Abdullah Qasem
Cited by
Cited by
Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies
A Qasem, P Shirani, M Debbabi, L Wang, B Lebel, BL Agba
ACM Computing Surveys (CSUR) 54 (2), 1-42, 2021
Finding a needle in a haystack: The traffic analysis version
A Qasem, S Zhioua, K Makhlouf
Proceedings on Privacy Enhancing Technologies, 2019
Binary function clone search in the presence of code obfuscation and optimization over multi-cpu architectures
A Qasem, M Debbabi, B Lebel, M Kassouf
Proceedings of the 2023 acm asia conference on computer and communications …, 2023
Detection of Cyber Attacks on Synchro-Phasor Network Targeting Topology Detection Application of Power Distribution Grids
A Ebtia, DE Rebbah, A Qasem, M Ghafouri, D Jafarigiv, M Debbabi, ...
2023 IEEE International Conference on Communications, Control, and Computing …, 2023
Network Traffic Analysis Using Approximate Hash Matching
A Qasem
King Fahd University of Petroleum and Minerals (Saudi Arabia) , 2017
The system can't perform the operation now. Try again later.
Articles 1–5