H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 35 Citations 6,715 295 World Ranking 6050 National Ranking 260

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • The Internet

Mourad Debbabi mostly deals with Computer security, Malware, Data mining, Programming language and Computer network. His primary area of study in Computer security is in the field of Adversary model. His work carried out in the field of Malware brings together such families of science as Network security, Reverse engineering, Artificial intelligence, Server and Botnet.

His study explores the link between Data mining and topics such as Anonymity that cross with problems in Pattern analysis, Trajectory, Exploit and Cluster analysis. His Programming language study frequently involves adjacent topics like Dead code. His Computer network research is multidisciplinary, relying on both Domain Name System, Wireless ad hoc network and Intrusion detection system.

His most cited work include:

  • A Survey and a Layered Taxonomy of Software-Defined Networking (233 citations)
  • On the analysis of the Zeus botnet crimeware toolkit (177 citations)
  • Static Detection of Malicious Code in Executable Programs (166 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Programming language, Theoretical computer science, Malware and Software engineering. His Computer security research is multidisciplinary, incorporating elements of Darknet and The Internet. His study in the field of Semantics, Activity diagram, Java and Aspect-oriented programming also crosses realms of Weaving.

His Activity diagram course of study focuses on Systems Modeling Language and Model checking. His studies in Theoretical computer science integrate themes in fields like Cryptographic protocol, Correctness and Compiler. His study looks at the relationship between Malware and fields such as Artificial intelligence, as well as how they intersect with chemical problems.

He most often published in these fields:

  • Computer security (29.67%)
  • Programming language (20.20%)
  • Theoretical computer science (13.04%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (29.67%)
  • Cloud computing (6.91%)
  • Malware (12.02%)

In recent papers he was focusing on the following fields of study:

Mourad Debbabi focuses on Computer security, Cloud computing, Malware, Audit and Distributed computing. His Computer security study frequently links to adjacent areas such as Network telescope. His Cloud computing research also works with subjects such as

  • Dependency that intertwine with fields like Proof of concept and Software security assurance,
  • Consistency that connect with fields like Layer, Isolation, Focus and Agile software development.

His study in Malware is interdisciplinary in nature, drawing from both Machine learning, Digital forensics, Reverse engineering and Artificial intelligence. His research in Reverse engineering intersects with topics in Compiler, Malware analysis and Identification. The Distributed computing study combines topics in areas such as Software deployment, Factor, Overlay, Testbed and Key.

Between 2018 and 2021, his most popular works were:

  • Wordnet-Based Criminal Networks Mining for Cybercrime Investigation (14 citations)
  • Evolutionary learning algorithm for reliable facility location under disruption (13 citations)
  • MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports (12 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • The Internet

Mourad Debbabi spends much of his time researching Smart grid, Computer security, Coding, Distributed computing and Exploit. His work in the fields of Computer security, such as Information sensitivity, overlaps with other areas such as Vendor. His Distributed computing study combines topics from a wide range of disciplines, such as Abstraction, Network Functions Virtualization, Cloud computing and Testbed.

His work on Software security assurance as part of his general Cloud computing study is frequently connected to Enforcement, thereby bridging the divide between different branches of science. His studies deal with areas such as Agency, Jitter and Network packet as well as Exploit. His work carried out in the field of Artificial intelligence brings together such families of science as Machine learning and Malware.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

A Survey and a Layered Taxonomy of Software-Defined Networking

Yosr Jarraya;Taous Madi;Mourad Debbabi.
IEEE Communications Surveys and Tutorials (2014)

393 Citations

On the analysis of the Zeus botnet crimeware toolkit

H. Binsalleeh;T. Ormerod;A. Boukhtouta;P. Sinha.
conference on privacy, security and trust (2010)

305 Citations

Static Detection of Malicious Code in Executable Programs

J. Bergeron;M. Debbabi;J. Desharnais;M. M. Erhioui.
(2000)

292 Citations

Communication security for smart grid distribution networks

E. Bou-Harb;C. Fachkha;M. Pourzandi;M. Debbabi.
IEEE Communications Magazine (2013)

201 Citations

Mining writeprints from anonymous e-mails for forensic investigation

Farkhund Iqbal;Hamad Binsalleeh;Benjamin C. M. Fung;Mourad Debbabi.
Digital Investigation (2010)

187 Citations

Systems Modeling Language

Mourad Debbabi;Fawzi Hassaïne;Yosr Jarraya;Andrei Soeanu.
(2010)

168 Citations

Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET

Noman Mohammed;Hadi Otrok;Lingyu Wang;Mourad Debbabi.
IEEE Transactions on Dependable and Secure Computing (2011)

148 Citations

MalDozer: Automatic framework for android malware detection using deep learning

ElMouatez Billah Karbab;Mourad Debbabi;Abdelouahid Derhab;Djedjiga Mouheb.
Digital Investigation (2018)

143 Citations

A novel approach of mining write-prints for authorship attribution in e-mail forensics

Farkhund Iqbal;Rachid Hadjidj;Benjamin C. M. Fung;Mourad Debbabi.
Digital Investigation (2008)

140 Citations

A unified data mining solution for authorship analysis in anonymous textual communications

Farkhund Iqbal;Hamad Binsalleeh;Benjamin C. M. Fung;Mourad Debbabi.
Information Sciences (2013)

135 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Mourad Debbabi

Benjamin C. M. Fung

Benjamin C. M. Fung

McGill University

Publications: 25

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 20

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 10

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 10

Mamoun Alazab

Mamoun Alazab

Charles Darwin University

Publications: 8

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 8

Peter Christen

Peter Christen

Australian National University

Publications: 8

Mauro Conti

Mauro Conti

University of Padua

Publications: 8

Thomas Reps

Thomas Reps

University of Wisconsin–Madison

Publications: 7

Ali Dehghantanha

Ali Dehghantanha

University of Guelph

Publications: 7

Roberto Baldoni

Roberto Baldoni

Sapienza University of Rome

Publications: 6

Ali A. Ghorbani

Ali A. Ghorbani

University of New Brunswick

Publications: 6

Zidong Wang

Zidong Wang

Brunel University London

Publications: 6

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 6

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 6

Something went wrong. Please try again later.