default search action
Djedjiga Mouheb
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Mariam Orabi, Zaher Al Aghbari, Ibrahim Kamel, Djedjiga Mouheb:
Keeping an eye on moving objects: processing continuous spatial-keyword range queries. GeoInformatica 28(1): 117-143 (2024) - 2021
- [b3]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198 - 2020
- [b2]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j10]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. Comput. Secur. 96: 101932 (2020) - [j9]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97: 101965 (2020) - [j8]Mariam Orabi, Djedjiga Mouheb, Zaher Al Aghbari, Ibrahim Kamel:
Detection of Bots in Social Media: A Systematic Review. Inf. Process. Manag. 57(4): 102250 (2020) - [c18]Ali Al Zaabi, Djedjiga Mouheb:
Android Malware Detection Using Static Features and Machine Learning. CCCI 2020: 1-5 - [c17]Mohammad Qbea'h, Saed Alrabaee, Djedjiga Mouheb:
An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks. ICISSP 2020: 603-610 - [i3]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Clustering using Community Detection on Android Packages Similarity Network. CoRR abs/2005.06075 (2020)
2010 – 2019
- 2019
- [j7]Djedjiga Mouheb, Sohail Abbas, Madjid Merabti:
Cybersecurity Curriculum Design: A Survey. Trans. Edutainment 15: 93-107 (2019) - [c16]Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, Djedjiga Mouheb:
A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and Canada. AICCSA 2019: 1-7 - [c15]Djedjiga Mouheb, Raghad Albarghash, Mohamad Fouzi Mowakeh, Zaher Al Aghbari, Ibrahim Kamel:
Detection of Arabic Cyberbullying on Social Networks using Machine Learning. AICCSA 2019: 1-5 - [c14]Djedjiga Mouheb, Masa Hilal Abushamleh, Maya Hilal Abushamleh, Zaher Al Aghbari, Ibrahim Kamel:
Real-Time Detection of Cyberbullying in Arabic Twitter Streams. NTMS 2019: 1-5 - 2018
- [j6]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. Digit. Investig. 24 Supplement: S48-S59 (2018) - [c13]Djedjiga Mouheb, Rutana Ismail, Shaheen Al Qaraghuli, Zaher Al Aghbari, Ibrahim Kamel:
Detection of Offensive Messages in Arabic Social Media Communications. IIT 2018: 24-29 - [c12]Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, Djedjiga Mouheb, Omar Alfandi:
Remote Data Acquisition Using Raspberry Pi3. NTMS 2018: 1-5 - 2017
- [c11]Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna:
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables. SEC 2017: 341-355 - [i2]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware. CoRR abs/1702.05699 (2017) - [i1]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Deep Learning on API Method Sequences. CoRR abs/1712.08996 (2017) - 2016
- [j5]ElMouatez Billah Karbab, Mourad Debbabi, Djedjiga Mouheb:
Fingerprinting Android packaging: Generating DNAs for malware detection. Digit. Investig. 18 Supplement: S33-S45 (2016) - [j4]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - [c10]ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Cypider: building community-based cyber-defense infrastructure for android malware detection. ACSAC 2016: 348-362 - [c9]ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga Mouheb:
DySign: dynamic fingerprinting for the automatic detection of android malware. MALWARE 2016: 139-146 - 2015
- [b1]Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j3]Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb, Mourad Debbabi:
Spam campaign detection, analysis, and investigation. Digit. Investig. 12 Supplement 1: S12-S21 (2015) - [j2]Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi, Farkhund Iqbal, May El Barachi:
Graph-theoretic characterization of cyber-threat infrastructures. Digit. Investig. 14 Supplement 1: S3-S15 (2015) - 2013
- [c8]Djedjiga Mouheb, Raha Ziarati, Mourad Debbabi:
Aspect-Oriented Semantic Framework for Executable Models. TASE 2013: 63-70 - 2012
- [c7]Djedjiga Mouheb, Raha Ziarati, Mourad Debbabi:
Continuation/Frame-based Semantics for Aspect Matching and Weaving. SoMeT 2012: 146-161 - 2010
- [c6]Mariam Nouh, Raha Ziarati, Djedjiga Mouheb, Dima Alhadidi, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect weaver: a model transformation approach for UML models. CASCON 2010: 139-153 - [c5]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. FACS 2010: 182-199 - [c4]Djedjiga Mouheb, Chamseddine Talhi, Mariam Nouh, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. SERA (selected papers) 2010: 197-213
2000 – 2009
- 2009
- [j1]Chamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Usability of Security Specification Approaches for UML Design: A Survey. J. Object Technol. 8(6): 102-122 (2009) - [c3]Djedjiga Mouheb, Chamseddine Talhi, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Weaving security aspects into UML 2.0 design models. AOM@AOSD 2009: 7-12 - [c2]Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 - [c1]Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. SSV 2009: 143-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint