default search action
Mohamed Nabeel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Udesh Kumarasinghe, Mohamed Nabeel, Charitha Elvitigala:
Blocklist-Forecast: Proactive Domain Blocklisting by Identifying Malicious Hosting Infrastructure. RAID 2024: 35-48 - [c29]Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. SIGMETRICS/Performance (Abstracts) 2024: 55-56 - [c28]Saravanan Thirumuruganathan, Fatih Deniz, Issa Khalil, Ting Yu, Mohamed Nabeel, Mourad Ouzzani:
Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data. USENIX Security Symposium 2024 - 2023
- [j11]Sameera Horawalavithana, Ravindu De Silva, Nipuna Weerasekara, N. G. Kin Wai, Mohamed Nabeel, Buddhini Abayaratna, Charitha Elvitigala, Primal Wijesekera, Adriana Iamnitchi:
Vaccination trials on hold: malicious and low credibility content on Twitter during the AstraZeneca COVID-19 vaccine development. Comput. Math. Organ. Theory 29(3): 448-469 (2023) - [j10]Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. Proc. ACM Meas. Anal. Comput. Syst. 7(3): 59:1-59:26 (2023) - [j9]Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, Wei Wang:
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference. ACM Trans. Priv. Secur. 26(1): 9:1-9:32 (2023) - 2022
- [c27]Panayot Panayotov, Utsav Shukla, Husrev Taha Sencar, Mohamed Nabeel, Preslav Nakov:
GREENER: Graph Neural Networks for News Media Profiling. EMNLP 2022: 7470-7480 - [c26]Udesh Kumarasinghe, Mohamed Nabeel, Kasun De Zoysa, Kasun Gunawardana, Charitha Elvitigala:
HeteroGuard: Defending Heterogeneous Graph Neural Networks against Adversarial Attacks. ICDM (Workshops) 2022: 698-705 - [c25]Mashael Al Sabah, Mohamed Nabeel, Yazan Boshmaf, Euijin Choo:
Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS. RAID 2022: 446-459 - [c24]Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, Issa Khalil, Ting Yu:
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors. SP 2022: 507-521 - [c23]Shehan Vidyakeerthi, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama:
Demo: PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs. WWW (Companion Volume) 2022: 286-289 - [i11]Shehan Edirimannage, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama:
PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs. CoRR abs/2202.07882 (2022) - [i10]Wathsara Daluwatta, Ravindu De Silva, Sanduni Kariyawasam, Mohamed Nabeel, Charith Elvitigala, Kasun De Zoysa, Chamath Keppitiyagama:
CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform. CoRR abs/2202.07883 (2022) - [i9]Udesh Kumarasinghe, Fatih Deniz, Mohamed Nabeel:
PDNS-Net: A Large Heterogeneous Graph Benchmark Dataset of Network Resolutions for Graph Learning. CoRR abs/2203.07969 (2022) - [i8]Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. CoRR abs/2205.13155 (2022) - [i7]Enes Altinisik, Husrev Taha Sencar, Mohamed Nabeel, Issa Khalil, Ting Yu:
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior. CoRR abs/2206.05679 (2022) - [i6]Panayot Panayotov, Utsav Shukla, Husrev Taha Sencar, Mohamed Nabeel, Preslav Nakov:
GREENER: Graph Neural Networks for News Media Profiling. CoRR abs/2211.05533 (2022) - 2021
- [c22]Pengcheng Xia, Mohamed Nabeel, Issa Khalil, Haoyu Wang, Ting Yu:
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns. CODASPY 2021: 209-220 - [c21]Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, Ting Yu:
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. RAID 2021: 205-219 - [c20]Sameera Horawalavithana, Ravindu De Silva, Mohamed Nabeel, Charitha Elvitigala, Primal Wijesekera, Adriana Iamnitchi:
Malicious and Low Credibility URLs on Twitter During the AstraZeneca COVID-19 Vaccine Development. SBP-BRiMS 2021: 3-12 - [c19]Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama:
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs. USENIX Security Symposium 2021: 3721-3738 - [i5]Sameera Horawalavithana, Ravindu De Silva, Mohamed Nabeel, Charitha Elvitigala, Primal Wijesekera, Adriana Iamnitchi:
Malicious and Low Credibility URLs on Twitter during COVID-19. CoRR abs/2102.12223 (2021) - [i4]Nimesha Wickramasinghe, Mohamed Nabeel, Kenneth Thilakaratne, Chamath Keppitiyagama, Kasun De Zoysa:
Uncovering IP Address Hosting Types Behind Malicious Websites. CoRR abs/2111.00142 (2021) - 2020
- [j8]Mohamed Nabeel, Issa M. Khalil, Bei Guan, Ting Yu:
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. ACM Trans. Priv. Secur. 23(4): 17:1-17:36 (2020)
2010 – 2019
- 2019
- [i3]Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, Wei Wang:
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference. CoRR abs/1911.12080 (2019) - 2018
- [c18]Issa M. Khalil, Bei Guan, Mohamed Nabeel, Ting Yu:
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference. CODASPY 2018: 330-341 - [c17]Elisa Bertino, Mohamed Nabeel:
Securing Named Data Networks: Challenges and the Way Forward. SACMAT 2018: 51-59 - 2017
- [c16]Mohamed Nabeel:
The Many Faces of End-to-End Encryption and Their Security Analysis. EDGE 2017: 252-259 - [c15]Rade Stanojevic, Mohamed Nabeel, Ting Yu:
Distributed Cardinality Estimation of Set Operations with Differential Privacy. PAC 2017: 37-48 - [i2]Issa Khalil, Bei Guan, Mohamed Nabeel, Ting Yu:
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage. CoRR abs/1711.00300 (2017) - 2016
- [j7]Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino:
DBMask: Fine-Grained Access Control on Encrypted Relational Databases. Trans. Data Priv. 9(3): 187-214 (2016) - 2015
- [j6]Mohamed Nabeel, Xiaoyu Ding, Seung-Hyun Seo, Elisa Bertino:
Scalable end-to-end security for advanced metering infrastructures. Inf. Syst. 53: 213-223 (2015) - [c14]Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino:
DBMask: Fine-Grained Access Control on Encrypted Relational Databases. CODASPY 2015: 1-11 - 2014
- [j5]Mohamed Nabeel, Elisa Bertino:
Attribute Based Group Key Management. Trans. Data Priv. 7(3): 309-336 (2014) - [j4]Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds. IEEE Trans. Knowl. Data Eng. 26(9): 2107-2119 (2014) - [j3]Mohamed Nabeel, Elisa Bertino:
Privacy Preserving Delegated Access Control in Public Clouds. IEEE Trans. Knowl. Data Eng. 26(9): 2268-2280 (2014) - [c13]Mohamed Nabeel, Nabanita Maji, Jing Zhang, Nataliya Timoshevskaya, Wu-chun Feng:
Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows. TrustCom 2014: 739-746 - 2013
- [j2]Mohamed Nabeel, Ning Shang, Elisa Bertino:
Privacy Preserving Policy-Based Content Sharing in Public Clouds. IEEE Trans. Knowl. Data Eng. 25(11): 2602-2614 (2013) - [c12]Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An efficient certificateless cryptography scheme without pairing. CODASPY 2013: 181-184 - [c11]Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann:
Privacy Preserving Context Aware Publish Subscribe Systems. NSS 2013: 465-478 - 2012
- [b1]Mohamed Nabeel:
Privacy preserving access control for third-party data management systems. Purdue University, USA, 2012 - [j1]Mohamed Nabeel, Elisa Bertino:
Privacy-Preserving Fine-Grained Access Control in Public Clouds. IEEE Data Eng. Bull. 35(4): 21-30 (2012) - [c10]Eduard C. Dragut, Mourad Ouzzani, Amgad Madkour, Mohamed Nabeel, Peter Baker, David E. Salt:
Lonomics Atlas: a tool to explore interconnected ionomic, genomic and environmental data. CIKM 2012: 2680-2682 - [c9]Mohamed Nabeel, Elisa Bertino:
Privacy preserving delegated access control in the storage as a service model. IRI 2012: 645-652 - [c8]Mohamed Nabeel, Ning Shang, Elisa Bertino:
Efficient privacy preserving content based publish subscribe systems. SACMAT 2012: 133-144 - [c7]Mohamed Nabeel, Sam Kerr, Xiaoyu Ding, Elisa Bertino:
Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions. SmartGridComm 2012: 324-329 - [i1]Mohamed Nabeel, John Zage, Sam Kerr, Elisa Bertino, N. Athula Kulatunga, U. Sudheera Navaratne, Michael Duren:
Cryptographic Key Management for Smart Power Grids - Approaches and Issues. CoRR abs/1206.3880 (2012) - 2011
- [c6]Mohamed Nabeel, Elisa Bertino:
Poster: towards attribute based group key management. CCS 2011: 821-824 - [c5]Mohamed Nabeel, Elisa Bertino, Murat Kantarcioglu, Bhavani Thuraisingham:
Towards privacy preserving access control in the cloud. CollaborateCom 2011: 172-180 - 2010
- [c4]Ning Shang, Mohamed Nabeel, Federica Paci, Elisa Bertino:
A privacy-preserving approach to policy-based content dissemination. ICDE 2010: 944-955 - [c3]Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino:
Mask: a system for privacy-preserving policy-based access to published content. SIGMOD Conference 2010: 1239-1242
2000 – 2009
- 2008
- [c2]Mohamed Nabeel, Elisa Bertino:
Secure Delta-Publishing of XML Content. ICDE 2008: 1361-1363 - 2007
- [c1]Mohamed Nabeel, Elisa Bertino:
A structure preserving approach for securing XML documents. CollaborateCom 2007: 8-15
Coauthor Index
aka: Issa Khalil
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint