Hamad BinSalleeh
Hamad BinSalleeh
Verified email at
Cited by
Cited by
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010
Mining writeprints from anonymous e-mails for forensic investigation
F Iqbal, H Binsalleeh, BCM Fung, M Debbabi
digital investigation 7 (1-2), 56-64, 2010
A unified data mining solution for authorship analysis in anonymous textual communications
F Iqbal, H Binsalleeh, B Fung, M Debbabi
Information Sciences 231, 98-112, 2013
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats
I Ghafir, KG Kyriakopoulos, S Lambotharan, FJ Aparicio-Navarro, ...
IEEE Access 7, 99508-99520, 2019
Detection of Malicious Payload Distribution Channels in DNS
AM Kara, H Binsalleeh, M Mannan, A Youssef, M Debbabi
Anomaly Detection Using Dynamic Time Warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
2019 IEEE International Conference on Computational Science and Engineering …, 2019
Multidimensional investigation of source port 0 probing
E Bou-Harb, NE Lakhdari, H Binsalleeh, M Debbabi
Digital Investigation 11, S114-S123, 2014
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection
I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro, S Lambotharan, ...
IEEE Access 6, 40008-40023, 2018
Defaming botnet toolkits: A bottom-up approach to mitigating the threat
T Ormerod, L Wang, M Debbabi, A Youssef, H Binsalleeh, A Boukhtouta, ...
2010 Fourth International Conference on Emerging Security Information …, 2010
Characterization of Covert Channels in DNS
H Binsalleeh, AM Kara, A Youssef, M Debbabi
New Technologies, Mobility and Security (NTMS), 2014 6th International …, 2014
An implementation for a worm detection and mitigation system
H Binsalleeh, A Youssef
2008 24th Biennial Symposium on Communications, 54-57, 2008
Using RFID tags to improve pilgrimage management
H Binsalleeh, N Mohammed, PS Sandhu, F Aljumah, BCM Fung
2009 International Conference on Innovations in Information Technology (IIT …, 2009
Denial of service detection using dynamic time warping
DM Diab, B AsSadhan, H Binsalleeh, S Lambotharan, KG Kyriakopoulos, ...
International Journal of Network Management 31 (6), e2159, 2021
Analysis of Malware and Domain Name System Traffic
H Binsalleeh
Concordia University, 2014
Comparative analysis on imbalanced multi-class classification for malware samples using CNN
A Alzammam, H Binsalleeh, B AsSadhan, KG Kyriakopoulos, ...
2019 International Conference on Advances in the Emerging Computing …, 2020
Botnets: Analysis, Detection, and Mitigation
H Binsalleeh
Network Security Technologies: Design and Applications: Design and …, 2014
An Explanation of the LSTM Model Used for DDoS Attacks Classification
A Bashaiwth, H Binsalleeh, B AsSadhan
Applied Sciences 13 (15), 8820, 2023
Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis
B AsSadhan, A Alzoghaiby, H Binsalleeh, KG Kyriakopoulos, ...
International Journal of Network Management 30 (6), e2129, 2020
Adversarial Attacks with Defense Mechanisms on Convolutional Neural Networks and Recurrent Neural Networks for Malware Classification
S Alzaidy, H Binsalleeh
Applied Sciences 14 (4), 1673, 2024
Design and implementation of a worm detection and mitigation system
H Binsalleeh
Concordia University, 2008
The system can't perform the operation now. Try again later.
Articles 1–20