Follow
Ghita Mezzour
Ghita Mezzour
Data in Seconds (DASEC)
Verified email at dasec.ma - Homepage
Title
Cited by
Cited by
Year
MiniSec: a secure sensor network communication architecture
M Luk, G Mezzour, A Perrig, V Gligor
Proceedings of the 6th international conference on Information processing in …, 2007
5312007
Certificate revocation list distribution in vehicular communication systems
P Papadimitratos, G Mezzour, JP Hubaux
Proceedings of the fifth ACM international workshop on VehiculAr Inter …, 2008
1922008
Method for sending and receiving an evaluation of reputation in a social network
SY Chiou, SY Chang, G Mezzour, A Perrig, HM Sun
US Patent 8,312,276, 2012
782012
Privacy-preserving relationship path discovery in social networks
G Mezzour, A Perrig, V Gligor, P Papadimitratos
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
762009
Digging deeper into data breaches: An exploratory data analysis of hacking breaches over time
H Hammouchi, O Cherqi, G Mezzour, M Ghogho, M El Koutbi
Procedia Computer Science 151, 1004-1009, 2019
742019
Building a soft skill taxonomy from job openings
I Khaouja, G Mezzour, KM Carley, I Kassou
Social Network Analysis and Mining 9, 1-19, 2019
462019
A data-driven characterization of modern Android spyware
F Pierazzi, G Mezzour, Q Han, M Colajanni, VS Subrahmanian
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-38, 2020
332020
An empirical study of wifi security and performance in morocco-wardriving in rabat
A Sebbar, SE Boulahya, G Mezzour, M Boulmalf
2016 International Conference on Electrical and Information Technologies …, 2016
262016
Analysis of hacking related trade in the darkweb
O Cherqi, G Mezzour, M Ghogho, M El Koutbi
2018 IEEE international conference on intelligence and security informatics …, 2018
252018
An empirical study of global malware encounters
G Mezzour, KM Carley, LR Carley
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-11, 2015
242015
: Predictive Behavioral Analysis of Recent Android Banking Trojans
C Bai, Q Han, G Mezzour, F Pierazzi, VS Subrahmanian
IEEE Transactions on Dependable and Secure Computing 18 (3), 1378-1393, 2019
222019
Analyzing the needs of the offshore sector in Morocco by mining job ads
I Khaouja, I Rahhal, M Elouali, G Mezzour, I Kassou, KM Carley
2018 IEEE Global Engineering Education Conference (EDUCON), 1380-1388, 2018
162018
Longitudinal analysis of a large corpus of cyber threat descriptions
G Mezzour, LR Carley, KM Carley
Journal of Computer Virology and Hacking Techniques 12 (1), 11-22, 2016
142016
Analyzing cybersecurity job market needs in Morocco by mining job ads
I Rahhal, I Makdoun, G Mezzour, I Khaouja, K Carley, I Kassou
2019 IEEE global engineering education conference (EDUCON), 535-543, 2019
132019
Analyzing the needs of the automotive job market in Morocco
I Makdoun, G Mezzour, KM Carley, I Kassou
2018 13th International Conference on Computer Science & Education (ICCSE), 1-6, 2018
132018
Exploratory data analysis of a network telescope traffic and prediction of port probing rates
M Zakroum, A Houmz, M Ghogho, G Mezzour, A Lahmadi, J François, ...
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
112018
Detecting the impact of software vulnerability on attacks: A case study of network telescope scans
A Houmz, G Mezzour, K Zkik, M Ghogho, H Benbrahim
Journal of Network and Computer Applications 195, 103230, 2021
92021
Assessing the Global Cyber and Biological Threat.
G Mezzour
Carnegie Mellon University, USA, 2015
92015
Global variation in attack encounters and hosting
G Mezzour, KM Carley, LR Carley
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
72017
A socio-computational approach to predicting bioweapon proliferation
G Mezzour, W Frankenstein, KM Carley, LR Carley
IEEE Transactions on Computational Social Systems 5 (2), 458-467, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20