top of page

Recherche

Domaines de recherche

Matériel et logiciels pour la sécurité informatique
Sécurité des systèmes d'information
Technologies de la cybersécurité et de la confidentialité
Cybersecurity and privacy technologies
Hardware and software for computer security
Information system security

Ce champ ne comporte pas de données en ce moment.

Unités de recherche

CRDM, Centre de recherche en données massives

Centres de recherche reconnus

Recognized research centers

Ce champ ne comporte pas de données en ce moment.

Publications

9 de 54

2022

Arabic Cyberbullying Detection from Imbalanced Dataset Using Machine Learning

AlFarah M.E., Kamel I., Al Aghbari Z., Mouheb D.

AlFarah M.E., Kamel I., Al Aghbari Z., Mouheb D.

Communications in Computer and Information Science

Livre

Book

2021

Background and Related Work

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Advances in Information Security

Chapitre de livre

Book chapter

2021

Fingerprinting Cyber-Infrastructures of Android Malware

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Advances in Information Security

Chapitre de livre

Book chapter

2021

Robust Android Malicious Community Fingerprinting

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Advances in Information Security

Chapitre de livre

Book chapter

2021

Android Malware Fingerprinting Using Dynamic Analysis

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Advances in Information Security

Chapitre de livre

Book chapter

2021

Fingerprinting Android Malware Packages

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Advances in Information Security

Chapitre de livre

Book chapter

2021

Introduction

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Advances in Information Security

Chapitre de livre

Book chapter

2021

Conclusion

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Advances in Information Security

Chapitre de livre

Book chapter

2021

Resilient and Adaptive Android Malware Fingerprinting and Detection

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Billah Karbab E.M., Debbabi M., Derhab A., Mouheb D.

Advances in Information Security

Chapitre de livre

Book chapter

Ce champ ne comporte pas de données en ce moment.

Champs d’intérêts 

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

Projets de recherche subventionnés

En cours

Combatting Cyber Influence Operations in Online Social Media

Programme: Appel à propositions 2024
Organisme(s) subventionnaire(s): Consortium National pour la cybersécurité

Program: Appel à propositions 2024
Granting organization(s): Consortium National pour la cybersécurité

Du 1 novembre 2024 au 31 octobre 2027

From November 1, 2024 to October 31, 2027

Ce champ ne comporte pas de données en ce moment.

Chaires de recherche

Passés

Ce champ ne comporte pas de données en ce moment.

bottom of page