ur Rehman, D Svetinovic
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1340, 2019
Holistic VoIP intrusion detection and prevention system
M Nassar, S Niccolini, R State, T Ewald
Proceedings of the 1st international conference on Principles, systems and …, 2007
Voip Honeypot Architecture
M Nassar, O Festor
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
Intrusion detection mechanisms for VoIP applications
M Nassar, R State, O Festor
Secure and private outsourcing of shape-based feature extraction
S Wang, M Nassar, M Atallah, Q Malluhi
Information and Communications Security: 15th International Conference …, 2013
Paillier's encryption: Implementation and cloud applications
M Nassar, A Erradi, QM Malluhi
2015 International Conference on Applied Research in Computer Science and …, 2015
Artemisa: An open-source honeypot back-end to support security in VoIP domains
R Do Carmo, M Nassar, O Festor
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
Modeling malware as a language
Y Awad, M Nassar, H Safa
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
Labeled VoIP data-set for intrusion detection evaluation
M Nassar, R State, O Festor
Networked Services and Applications-Engineering, Control and Management, 97-106, 2010
Secure outsourcing of network flow data analysis
M Nassar, B al Bouna, Q Malluhi
2013 IEEE International Congress on Big Data, 431-432, 2013
Benchmarking convolutional and recurrent neural networks for malware classification
H Safa, M Nassar, WAR Al Orabi
2019 15th International Wireless Communications & Mobile Computing …, 2019
A survey on fraud and service misuse in voice over IP (VoIP) networks
Y Rebahi, M Nassar, T Magedanz, O Festor
Information Security Technical Report 16 (1), 12-19, 2011
Securing aggregate queries for DNA databases
M Nassar, Q Malluhi, M Atallah, A Shikfa
IEEE Transactions on Cloud Computing 7 (3), 827-837, 2017
Secure outsourcing of matrix operations as a service
M Nassar, A Erradi, F Sabri, QM Malluhi
2013 IEEE Sixth International Conference on Cloud Computing, 918-925, 2013
VoIP malware: Attack tool & attack scenarios
M Nassar, R State, O Festor
2009 IEEE International Conference on Communications, 1-6, 2009
Risk management in VoIP infrastructures using support vector machines
M Nassar, O Dabbebi, R Badonnel, O Festor
2010 International Conference on Network and Service Management, 48-55, 2010
RPig: A scalable framework for machine learning and advanced statistical functionalities
MX Wang, SB Handurukande, M Nassar
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
Transfer learning for malware multi-classification
MA Kadri, M Nassar, H Safa
Proceedings of the 23rd International Database Applications & Engineering …, 2019
A hybrid game theory and reinforcement learning approach for cyber-physical systems security
J Khoury, M Nassar
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2020
The system can't perform the operation now. Try again later.
Articles 1–20