scispace - formally typeset
M

Mourad Debbabi

Researcher at Concordia University

Publications -  404
Citations -  7787

Mourad Debbabi is an academic researcher from Concordia University. The author has contributed to research in topics: Malware & Computer security model. The author has an hindex of 38, co-authored 383 publications receiving 6532 citations. Previous affiliations of Mourad Debbabi include Concordia University Wisconsin & Princeton University.

Papers
More filters
Journal ArticleDOI

A Survey and a Layered Taxonomy of Software-Defined Networking

TL;DR: This paper provides an overview on SDN roots and then describes the architecture underlying SDN and its main components, and presents existing SDN-related taxonomies and proposes a taxonomy that classifies the reviewed research works and brings relevant research directions into focus.
Journal ArticleDOI

MalDozer: Automatic framework for android malware detection using deep learning

TL;DR: MalDozer is proposed, an automatic Android malware detection and family attribution framework that relies on sequences classification using deep learning techniques that can serve as a ubiquitous malware detection system that is not only deployed on servers, but also on mobile and even IoT devices.
Proceedings ArticleDOI

On the analysis of the Zeus botnet crimeware toolkit

TL;DR: The reverse engineering insights allow for a better understanding of the technologies and behaviors of such modern HTTP botnet crimeware toolkits and opens an opportunity to inject falsified information into the botnet communications which can be used to defame this Crimeware toolkit.

Static Detection of Malicious Code in Executable Programs

TL;DR: A new approach for the static detection of malicious code in binary executable programs is proposed based on a semantic analysis based on behaviour that even makes possible the detection of unknown malicious code.
Journal ArticleDOI

Communication security for smart grid distribution networks

TL;DR: This article targets the network security of the advanced metering infrastructure coupled with the data communication toward the transmission infrastructure, and discusses the security and feasibility aspects of possible communication mechanisms that could be adopted on that subpart of the grid.