Follow
Elias Bou-Harb
Title
Cited by
Cited by
Year
Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
N Neshenko, E Bou-Harb, J Crichigno, G Kaddoum, N Ghani
IEEE Communications Surveys & Tutorials 21 (3), 2702-2733, 2019
7922019
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
3092018
Communication security for smart grid distribution networks
E Bou-Harb, C Fachkha, M Pourzandi, M Debbabi, C Assi
IEEE Communications Magazine 51 (1), 42-49, 2013
2742013
Cyber scanning: a comprehensive survey
E Bou-Harb, M Debbabi, C Assi
Ieee communications surveys & tutorials 16 (3), 1496-1519, 2013
2102013
An exhaustive survey on p4 programmable data plane switches: Taxonomy, applications, challenges, and future trends
EF Kfoury, J Crichigno, E Bou-Harb
IEEE access 9, 87094-87155, 2021
1422021
A big data-enabled consolidated framework for energy efficient software defined data centers in IoT setups
K Kaur, S Garg, G Kaddoum, E Bou-Harb, KKR Choo
IEEE Transactions on Industrial Informatics 16 (4), 2687-2697, 2019
972019
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
C Fachkha, E Bou-Harb, A Keliris, ND Memon, M Ahamad
NDSS, 2017
972017
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
MS Pour, A Mangino, K Friday, M Rathbun, E Bou-Harb, F Iqbal, ...
Computers & Security 91, 101707, 2020
812020
A collaborative security framework for software-defined wireless sensor networks
C Miranda, G Kaddoum, E Bou-Harb, S Garg, K Kaur
IEEE Transactions on Information Forensics and Security 15, 2602-2615, 2020
812020
Fingerprinting internet DNS amplification DDoS activities
C Fachkha, E Bou-Harb, M Debbabi
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
802014
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns
MS Pour, E Bou-Harb, K Varma, N Neshenko, DA Pados, KKR Choo
Digital Investigation 28, S40-S49, 2019
722019
Inferring distributed reflection denial of service attacks from darknet
C Fachkha, E Bou-Harb, M Debbabi
Computer Communications 62, 59-71, 2015
642015
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems
T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi
Computers & Security 112, 102511, 2022
602022
A comprehensive tutorial on science DMZ
J Crichigno, E Bou-Harb, N Ghani
IEEE Communications Surveys & Tutorials 21 (2), 2041-2078, 2018
602018
A multi-dimensional deep learning framework for iot malware classification and family attribution
M Dib, S Torabi, E Bou-Harb, C Assi
IEEE Transactions on Network and Service Management 18 (2), 1165-1177, 2021
582021
Towards a forecasting model for distributed denial of service activities
C Fachkha, E Bou-Harb, M Debbabi
2013 IEEE 12th International Symposium on Network Computing and Applications …, 2013
582013
A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb
Computers & Security 128, 103123, 2023
542023
Internet of malicious things: Correlating active and passive measurements for inferring and characterizing internet-scale unsolicited iot devices
F Shaikh, E Bou-Harb, N Neshenko, AP Wright, N Ghani
IEEE Communications Magazine 56 (9), 170-177, 2018
542018
A machine learning model for classifying unsolicited IoT devices by observing network telescopes
F Shaikh, E Bou-Harb, J Crichigno, N Ghani
2018 14th International Wireless Communications & Mobile Computing …, 2018
532018
Cyber meets control: A novel federated approach for resilient cps leveraging real cyber threat intelligence
E Bou-Harb, W Lucia, N Forti, S Weerakkody, N Ghani, B Sinopoli
IEEE Communications Magazine 55 (5), 198-204, 2017
532017
The system can't perform the operation now. Try again later.
Articles 1–20