Follow
Hamad BinSalleeh
Hamad BinSalleeh
Verified email at imamu.edu.sa
Title
Cited by
Cited by
Year
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010
3162010
Mining writeprints from anonymous e-mails for forensic investigation
F Iqbal, H Binsalleeh, BCM Fung, M Debbabi
digital investigation 7 (1-2), 56-64, 2010
2042010
A unified data mining solution for authorship analysis in anonymous textual communications
F Iqbal, H Binsalleeh, B Fung, M Debbabi
Information Sciences 231, 98-112, 2013
1392013
Detection of Malicious Payload Distribution Channels in DNS
AM Kara, H Binsalleeh, M Mannan, A Youssef, M Debbabi
552014
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats
I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ...
IEEE Access 7, 99508-99520, 2019
452019
Multidimensional investigation of source port 0 probing
E Bou-Harb, NE Lakhdari, H Binsalleeh, M Debbabi
Digital Investigation 11, S114-S123, 2014
302014
Defaming botnet toolkits: A bottom-up approach to mitigating the threat
T Ormerod, L Wang, M Debbabi, A Youssef, H Binsalleeh, A Boukhtouta, ...
2010 Fourth International Conference on Emerging Security Information …, 2010
262010
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection
I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro, S Lambotharan, ...
IEEE Access 6, 40008-40023, 2018
182018
Characterization of Covert Channels in DNS
H Binsalleeh, AM Kara, A Youssef, M Debbabi
New Technologies, Mobility and Security (NTMS), 2014 6th International …, 2014
152014
Anomaly Detection Using Dynamic Time Warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
2019 IEEE International Conference on Computational Science and Engineering …, 2019
132019
An implementation for a worm detection and mitigation system
H Binsalleeh, A Youssef
2008 24th Biennial Symposium on Communications, 54-57, 2008
122008
Using RFID tags to improve pilgrimage management
H Binsalleeh, N Mohammed, PS Sandhu, F Aljumah, BCM Fung
2009 International Conference on Innovations in Information Technology (IIT …, 2009
102009
Analysis of Malware and Domain Name System Traffic
H Binsalleeh
Concordia University, 2014
42014
Botnets: Analysis, Detection, and Mitigation
H Binsalleeh
Network Security Technologies: Design and Applications: Design and …, 2014
32014
Denial of service detection using dynamic time warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
International Journal of Network Management, e2159, 2021
22021
Comparative analysis on imbalanced multi-class classification for malware samples using CNN
A Alzammam, H Binsalleeh, B AsSadhan, KG Kyriakopoulos, ...
2019 International Conference on Advances in the Emerging Computing …, 2020
22020
Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis
B AsSadhan, A Alzoghaiby, H Binsalleeh, KG Kyriakopoulos, ...
International Journal of Network Management 30 (6), e2129, 2020
12020
Design and implementation of a worm detection and mitigation system
H Binsalleeh
Concordia University, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–18