BibTeX records: Bassam Sayed

download as .bib file

@article{DBLP:journals/compsec/SayedTA18,
  author    = {Bassam Sayed and
               Issa Traor{\'{e}} and
               Amany Abdelhalim},
  title     = {If-transpiler: Inlining of hybrid flow-sensitive security monitor
               for JavaScript},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {92--117},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.017},
  doi       = {10.1016/j.cose.2018.01.017},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/SayedTA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SayedT14,
  author    = {Bassam Sayed and
               Issa Traor{\'{e}}},
  editor    = {Leonard Barolli and
               Kin Fun Li and
               Tomoya Enokido and
               Fatos Xhafa and
               Makoto Takizawa},
  title     = {Protection against Web 2.0 Client-Side Web Attacks Using Information
               Flow Control},
  booktitle = {28th International Conference on Advanced Information Networking and
               Applications Workshops, {AINA} 2014 Workshops, Victoria, BC, Canada,
               May 13-16, 2014},
  pages     = {261--268},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://doi.org/10.1109/WAINA.2014.52},
  doi       = {10.1109/WAINA.2014.52},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/aina/SayedT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SayedTA14,
  author    = {Bassam Sayed and
               Issa Traor{\'{e}} and
               Amany Abdelhalim},
  editor    = {Ali Miri and
               Urs Hengartner and
               Nen{-}Fu Huang and
               Audun J{\o}sang and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title     = {Detection and mitigation of malicious JavaScript using information
               flow control},
  booktitle = {2014 Twelfth Annual International Conference on Privacy, Security
               and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages     = {264--273},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://doi.org/10.1109/PST.2014.6890948},
  doi       = {10.1109/PST.2014.6890948},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/pst/SayedTA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoTSLSGG13,
  author    = {David Zhao and
               Issa Traor{\'{e}} and
               Bassam Sayed and
               Wei Lu and
               Sherif Saad and
               Ali A. Ghorbani and
               Daniel Garant},
  title     = {Botnet detection based on traffic behavior analysis and flow intervals},
  journal   = {Comput. Secur.},
  volume    = {39},
  pages     = {2--16},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.cose.2013.04.007},
  doi       = {10.1016/j.cose.2013.04.007},
  timestamp = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/ZhaoTSLSGG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/SayedTWO13,
  author    = {Bassam Sayed and
               Issa Traor{\'{e}} and
               Isaac Woungang and
               Mohammad S. Obaidat},
  title     = {Biometric Authentication Using Mouse Gesture Dynamics},
  journal   = {{IEEE} Syst. J.},
  volume    = {7},
  number    = {2},
  pages     = {262--274},
  year      = {2013},
  url       = {https://doi.org/10.1109/JSYST.2012.2221932},
  doi       = {10.1109/JSYST.2012.2221932},
  timestamp = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/sj/SayedTWO13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZhaoTGSSL12,
  author    = {David Zhao and
               Issa Traor{\'{e}} and
               Ali A. Ghorbani and
               Bassam Sayed and
               Sherif Saad and
               Wei Lu},
  editor    = {Dimitris Gritzalis and
               Steven Furnell and
               Marianthi Theoharidou},
  title     = {Peer to Peer Botnet Detection Based on Flow Intervals},
  booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
               Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
               June 4-6, 2012. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {376},
  pages     = {87--102},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30436-1\_8},
  doi       = {10.1007/978-3-642-30436-1\_8},
  timestamp = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/sec/ZhaoTGSSL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SaadTGSZLFH11,
  author    = {Sherif Saad and
               Issa Traor{\'{e}} and
               Ali A. Ghorbani and
               Bassam Sayed and
               David Zhao and
               Wei Lu and
               John Felix and
               Payman Hakimian},
  title     = {Detecting {P2P} botnets through network behavior analysis and machine
               learning},
  booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
               19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages     = {174--180},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://doi.org/10.1109/PST.2011.5971980},
  doi       = {10.1109/PST.2011.5971980},
  timestamp = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/pst/SaadTGSZLFH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ruleml/AbdelhalimTS09,
  author    = {Amany Abdelhalim and
               Issa Traor{\'{e}} and
               Bassam Sayed},
  editor    = {Guido Governatori and
               John Hall and
               Adrian Paschke},
  title     = {{RBDT-1:} {A} New Rule-Based Decision Tree Generation Technique},
  booktitle = {Rule Interchange and Applications, International Symposium, RuleML
               2009, Las Vegas, Nevada, USA, November 5-7, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5858},
  pages     = {108--121},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04985-9\_12},
  doi       = {10.1007/978-3-642-04985-9\_12},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/conf/ruleml/AbdelhalimTS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics