default search action
Nizar Kheir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Samia Boutalbi, Nizar Kheir, Remous-Aris Koutsiamanis, Mario Südholt, Yann Dan Moussa:
Mobile Edge Slice Broker: Mobile Edge Slices Deployment in Multi-Cloud Environments. ICFEC 2023: 58-63 - 2022
- [c23]Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche:
Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. ICC 2022: 5238-5243 - [c22]Nizar Kheir, Loay Abdelrazek, Daniel Cho:
Demo Paper: Caught in my Radio Net - Experiment with Honeypots in Radio Access Networks. ICIN 2022: 1-3
2010 – 2019
- 2018
- [j4]Nizar Kheir, Ali Ridha Mahjoub, Mohamed Yassine Naghmouchi, Nancy Perrot, Jean-Philippe Wary:
Assessing the risk of complex ICT systems. Ann. des Télécommunications 73(1-2): 95-109 (2018) - [j3]Xiao Han, Nizar Kheir, Davide Balzarotti:
Deception Techniques in Computer Security: A Research Perspective. ACM Comput. Surv. 51(4): 80:1-80:36 (2018) - [c21]Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, Pascal Bisson:
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service. ARES 2018: 47:1-47:8 - 2017
- [c20]Xiao Han, Nizar Kheir, Davide Balzarotti:
Evaluation of Deception-Based Web Attacks Detection. MTD@CCS 2017: 65-73 - [c19]Sébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, Mohamed Sabt:
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic. AsiaCCS 2017: 561-574 - [c18]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System. ICDCS Workshops 2017: 105-112 - 2016
- [c17]Wafa Ben Jaballah, Nizar Kheir:
A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications. MIST@CCS 2016: 1-12 - [c16]Mohamed Yassine Naghmouchi, Nancy Perrot, Nizar Kheir, Ali Ridha Mahjoub, Jean-Philippe Wary:
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems. MIST@CCS 2016: 97-100 - [c15]Xiao Han, Nizar Kheir, Davide Balzarotti:
PhishEye: Live Monitoring of Sandboxed Phishing Kits. CCS 2016: 1402-1413 - [c14]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
A new approach to investigate IoT threats based on a four layer model. NOTERE 2016: 1-6 - 2015
- [j2]Nizar Kheir, Xiao Han, Chirine Wolley:
Behavioral fine-grained detection and classification of P2P bots. J. Comput. Virol. Hacking Tech. 11(4): 217-233 (2015) - [c13]Anael Bonneton, Daniel Migault, Stéphane Sénécal, Nizar Kheir:
DGA Bot Detection with Time Series Decision Trees. BADGERS@RAID 2015: 42-53 - [c12]Xiao Han, Nizar Kheir, Davide Balzarotti:
The Role of Cloud Services in Malicious Software: Trends and Insights. DIMVA 2015: 187-204 - [c11]Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, Pascal Urien:
Internet of Things: A Definition & Taxonomy. NGMAST 2015: 72-77 - [c10]Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro, Dingqi Yang:
Automated Classification of C&C Connections Through Malware URL Clustering. SEC 2015: 252-266 - 2014
- [c9]Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps:
Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists. SEC 2014: 1-14 - 2013
- [j1]Nizar Kheir:
Behavioral classification and detection of malware through HTTP user agent anomalies. J. Inf. Secur. Appl. 18(1): 2-13 (2013) - [c8]Nizar Kheir, Chirine Wolley:
BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis. CANS 2013: 162-178 - [c7]Nizar Kheir, Xiao Han:
PeerViewer: Behavioral Tracking and Classification of P2P Malware. CSS 2013: 282-298 - 2012
- [c6]Nizar Kheir:
Analyzing HTTP User Agent Anomalies for Malware Detection. DPM/SETOP 2012: 187-200 - 2010
- [c5]Paul Smith, Alberto E. Schaeffer Filho, Azman Ali, Marcus Schöller, Nizar Kheir, Andreas Mauthe, David Hutchison:
Strategies for Network Resilience: Capitalising on Policies. AIMS 2010: 118-122 - [c4]Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
A Service Dependency Model for Cost-Sensitive Intrusion Response. ESORICS 2010: 626-642 - [c3]Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens:
Service Dependencies in Information Systems Security. MMM-ACNS 2010: 1-20 - [c2]Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment. SEC 2010: 148-160
2000 – 2009
- 2009
- [c1]Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka:
A Service Dependency Modeling Framework for Policy-Based Response Enforcement. DIMVA 2009: 176-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint