D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 36 Citations 7,145 386 World Ranking 7121 National Ranking 301

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • The Internet

Mourad Debbabi mostly deals with Computer security, Malware, Data mining, Programming language and Computer network. His primary area of study in Computer security is in the field of Adversary model. His work carried out in the field of Malware brings together such families of science as Network security, Reverse engineering, Artificial intelligence, Server and Botnet.

His study explores the link between Data mining and topics such as Anonymity that cross with problems in Pattern analysis, Trajectory, Exploit and Cluster analysis. His Programming language study frequently involves adjacent topics like Dead code. His Computer network research is multidisciplinary, relying on both Domain Name System, Wireless ad hoc network and Intrusion detection system.

His most cited work include:

  • A Survey and a Layered Taxonomy of Software-Defined Networking (233 citations)
  • On the analysis of the Zeus botnet crimeware toolkit (177 citations)
  • Static Detection of Malicious Code in Executable Programs (166 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Programming language, Theoretical computer science, Malware and Software engineering. His Computer security research is multidisciplinary, incorporating elements of Darknet and The Internet. His study in the field of Semantics, Activity diagram, Java and Aspect-oriented programming also crosses realms of Weaving.

His Activity diagram course of study focuses on Systems Modeling Language and Model checking. His studies in Theoretical computer science integrate themes in fields like Cryptographic protocol, Correctness and Compiler. His study looks at the relationship between Malware and fields such as Artificial intelligence, as well as how they intersect with chemical problems.

He most often published in these fields:

  • Computer security (29.67%)
  • Programming language (20.20%)
  • Theoretical computer science (13.04%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (29.67%)
  • Cloud computing (6.91%)
  • Malware (12.02%)

In recent papers he was focusing on the following fields of study:

Mourad Debbabi focuses on Computer security, Cloud computing, Malware, Audit and Distributed computing. His Computer security study frequently links to adjacent areas such as Network telescope. His Cloud computing research also works with subjects such as

  • Dependency that intertwine with fields like Proof of concept and Software security assurance,
  • Consistency that connect with fields like Layer, Isolation, Focus and Agile software development.

His study in Malware is interdisciplinary in nature, drawing from both Machine learning, Digital forensics, Reverse engineering and Artificial intelligence. His research in Reverse engineering intersects with topics in Compiler, Malware analysis and Identification. The Distributed computing study combines topics in areas such as Software deployment, Factor, Overlay, Testbed and Key.

Between 2018 and 2021, his most popular works were:

  • Wordnet-Based Criminal Networks Mining for Cybercrime Investigation (14 citations)
  • Evolutionary learning algorithm for reliable facility location under disruption (13 citations)
  • MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports (12 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • The Internet

Mourad Debbabi spends much of his time researching Smart grid, Computer security, Coding, Distributed computing and Exploit. His work in the fields of Computer security, such as Information sensitivity, overlaps with other areas such as Vendor. His Distributed computing study combines topics from a wide range of disciplines, such as Abstraction, Network Functions Virtualization, Cloud computing and Testbed.

His work on Software security assurance as part of his general Cloud computing study is frequently connected to Enforcement, thereby bridging the divide between different branches of science. His studies deal with areas such as Agency, Jitter and Network packet as well as Exploit. His work carried out in the field of Artificial intelligence brings together such families of science as Machine learning and Malware.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A Survey and a Layered Taxonomy of Software-Defined Networking

Yosr Jarraya;Taous Madi;Mourad Debbabi.
IEEE Communications Surveys and Tutorials (2014)

438 Citations

On the analysis of the Zeus botnet crimeware toolkit

H. Binsalleeh;T. Ormerod;A. Boukhtouta;P. Sinha.
conference on privacy, security and trust (2010)

315 Citations

Static Detection of Malicious Code in Executable Programs

J. Bergeron;M. Debbabi;J. Desharnais;M. M. Erhioui.
(2000)

292 Citations

MalDozer: Automatic framework for android malware detection using deep learning

ElMouatez Billah Karbab;Mourad Debbabi;Abdelouahid Derhab;Djedjiga Mouheb.
Digital Investigation (2018)

233 Citations

Communication security for smart grid distribution networks

E. Bou-Harb;C. Fachkha;M. Pourzandi;M. Debbabi.
IEEE Communications Magazine (2013)

228 Citations

Mining writeprints from anonymous e-mails for forensic investigation

Farkhund Iqbal;Hamad Binsalleeh;Benjamin C. M. Fung;Mourad Debbabi.
Digital Investigation (2010)

205 Citations

Systems Modeling Language

Mourad Debbabi;Fawzi Hassaïne;Yosr Jarraya;Andrei Soeanu.
(2010)

164 Citations

Cyber Scanning: A Comprehensive Survey

Elias Bou-Harb;Mourad Debbabi;Chadi Assi.
IEEE Communications Surveys and Tutorials (2014)

157 Citations

Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET

Noman Mohammed;Hadi Otrok;Lingyu Wang;Mourad Debbabi.
IEEE Transactions on Dependable and Secure Computing (2011)

155 Citations

A novel approach of mining write-prints for authorship attribution in e-mail forensics

Farkhund Iqbal;Rachid Hadjidj;Benjamin C. M. Fung;Mourad Debbabi.
Digital Investigation (2008)

151 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Mourad Debbabi

Benjamin C. M. Fung

Benjamin C. M. Fung

McGill University

Publications: 25

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 20

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 10

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 10

Mamoun Alazab

Mamoun Alazab

Charles Darwin University

Publications: 8

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 8

Peter Christen

Peter Christen

Australian National University

Publications: 8

Mauro Conti

Mauro Conti

University of Padua

Publications: 8

Thomas Reps

Thomas Reps

University of Wisconsin–Madison

Publications: 7

Ali Dehghantanha

Ali Dehghantanha

University of Guelph

Publications: 7

Roberto Baldoni

Roberto Baldoni

Sapienza University of Rome

Publications: 6

Ali A. Ghorbani

Ali A. Ghorbani

University of New Brunswick

Publications: 6

Zidong Wang

Zidong Wang

Brunel University London

Publications: 6

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 6

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 6

Shui Yu

Shui Yu

University of Technology Sydney

Publications: 6

Trending Scientists

Edwin H.W. Chan

Edwin H.W. Chan

Hong Kong Polytechnic University

David B. Humphrey

David B. Humphrey

Florida State University

Yin Zhang

Yin Zhang

The University of Texas at Austin

Pietro Valdastri

Pietro Valdastri

University of Leeds

Stephen R. Stürzenbaum

Stephen R. Stürzenbaum

King's College London

Robert C. Anderson

Robert C. Anderson

California Institute of Technology

Mikael Fortelius

Mikael Fortelius

University of Helsinki

Gregory J. McCabe

Gregory J. McCabe

United States Geological Survey

Carol A. Wessman

Carol A. Wessman

University of Colorado Boulder

John M. Jakicic

John M. Jakicic

University of Pittsburgh

Marsha Dowda

Marsha Dowda

University of South Carolina

Mijna Hadders-Algra

Mijna Hadders-Algra

University Medical Center Groningen

Jane Kenway

Jane Kenway

Monash University

Krister Andersson

Krister Andersson

University of Colorado Boulder

Genia Kostka

Genia Kostka

Freie Universität Berlin

Ted G. Jelen

Ted G. Jelen

University of Nevada, Las Vegas

Something went wrong. Please try again later.