default search action
Sadegh Torabi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Yefei Zhang, Sadegh Torabi, Jun Yan, Chadi Assi:
Dynamic trigger-based attacks against next-generation IoT malware family classifiers. Comput. Secur. 149: 104187 (2025) - 2024
- [j11]Yunlong Xing, Xinda Wang, Sadegh Torabi, Zeyu Zhang, Lingguang Lei, Kun Sun:
A Hybrid System Call Profiling Approach for Container Protection. IEEE Trans. Dependable Secur. Comput. 21(3): 1068-1083 (2024) - [j10]Khaled Sarieddine, Mohammad Ali Sayed, Chadi Assi, Ribal Atallah, Sadegh Torabi, Joseph Khoury, Morteza Safaei Pour, Elias Bou-Harb:
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security. IEEE Trans. Netw. Serv. Manag. 21(1): 1287-1301 (2024) - [c10]Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Attallah, Danial Jafarigiv, Chadi Assi, Mourad Debbabi:
Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System. AsiaCCS 2024 - [c9]Yefei Zhang, Jun Yan, Sadegh Torabi, Chadi Assi:
Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and Mitigation. ICC 2024: 4638-4643 - 2023
- [j9]Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Atallah, Chadi Assi:
Investigating the Security of EV Charging Mobile Applications as an Attack Surface. ACM Trans. Cyber Phys. Syst. 7(4): 26:1-26:28 (2023) - [c8]Ricardo Misael Ayala Molina, Elias Bou-Harb, Sadegh Torabi, Chadi Assi:
RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics. ICC 2023: 1-6 - [c7]Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi:
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems. NDSS 2023 - [i2]Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Atallah, Chadi Assi:
Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated By Compromised EV Charging Stations. CoRR abs/2302.12890 (2023) - 2022
- [j8]Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi:
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems. Comput. Secur. 112: 102511 (2022) - [j7]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. IEEE Trans. Dependable Secur. Comput. 19(1): 402-418 (2022) - [j6]Ricardo Misael Ayala Molina, Sadegh Torabi, Khaled Sarieddine, Elias Bou-Harb, Nizar Bouguila, Chadi Assi:
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities. IEEE Trans. Netw. Serv. Manag. 19(1): 19-36 (2022) - [c6]Mirabelle Dib, Sadegh Torabi, Elias Bou-Harb, Nizar Bouguila, Chadi Assi:
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants. AsiaCCS 2022: 452-466 - [c5]Yunlong Xing, Jiahao Cao, Xinda Wang, Sadegh Torabi, Kun Sun, Fei Yan, Qi Li:
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images. CNS 2022: 236-244 - [i1]Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Atallah, Chadi Assi:
Investigating the Security of EV Charging Mobile Applications As an Attack Surface. CoRR abs/2211.10603 (2022) - 2021
- [j5]Sadegh Torabi, Mirabelle Dib, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships. IEEE Netw. Lett. 3(3): 161-165 (2021) - [j4]Mirabelle Dib, Sadegh Torabi, Elias Bou-Harb, Chadi Assi:
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution. IEEE Trans. Netw. Serv. Manag. 18(2): 1165-1177 (2021) - 2020
- [j3]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. Digit. Investig. 32 Supplement: 300922 (2020) - [j2]Morteza Safaei Pour, Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mourad Debbabi:
Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities. IEEE Netw. Lett. 2(3): 159-163 (2020)
2010 – 2019
- 2018
- [j1]Sadegh Torabi, Amine Boukhtouta, Chadi Assi, Mourad Debbabi:
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems. IEEE Commun. Surv. Tutorials 20(4): 3389-3415 (2018) - [c4]Sadegh Torabi, Elias Bou-Harb, Chadi Assi, Mario Galluscio, Amine Boukhtouta, Mourad Debbabi:
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective. DSN 2018: 562-573 - 2016
- [c3]Sadegh Torabi, Konstantin Beznosov:
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users. SOUPS 2016: 301-320 - 2013
- [c2]Sadegh Torabi, Konstantin Beznosov:
Privacy Aspects of Health Related Information Sharing in Online Social Networks. HealthTech 2013 - 2012
- [c1]Khaled Mahdi, Ahmed Almajid, Maytham Safar, Hernan Riquelme, Sadegh Torabi:
Social Network Analysis of Kuwait Publicly-Held Corporations. ANT/MobiWIS 2012: 272-281
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint