Follow
Asem Ghaleb
Asem Ghaleb
Security Researcher
Verified email at ece.ubc.ca - Homepage
Title
Cited by
Cited by
Year
How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection
A Ghaleb, K Pattabiraman
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
1312020
On PLC network security
A Ghaleb, S Zhioua, A Almulhem
International Journal of Critical Infrastructure Protection 22, 62-69, 2018
582018
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring
B Jethva, I Traoré, A Ghaleb, K Ganame, S Ahmed
Journal of Computer Security 28 (3), 337-373, 2020
352020
Scada-sst: a scada security testbed
A Ghaleb, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
312016
eTainter: detecting gas-related vulnerabilities in smart contracts
A Ghaleb, J Rubin, K Pattabiraman
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
202022
Detecting ransomware in encrypted web traffic
J Modi, I Traore, A Ghaleb, K Ganame, S Ahmed
Foundations and Practice of Security: 12th International Symposium, FPS 2019 …, 2020
112020
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities
A Ghaleb, J Rubin, K Pattabiraman
102023
A framework architecture for agentless cloud endpoint security monitoring
A Ghaleb, I Traore, K Ganame
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
62019
Towards effective static analysis approaches for security vulnerabilities in smart contracts
A Ghaleb
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
42022
Static analysis approaches for finding vulnerabilities in smart contracts
AAE Ghaleb
University of British Columbia, 2023
2023
SCADA Security Assessment Under Cyber Attacks
AAE Ghaleb
PQDT-Global, 2015
2015
Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study
ESM El-Alfy, AA Ghaleb
2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 1-8, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–12