default search action
ElMouatez Billah Karbab
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Abdelouahab Amira, Abdelouahid Derhab, Elmouatez Billah Karbab, Omar Nouali:
A Survey of Malware Analysis Using Community Detection Algorithms. ACM Comput. Surv. 56(2): 40:1-40:29 (2024) - 2023
- [j11]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab:
SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features. Expert Syst. Appl. 225: 120017 (2023) - 2022
- [j10]Aniss Chohra, Paria Shirani, ElMouatez Billah Karbab, Mourad Debbabi:
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection. Comput. Secur. 117: 102684 (2022) - [j9]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. IEEE Trans. Dependable Secur. Comput. 19(1): 402-418 (2022) - 2021
- [b1]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198 - [j8]Abdelouahab Amira, Abdelouahid Derhab, ElMouatez Billah Karbab, Omar Nouali, Farrukh Aslam Khan:
TriDroid: a triage and classification framework for fast detection of mobile threats in android markets. J. Ambient Intell. Humaniz. Comput. 12(2): 1731-1755 (2021) - [c9]ElMouatez Billah Karbab, Mourad Debbabi:
PetaDroid: Adaptive Android Malware Detection Using Deep Learning. DIMVA 2021: 319-340 - [i6]ElMouatez Billah Karbab, Mourad Debbabi:
Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques. CoRR abs/2105.13491 (2021) - 2020
- [j7]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. Comput. Secur. 96: 101932 (2020) - [j6]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97: 101965 (2020) - [i5]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Clustering using Community Detection on Android Packages Similarity Network. CoRR abs/2005.06075 (2020)
2010 – 2019
- 2019
- [j5]ElMouatez Billah Karbab, Mourad Debbabi:
MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports. Digit. Investig. 28 Supplement: S77-S87 (2019) - [c8]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - 2018
- [j4]Houssem Eddine Bordjiba, ElMouatez Billah Karbab, Mourad Debbabi:
Data-driven approach for automatic telephony threat analysis and campaign detection. Digit. Investig. 24 Supplement: S131-S141 (2018) - [j3]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 24 Supplement: S48-S59 (2018) - [c7]ElMouatez Billah Karbab, Mourad Debbabi:
ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. ARES 2018: 20:1-20:10 - [i4]ElMouatez Billah Karbab, Mourad Debbabi:
Automatic Investigation Framework for Android Malware Cyber-Infrastructures. CoRR abs/1806.08893 (2018) - [i3]ElMouatez Billah Karbab, Mourad Debbabi:
Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analysis Reports. CoRR abs/1812.10327 (2018) - 2017
- [c6]Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal:
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. ARES 2017: 23:1-23:11 - [i2]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware. CoRR abs/1702.05699 (2017) - [i1]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Deep Learning on API Method Sequences. CoRR abs/1712.08996 (2017) - 2016
- [j2]ElMouatez Billah Karbab, Mourad Debbabi, Djedjiga Mouheb:
Fingerprinting Android packaging: Generating DNAs for malware detection. Digit. Investig. 18 Supplement: S33-S45 (2016) - [c5]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Cypider: building community-based cyber-defense infrastructure for android malware detection. ACSAC 2016: 348-362 - [c4]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: dynamic fingerprinting for the automatic detection of android malware. MALWARE 2016: 139-146 - 2015
- [j1]Djamel Djenouri, Elmouatezbillah Karbab, Sahar Boulkaboul, Antoine B. Bagula:
Networked Wireless Sensors, Active RFID, and Handheld Devices for Modern Car Park Management: WSN, RFID, and Mob Devs for Car Park Management. Int. J. Handheld Comput. Res. 6(3): 33-45 (2015) - [c3]Elmouatezbillah Karbab, Djamel Djenouri, Sahar Boulkaboul, Antoine B. Bagula:
Car park management with networked wireless sensors and active RFID. EIT 2015: 373-378 - 2013
- [c2]Antoine Bigomokero Bagula, Djamel Djenouri, Elmouatezbillah Karbab:
On the Relevance of Using Interference and Service Differentiation Routing in the Internet-of-Things. NEW2AN 2013: 25-35 - [c1]Antoine B. Bagula, Djamel Djenouri, Elmouatezbillah Karbab:
Ubiquitous sensor network management: The least interference beaconing model. PIMRC 2013: 2352-2356
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint