Suivre
Nizar KHEIR
Nizar KHEIR
AWS
Adresse e-mail validée de amazon.fr - Page d'accueil
Titre
Citée par
Citée par
Année
Internet of things: a definition & taxonomy
B Dorsemaine, JP Gaulier, JP Wary, N Kheir, P Urien
2015 9th International Conference on Next Generation Mobile Applications …, 2015
3692015
A service dependency model for cost-sensitive intrusion response
N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
1612010
Phisheye: Live monitoring of sandboxed phishing kits
X Han, N Kheir, D Balzarotti
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1352016
Deception techniques in computer security: A research perspective
X Han, N Kheir, D Balzarotti
ACM Computing Surveys (CSUR) 51 (4), 1-36, 2018
852018
BlindIDS: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic
S Canard, A Diop, N Kheir, M Paindavoine, M Sabt
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
722017
Cost evaluation for intrusion response using dependency graphs
N Kheir, H Debar, N Cuppens-Boulahia, F Cuppens, J Viinikka
2009 international conference on network and service security, 1-6, 2009
632009
Evaluation of deception-based web attacks detection
X Han, N Kheir, D Balzarotti
Proceedings of the 2017 Workshop on Moving Target Defense, 65-73, 2017
452017
A new approach to investigate IoT threats based on a four layer model
B Dorsemaine, JP Gaulier, JP Wary, N Kheir, P Urien
2016 13th international conference on new technologies for distributed …, 2016
452016
Mentor: positive DNS reputation to skim-off benign domains in botnet C&C blacklists
N Kheir, F Tran, P Caron, N Deschamps
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
362014
Botsuer: Suing stealthy p2p bots in network traffic through netflow analysis
N Kheir, C Wolley
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
342013
Behavioral classification and detection of malware through http user agent anomalies
N Kheir
Journal of Information Security and Applications 18 (1), 2-13, 2013
272013
Response policies and counter-measure: management of service dependencies and intrusion and reaction impacts
N Kheir
Télécom Bretagne, 2010
272010
Analyzing http user agent anomalies for malware detection
N Kheir
International Workshop on Data Privacy Management, 187-200, 2012
252012
Towards a 5G security architecture: Articulating software-defined security and security as a service
G Blanc, N Kheir, D Ayed, V Lefebvre, EM de Oca, P Bisson
Proceedings of the 13th International Conference on Availability …, 2018
242018
Automated classification of C&C connections through malware URL clustering
N Kheir, G Blanc, H Debar, J Garcia-Alfaro, D Yang
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
212015
The role of cloud services in malicious software: Trends and insights
X Han, N Kheir, D Balzarotti
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
202015
Strategies for network resilience: Capitalising on policies
P Smith, A Schaeffer-Filho, A Ali, M Schöller, N Kheir, A Mauthe, ...
Mechanisms for Autonomous Management of Networks and Services: 4th …, 2010
192010
A new threat assessment method for integrating an IoT infrastructure in an information system
B Dorsemaine, JP Gaulier, JP Wary, N Kheir, P Urien
2017 IEEE 37th international conference on distributed computing systems …, 2017
152017
A grey-box approach for detecting malicious user interactions in web applications
W Ben Jaballah, N Kheir
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
152016
Behavioral fine-grained detection and classification of P2P bots
N Kheir, X Han, C Wolley
Journal of Computer Virology and Hacking Techniques 11, 217-233, 2015
132015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20