Djedjiga Mouheb
University of Sharjah
H-index: 17
Asia-United Arab Emirates
Top articles of Djedjiga Mouheb
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Keeping an eye on moving objects: processing continuous spatial-keyword range queries | GeoInformatica | Mariam Orabi Zaher Al Aghbari Ibrahim Kamel Djedjiga Mouheb | 2024/1 |
Android Malware Fingerprinting Using Dynamic Analysis | Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence | ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb ElMouatez Billah Karbab | 2021 |
Resilient and Adaptive Android Malware Fingerprinting and Detection | Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence | ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb ElMouatez Billah Karbab | 2021 |
Portable supervised malware fingerprinting using deep learning | Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence | ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb ElMouatez Billah Karbab | 2021 |
Fingerprinting Cyber-Infrastructures of Android Malware | Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence | ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb ElMouatez Billah Karbab | 2021 |
Fingerprinting Android Malware Packages | Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence | ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb ElMouatez Billah Karbab | 2021 |
Arabic Cyberbullying Detection from Imbalanced Dataset Using Machine Learning | Meshari Essa AlFarah Ibrahim Kamel Zaher Al Aghbari Djedjiga Mouheb | 2021/12/10 | |
Robust Android Malicious Community Fingerprinting | Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence | ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb ElMouatez Billah Karbab | 2021 |
Android malware detection using machine learning: data-driven fingerprinting and threat intelligence | ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb | 2021/7/10 | |
Free Open-Source Software Fingerprinting | Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting | Saed Alrabaee Mourad Debbabi Paria Shirani Lingyu Wang Amr Youssef | 2020 |
An analytical scanning technique to detect and prevent the transformed SQL injection and XSS attacks | Mohammad Qbea'h Saed Alrabaee Djedjiga Mouheb | 2020 | |
Android malware detection using static features and machine learning | Ali Al Zaabi Djedjiga Mouheb | 2020/11/3 | |
Library Function Identification | Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting | Saed Alrabaee Mourad Debbabi Paria Shirani Lingyu Wang Amr Youssef | 2020 |
Compiler provenance attribution | Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting | Saed Alrabaee Mourad Debbabi Paria Shirani Lingyu Wang Amr Youssef | 2020 |
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning | computers & security | ElMouatez Billah Karbab Mourad Debbabi Abdelouahid Derhab Djedjiga Mouheb | 2020/9/1 |
Function Fingerprinting | Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting | Saed Alrabaee Mourad Debbabi Paria Shirani Lingyu Wang Amr Youssef | 2020 |
Binary analysis overview | Saed Alrabaee Mourad Debbabi Paria Shirani Lingyu Wang Amr Youssef | 2020 | |
Detection of bots in social media: a systematic review | Mariam Orabi Djedjiga Mouheb Zaher Al Aghbari Ibrahim Kamel | 2020/7/1 | |
Identifying Reused Functions in Binary Code | Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting | Saed Alrabaee Mourad Debbabi Paria Shirani Lingyu Wang Amr Youssef | 2020 |
Authorship Attribution | Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting | Saed Alrabaee Mourad Debbabi Paria Shirani Lingyu Wang Amr Youssef | 2020 |