default search action
Saed Alrabaee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Saleh H. Aldaajeh, Saed Alrabaee:
Strategic cybersecurity. Comput. Secur. 141: 103845 (2024) - [j27]Ahmad Azab, Mahmoud Khasawneh, Saed Alrabaee, Kim-Kwang Raymond Choo, Maysa Sarsour:
Network traffic classification: Techniques, datasets, and challenges. Digit. Commun. Networks 10(3): 676-692 (2024) - [j26]George Grispos, Hudan Studiawan, Saed Alrabaee:
Internet of things (IoT) forensics and incident response: The good, the bad, and the unaddressed. Forensic Sci. Int. Digit. Investig. 48: 301671 (2024) - [j25]Wasif Khan, Saed Alrabaee, Mousa Al-Kfairy, Jie Tang, Kim-Kwang Raymond Choo:
Compiler-provenance identification in obfuscated binaries using vision transformers. Forensic Sci. Int. Digit. Investig. 49: 301764 (2024) - [j24]Mousa Al-Kfairy, Ahmed Shuhaiber, Ayman Wael Al-Khatib, Saed Alrabaee:
Social Commerce Adoption Model Based on Usability, Perceived Risks, and Institutional Trust. IEEE Trans. Engineering Management 71: 3599-3612 (2024) - [j23]Amjad Abu-Mahfouz, Saed Alrabaee, Mahmoud Khasawneh, Marton Gergely, Kim-Kwang Raymond Choo:
A Deep Learning Approach to Discover Router Firmware Vulnerabilities. IEEE Trans. Ind. Informatics 20(1): 691-702 (2024) - [c31]Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, Ahmed Hashem El Fiky:
Using AI to Detect Android Malware Families. DRCN 2024: 1-8 - 2023
- [j22]Mahmoud Khasawneh, Ahmad Azab, Saed Alrabaee, Heba Sakkal, Hossameldein Hussein Bakhit:
Convergence of IoT and Cognitive Radio Networks: A Survey of Applications, Techniques, and Challenges. IEEE Access 11: 71097-71112 (2023) - [j21]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. ACM Comput. Surv. 55(2): 19:1-19:41 (2023) - [j20]Heba Saleous, Muhusina Ismail, Saleh H. Aldaajeh, Nisha Madathil, Saed Alrabaee, Kim-Kwang Raymond Choo, Nabeel Al-Qirim:
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. Digit. Commun. Networks 9(1): 211-222 (2023) - [j19]Fatma Taher, Omar Al Fandi, Mousa Al-Kfairy, Hussam M. N. Al Hamadi, Saed Alrabaee:
A Proposed Artificial Intelligence Model for Android-Malware Detection. Informatics 10(3): 67 (2023) - [j18]Ahmed Shuhaiber, Mousa Al-Kfairy, Saed Alrabaee:
The Good, The Bad, and The Ugly About Insta Shopping: A Qualitative Study. IEEE Trans. Comput. Soc. Syst. 10(5): 2786-2796 (2023) - [j17]Mohammad Bany Taha, Saed Alrabaee, Kim-Kwang Raymond Choo:
Efficient Resource Management of Micro-Services in VANETs. IEEE Trans. Intell. Transp. Syst. 24(7): 6820-6835 (2023) - [j16]Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee, Kim-Kwang Raymond Choo:
A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs. IEEE Trans. Veh. Technol. 72(3): 3035-3050 (2023) - [c30]Heba M. Khater, Mohamad Khayat, Saed Alrabaee, Mohamed Adel Serhani, Ezedin Barka, Farag M. Sallabi:
AI Techniques for Software Vulnerability Detection and Mitigation. DSC 2023: 1-10 - [c29]Nisha Thorakkattu Madathil, Saed Alrabaee, Mousa Al-Kfairy, Rafat Damseh, Abdelkader Nasreddine Belkacem:
AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks. EDUCON 2023: 1-6 - [c28]Muhusina Ismail, Saed Alrabaee, Saad Harous, Kim-Kwang Raymond Choo:
Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks. FABULOUS 2023: 99-116 - [c27]Noora Alhosani, Saed Alrabaee, Ahmed Al-Faresi:
An Efficient Strategy for Deploying Deception Technology. FABULOUS 2023: 177-194 - [c26]Abdelkader Nasreddine Belkacem, Nuraini Jamil, Saed Alrabaee:
Investigating Online Searching Behavior Based on Google Trends in MENA Region Before and After COVID-19. FIE 2023: 1-7 - [c25]Wadha Alyammahi, Saed Alrabaee:
SES: Smart Education System. ICCA 2023: 1-4 - [c24]Nisha Thorakkattu Madathil, Winner Abula, Shooq Alaboolan, Maryam Almadhaani, Saed Alrabaee:
PESS: Progress Enhancing Student Support. SmartNets 2023: 1-6 - 2022
- [j15]Saleh H. Aldaajeh, Heba Saleous, Saed Alrabaee, Ezedin Barka, Frank Breitinger, Kim-Kwang Raymond Choo:
The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 119: 102754 (2022) - [j14]Saed Alrabaee:
A stratified approach to function fingerprinting in program binaries using diverse features. Expert Syst. Appl. 193: 116384 (2022) - [j13]Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee:
TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [c23]Saed Alrabaee, Mousa Al-Kfairy, Ezedin Barka:
Efforts and Suggestions for Improving Cybersecurity Education. EDUCON 2022: 1161-1168 - [c22]Latifa Al Kaabi, Wadha Al Ketbi, Aysha Al Khoori, Maitha Al Shamsi, Saed Alrabaee:
Safe: Cryptographic Algorithms and Security Principles Gamification. EDUCON 2022: 1169-1178 - [c21]Mohammad Qbea'h, Saed Alrabaee, Mohammad Aref Alshraideh, Khair Eddin Sabri:
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review. ICCA 2022: 1-5 - 2021
- [j12]Saleh H. Aldaajeh, Saad Harous, Saed Alrabaee:
Fault-Detection Tactics for Optimized Embedded Systems Efficiency. IEEE Access 9: 91328-91340 (2021) - [c20]Saed Alrabaee, Raed Manna:
Boosting Students and Teachers Cybersecurity Awareness During COVID-19 Pandemic. EDUCON 2021: 726-731 - [c19]Saed Alrabaee, Kim-Kwang Raymond Choo, Mohammad Qbea'h, Mahmoud Khasawneh:
BinDeep: Binary to Source Code Matching Using Deep Learning. TrustCom 2021: 1100-1107 - 2020
- [b1]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j11]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. IEEE Trans. Inf. Forensics Secur. 15: 3051-3066 (2020) - [c18]Mohammad Qbea'h, Saed Alrabaee, Djedjiga Mouheb:
An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks. ICISSP 2020: 603-610
2010 – 2019
- 2019
- [j10]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
On the feasibility of binary authorship characterization. Digit. Investig. 28 Supplement: S3-S11 (2019) - [j9]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. J. Comput. Secur. 27(6): 613-648 (2019) - [c17]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - [c16]Venkatraman Balasubramanian, Faisal Zaman, Moayad Aloqaily, Saed Alrabaee, Maria Gorlatova, Martin Reisslein:
Reinforcing the Edge: Autonomous Energy Management for Mobile Device Clouds. INFOCOM Workshops 2019: 44-49 - [c15]Peter Casey, Mateusz Topor, Emily Hennessy, Saed Alrabaee, Moayad Aloqaily, Azzedine Boukerche:
Applied Comparative Evaluation of the Metasploit Evasion Module. ISCC 2019: 1-6 - 2018
- [j8]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Trans. Priv. Secur. 21(2): 8:1-8:34 (2018) - [c14]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. ESORICS (1) 2018: 26-47 - 2017
- [j7]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103]. Digit. Investig. 21: 89 (2017) - [i2]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. CoRR abs/1701.02711 (2017) - [i1]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware. CoRR abs/1702.05699 (2017) - 2016
- [j6]Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs). Digit. Investig. 18 Supplement: S11-S22 (2016) - [j5]Mahmoud Khasawneh, Saed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman:
Power trading in cognitive radio networks. J. Netw. Comput. Appl. 65: 155-166 (2016) - [c13]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. FPS 2016: 256-272 - [c12]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: dynamic fingerprinting for the automatic detection of android malware. MALWARE 2016: 139-146 - 2015
- [j4]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code. Digit. Investig. 12 Supplement 1: S61-S71 (2015) - [j3]Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinComp: A stratified approach to compiler provenance Attribution. Digit. Investig. 14 Supplement 1: S146-S155 (2015) - [c11]Paria Shirani, Mohammad Abdollahi Azgomi, Saed Alrabaee:
A method for intrusion detection in web services based on time series. CCECE 2015: 836-841 - 2014
- [j2]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
OBA2: An Onion approach to Binary code Authorship Attribution. Digit. Investig. 11(Supplement 1): S94-S103 (2014) - [j1]Saed Alrabaee, Mahmoud Khasawneh, Anjali Agarwal, Nishith Goel, Marzia Zaman:
Applications architectures and protocol design issues for cognitive radio networks: a survey. Int. J. Wirel. Mob. Comput. 7(5): 415-427 (2014) - [c10]Saed Alrabaee, Ahmed Saleh Bataineh, Fawaz Ali Khasawneh, Rachida Dssouli:
Using model checking for Trivial File Transfer Protocol validation. COMNET 2014: 1-7 - [c9]Saed Alrabaee, Khaled Khateeb, Fawaz Ali Khasawneh:
Preserving Database Privacy in Cloud Computing. SNDS 2014: 485-495 - 2012
- [c8]Saed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman, Mahmoud Khasawneh:
Comparison of Spectrum Management without Game Theory (SMWG) and with Game Theory (SMG) for Network Performance in Cognitive Radio Network. BWCCA 2012: 348-355 - [c7]Saed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman, Mahmoud Khasawneh:
Routing Management Algorithm Based on Spectrum Trading and Spectrum Competition in Cognitive Radio Networks. BWCCA 2012: 614-619 - [c6]Saed Alrabaee, Mahmoud Khasawneh, Anjali Agarwal, Nishith Goel, Marzia Zaman:
A game theory approach: Dynamic behaviours for spectrum management in cognitive radio network. GLOBECOM Workshops 2012: 919-924 - [c5]Saed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman, Mahmoud Khasawneh:
Higher layer issues in cognitive radio network. ICACCI 2012: 325-330 - [c4]Mahmoud Khasawneh, Anjali Agarwal, Nishith Goel, Marzia Zaman, Saed Alrabaee:
A price setting approach to power trading in cognitive radio networks. ICUMT 2012: 878-883 - [c3]Saed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman, Mahmoud Khasawneh:
A game theoretic approach to spectrum management in cognitive radio network. ICUMT 2012: 906-913 - [c2]Mahmoud Khasawneh, Anjali Agarwal, Nishith Goel, Marzia Zaman, Saed Alrabaee:
A game theoretic approach to power trading in cognitive radio systems. SoftCOM 2012: 1-5 - [c1]Mahmoud Khasawneh, Anjali Agarwal, Nishith Goel, Marzia Zaman, Saed Alrabaee:
Sureness efficient energy technique for cooperative spectrum sensing in cognitive radios. TEMU 2012: 25-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint