Mourad Debbabi mostly deals with Computer security, Malware, Data mining, Programming language and Computer network. His primary area of study in Computer security is in the field of Adversary model. His work carried out in the field of Malware brings together such families of science as Network security, Reverse engineering, Artificial intelligence, Server and Botnet.
His study explores the link between Data mining and topics such as Anonymity that cross with problems in Pattern analysis, Trajectory, Exploit and Cluster analysis. His Programming language study frequently involves adjacent topics like Dead code. His Computer network research is multidisciplinary, relying on both Domain Name System, Wireless ad hoc network and Intrusion detection system.
His main research concerns Computer security, Programming language, Theoretical computer science, Malware and Software engineering. His Computer security research is multidisciplinary, incorporating elements of Darknet and The Internet. His study in the field of Semantics, Activity diagram, Java and Aspect-oriented programming also crosses realms of Weaving.
His Activity diagram course of study focuses on Systems Modeling Language and Model checking. His studies in Theoretical computer science integrate themes in fields like Cryptographic protocol, Correctness and Compiler. His study looks at the relationship between Malware and fields such as Artificial intelligence, as well as how they intersect with chemical problems.
Mourad Debbabi focuses on Computer security, Cloud computing, Malware, Audit and Distributed computing. His Computer security study frequently links to adjacent areas such as Network telescope. His Cloud computing research also works with subjects such as
His study in Malware is interdisciplinary in nature, drawing from both Machine learning, Digital forensics, Reverse engineering and Artificial intelligence. His research in Reverse engineering intersects with topics in Compiler, Malware analysis and Identification. The Distributed computing study combines topics in areas such as Software deployment, Factor, Overlay, Testbed and Key.
Mourad Debbabi spends much of his time researching Smart grid, Computer security, Coding, Distributed computing and Exploit. His work in the fields of Computer security, such as Information sensitivity, overlaps with other areas such as Vendor. His Distributed computing study combines topics from a wide range of disciplines, such as Abstraction, Network Functions Virtualization, Cloud computing and Testbed.
His work on Software security assurance as part of his general Cloud computing study is frequently connected to Enforcement, thereby bridging the divide between different branches of science. His studies deal with areas such as Agency, Jitter and Network packet as well as Exploit. His work carried out in the field of Artificial intelligence brings together such families of science as Machine learning and Malware.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Survey and a Layered Taxonomy of Software-Defined Networking
Yosr Jarraya;Taous Madi;Mourad Debbabi.
IEEE Communications Surveys and Tutorials (2014)
On the analysis of the Zeus botnet crimeware toolkit
H. Binsalleeh;T. Ormerod;A. Boukhtouta;P. Sinha.
conference on privacy, security and trust (2010)
Static Detection of Malicious Code in Executable Programs
J. Bergeron;M. Debbabi;J. Desharnais;M. M. Erhioui.
MalDozer: Automatic framework for android malware detection using deep learning
ElMouatez Billah Karbab;Mourad Debbabi;Abdelouahid Derhab;Djedjiga Mouheb.
Digital Investigation (2018)
Communication security for smart grid distribution networks
E. Bou-Harb;C. Fachkha;M. Pourzandi;M. Debbabi.
IEEE Communications Magazine (2013)
Mining writeprints from anonymous e-mails for forensic investigation
Farkhund Iqbal;Hamad Binsalleeh;Benjamin C. M. Fung;Mourad Debbabi.
Digital Investigation (2010)
Systems Modeling Language
Mourad Debbabi;Fawzi Hassaïne;Yosr Jarraya;Andrei Soeanu.
Cyber Scanning: A Comprehensive Survey
Elias Bou-Harb;Mourad Debbabi;Chadi Assi.
IEEE Communications Surveys and Tutorials (2014)
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
Noman Mohammed;Hadi Otrok;Lingyu Wang;Mourad Debbabi.
IEEE Transactions on Dependable and Secure Computing (2011)
A novel approach of mining write-prints for authorship attribution in e-mail forensics
Farkhund Iqbal;Rachid Hadjidj;Benjamin C. M. Fung;Mourad Debbabi.
Digital Investigation (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: